تعاملات دیپلماتیک

تعاملات دیپلماتیک

چالش‌ها و فرصت‌های امنیت سایبری در روابط دیپلماتیک و تجاری ایران و ارمنستان

نوع مقاله : مقاله پژوهشی

نویسندگان
1 دانشیار علوم‌سیاسی و روابط بین‌الملل دانشگاه گیلان، رشت، ایران.
2 دانشجوی دکتری علوم سیاسی و روابط بین‌الملل دانشگاه گیلان، رشت، ایران.
چکیده
این پژوهش با هدف تحلیل تأثیر دوسویه امنیت سایبری بر روابط دیپلماتیک و تجاری ایران و ارمنستان، از چارچوب نظری ترکیبی (رئالیسم، نهادگرایی لیبرال و نظریه اعتماد) بهره می‌برد. یافته‌ها نشان می‌دهد امنیت سایبری به‌عنوان عاملی دوگانه هم چالش آفرین و هم فرصت ساز عمل می‌کند. از یک سو، شکاف فاحش در بلوغ سایبری دو کشور (اختلاف ۲۵ رتبه‌ای در شاخص ارزیابی جامع اتحادیه بین‌المللی مخابرات، تحریم‌های فناوری علیه ایران، محدودیت دسترسی به سخت‌افزارهای امنیتی پیشرفته؛ و تهدیدات فرامرزی) افزایش چهل درصدی حملات تهدید مداوم پیشرفته (  نوعی حمله سایبری تحت شبکه است که یک شخص احراز هویت نشده می‌تواند برای مدت زمان زیادی به صورت ناشناس به شبکه دسترسی پیدا کند) به زیرساخت‌های مشترک در ۲۰۲۱، همکاری را مختل کرده‌اند. از سوی دیگر، همکاری‌های عملیاتی مانند پروژه کابل نوری با رمزنگاری کوانتومی  و پلتفرم پرداخت "بریم پی" مبتنی بر بلاکچین  نه تنها نیازهای ارتباطی و مالی را پاسخ داده‌اند؛ بلکه با ایجاد سرمایه اعتمادی  به تقویت روابط کمک کرده‌اند. نقش سازمان همکاری شانگهای  به‌عنوان بستر نهادی کلیدی، با فراهم آوردن مکانیسم‌هایی مانند بانک اطلاعات تهدیدات منطقه‌ای و استانداردسازی پاسخ به حوادث، همکاری را تسهیل نموده است. با این حال، مداخلات قدرت‌های فرا منطقه‌ای این پویایی را پیچیده کرده‌اند: تحریم‌های آمریکا دسترسی به فناوری را محدود می‌کند، فشار روسیه برای نصب سخت‌افزارهای نظارتی در ارمنستان نگرانی‌های امنیتی ایران را افزایش داده و پیشنهاد‌های چین تحت «راه‌اندازی دیجیتال» با چالش ناسازگاری استانداردها روبروست. پژوهش حاضر ثابت می‌کند که موفقیت آتی این همکاری مستلزم سه راهبرد است: ۱) تدوین موافقت‌نامه دوجانبه امنیت سایبری برای رفع خلأهای حقوقی، ۲) توسعه استانداردهای بومی مقاوم در برابر تحریم (الگوریتم‌های رمزنگاری مشترک)، و ۳) بهره‌گیری حداکثری از ظرفیت‌های نهادی. این الگو می‌تواند به چارچوبی پیشرو برای همکاری‌های سایبری جنوب-جنوب در شرایط تحریمی تبدیل گردد.
کلیدواژه‌ها

موضوعات


عنوان مقاله English

Challenges and Opportunities of Cybersecurity in Iran-Armenia Diplomatic and Commercial Relations

نویسندگان English

Mahdi Hedayati SHahidani 1
Hadi Mahdizadeh 2
1 Associate Professor of International Relations, University of Guilan, Rasht, Iran.
2 PhD Student, Department of International Relations, University of Guilan, Rasht, Iran.
چکیده English

Introduction
In the contemporary digital era, cybersecurity has unprecedentedly evolved into a critical substrate of international relations—encompassing the protection of systems, networks, applications, and data against digital threats. Its significance extends beyond safeguarding national critical infrastructure to profoundly influence diplomatic relations (involving confidential negotiations, sensitive information exchange) and commercial interactions (trade flows, joint investments, economic cooperation). The strategic Iran-Armenia relationship—anchored in deep historical and cultural ties within the South Caucasus and Middle East—presents a compelling case study of this complex interplay. While digitalization offers mutual opportunities (e-commerce facilitation, secure diplomatic channels, joint cyber threat response), it simultaneously introduces critical vulnerabilities: shared digital infrastructure exposure, cross-border cyber espionage risks, disparities in cyber maturity, and sanction-driven technological constraints (e.g., U.S. restrictions impacting Iran’s access to advanced security solutions). International Telecommunication Union (ITU) reports confirm divergent national cyber readiness levels, potentially impeding bilateral cooperation. Institutional frameworks like the Shanghai Cooperation Organization (SCO)—where both nations hold observer status—offer platforms for dialogue. This study addresses the dual-impact question: How does cybersecurity function as both a challenge and opportunity for diplomatic and commercial dynamics in Iran-Armenia relations?
Research Objectives
This research aims to:
1.Systematically analyze how cybersecurity disparities (e.g., 25-rank GCI-ITU gap), sanctions regimes, and shared threats reconfigure bilateral relations.
2.Evaluate institutional mechanisms (e.g., SCO regional threat databases) and trust-building initiatives (e.g., quantum-encrypted infrastructure) that transform challenges into cooperative opportunities.
3.Assess the impact of extra-regional actors (U.S. sanctions, Russian SORM surveillance pressures, China’s Digital Silk Road) on collaborative cybersecurity frameworks.
4.Propose policy pathways for sanction-resilient cooperation models applicable to Global South partnerships.
Methodology
This research employs an integrated theoretical framework combining cyber realism, which interprets cybersecurity through the lens of power competition and national interests in anarchic international environments; liberal institutionalism, analyzing the role of multilateral institutions like the Shanghai Cooperation Organization (SCO) in reducing distrust through standardized protocols; and trust theory, examining how operational cooperation builds relational confidence. Empirical analysis incorporates quantitative metrics from international indices .cyber threat datasets (Kaspersky/Symantec statistics), and bilateral trade records; qualitative examination of 31 existing cooperation agreements, SCO policy documents, and field interviews with 42 cybersecurity officials from both nations; and in-depth case studies of critical infrastructure projects including the quantum-encrypted Iran-Armenia optical cable and blockchain-based "Barempay" payment platform.
Findings
Cybersecurity manifests as a dual-nature phenomenon in bilateral relations, simultaneously generating structural challenges and cooperative opportunities. Significant disparities in cyber maturity—evidenced by Armenia’s 35th rank versus Iran’s 60th in the 2021 ITU Global Cybersecurity Index create technical asymmetries exacerbated by U.S. sanctions restricting Iran’s access to advanced security hardware (Connell & Venter, 2016, p. 17). Operational vulnerabilities include a documented 40% surge in cross-border Advanced Persistent Threat (APT) attacks targeting shared energy/transport infrastructure during 2021 and industrial espionage against Iranian tech firms in Armenia  Regulatory misalignment further complicates cooperation: Armenia’s GDPR-inspired data laws conflict with Iran’s national-security-focused cybercrime legislation, while the absence of a dedicated bilateral cybersecurity agreement impedes joint incident response. Conversely, institutional mechanisms like the SCO’s Regional Anti-Terrorist Structure (RATS) threat-intelligence database—containing over 5,000 malware signatures from Central Asia and the Caucasus have reduced incident response costs by 30%. Joint infrastructure projects serve as trust-building vectors: the quantum-secured optical cable project established technical confidence through collaborative encryption protocols, while the "Barempay" blockchain platform processed $12 million in sanction-evading transactions by 2023. Annual "Cyber Shield" exercises enhanced cross-border CSIRT coordination, with 75% of surveyed officials citing the neutralization of the 2022 Nowruz customs system attack as a pivotal trust milestone. Extra-regional interventions add complexity: U.S. CAATSA sanctions limit quantum technology access; Russian pressure to install SORM surveillance hardware in Armenia raises Iranian data-security concerns, and China’s Digital Silk Road initiatives face cryptographic incompatibilities.
Conclusion
The interplay of cybersecurity and Iran-Armenia relations confirms a dialectical dynamic where challenges catalyze innovative cooperation. Structural impediments—technological asymmetries, sanction regimes, and divergent regulatory frameworks—coexist with institutional enablers like the SCO’s standardization mechanisms and operational trust-builders such as joint critical infrastructure projects. This duality necessitates three strategic priorities: formalizing a dedicated bilateral cybersecurity agreement to address legal voids; co-developing indigenous, sanction-resilient technical standards (e.g., shared post-quantum cryptographic algorithms); and maximizing institutional capacities within frameworks like the SCO to counter extra-regional pressures. Success hinges on transforming shared vulnerabilities—particularly transnational threats to economic corridors—into collaborative advantage through depoliticized technical coordination. This model offers a replicable template for Global South digital partnerships operating under constraint, demonstrating how middle powers can leverage cybersecurity not merely as a defensive imperative but as a diplomatic asset in reconfiguring regional stability.

کلیدواژه‌ها English

Armenia
Cybersecurity
Iran
Diplomatic Relations
Commercial Relations
  1. Books 

    1. Buzan, B., & Hansen, L. (2009). The evolution of international security studies. Cambridge University Press.
    2. Deibert, R. J. (2013). Black code: Inside the battle for cyberspace. Signal/McClelland & Stewart.
    3. Fawn, R. (Ed.). (2003). Realignments in Russian foreign policy. Frank Cass Publishers.
    4. Keohane, R. O., & Nye, J. S. (1977). Power and interdependence: World politics in transition. Little, Brown.
    5. Pasdermadjian, H. (1964). Histoire de l'Arménie: Depuis les origines jusqu'au traité de Lausanne. Librairie Orientale H. Samuelian.
    6. Wheeler, N. J. (2018). Trusting enemies: Interpersonal relationships in international conflict. Oxford University Press.
    7. Briant, P. (2002). From Cyrus to Alexander: A history of the Persian Empire. Eisenbrauns.
    8. Kazemzadeh, F. (1968). Russia and Britain in Persia, 1864–1914: A study in imperialism. Yale University Press.
    9. Khorenatsi, M. (1978). History of the Armenians (R. W. Thomson, Trans.). Harvard University Press. (Original work published 5th century)
    10. McCabe, I. B. (1999). The Shah's silk for Europe's silver: The Eurasian trade of the Julfa Armenians in Safavid Iran and India (1530–1750). University of Pennsylvania Press.
    11. Petrosyan, D. (2021). Iran-Armenia relations: Strategic partnership in a changing region. Yerevan State University Press.
    12. Tikk-Ringas, E., & Kerttunen, M. (Eds.). (2023). Routledge handbook of international cybersecurity. Routledge.
    13. Dehghani Firouzabadi, S. J. (2009). History of Iran's foreign relations: From Safavids to the Islamic Republic (3rd ed.). Tehran: Ministry of Foreign Affairs Publications.
    14. Ehteshami, A. (2016). Iran's foreign policy after the nuclear agreement (M. H. Malaekeh, Trans.). Tehran: Research Institute of Strategic Studies. (Original work published 2014)

    15.Sajjadpour, S. K. (2018). Theoretical foundations of foreign policy of the Islamic Republic of Iran. Tehran: Imam Sadegh University Press.

     

    Journal Articles 

    1. Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155–1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x
    2. Larson, D. W. (1997). Trust and missed opportunities in international relations. Political Psychology, 18(3), 701–734. https://doi.org/10.1111/0162-895X.00077
    3. Tabatabai, A., & Rahimi, B. (2020). Iran's cyber strategy: Evolution and implications. Middle East Journal, 74(2), 1–15. https://www.mei.edu/publications/irans-cyber-strategy-evolution-and-implications
    4. Catalini, C. (2022). Regional cyber security cooperation in Southeast Asia: Challenges and opportunities. Journal of Cyber Policy, 7(3), 75–92.
    5. Abrahamyan, E. (2024). Digital neutrality dilemma: Armenia's balancing act. Journal of Eurasian Affairs, 12(2), 112–135.
    6. Farhadi, A. (2024). Cyber proxy wars: Iran-Israel conflict in Armenia's digital space. Middle East Journal, 78(1), 45–67.

    7.Ghorbani, M. (2021). Cybersecurity cooperation between Iran and Armenia: Opportunities and challenges. Quarterly Journal of Central Asia and Caucasus Studies, 12 (45), 67-89.

    8.Khodaverdi, H. (2022). Analysis of Iran-Armenia technological diplomacy in the field of cybersecurity. Journal of Foreign Policy, 36 (3), 155-178.

    1. Zakerian, M., & Ahmadi, F. (2020). The role of regional organizations in cybersecurity: Case study of Shanghai Cooperation Organization. Strategic Studies Quarterly, 23 (88), 31-58.

    Reports, Theses & Government Documents 

    1. Connell, M., & Venter, R. (2016). Iran's cyber threat: Espionage, sabotage, and revenge. Atlantic Council. https://www.atlanticcouncil.org/wp-content/uploads/2016/02/Irans_Cyber_Threat_web_0223.pdf
    2. European Union Agency for Cybersecurity (ENISA). (2022). National cybersecurity strategy status report. Publications Office of the European Union. https://doi.org/10.2824/63037
    3. Giragosian, R. (2017). Armenia's foreign policy: Balancing priorities in a turbulent neighborhood. Friedrich-Ebert-Stiftung. https://library.fes.de/pdf-files/bueros/georgien/14072.pdf
    4. International Telecommunication Union (ITU). (2021). Global cybersecurity index 2020. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2021-PDF-E.pdf
    5. Kaspersky Lab. (2022). APT trends report Q4 2021. https://securelist.com/apt-trends-report-q4-2021/105475/
    6. Minasyan, S. (2018). Cybersecurity in Armenia: Challenges and perspectives. Caucasus Institute. https://www.caucasusinstitute.org/wp-content/uploads/2018/05/Cybersecurity-ENG.pdf
    7. Nye, J. S. (2010). Cyber power. Belfer Center for Science and International Affairs, Harvard Kennedy School. https://www.belfercenter.org/publication/cyber-power
    8. Shanghai Cooperation Organization (SCO) Secretariat. (2019). Report on cooperation in the field of information security among SCO member states [Document No. SCO-SD/19]. http://eng.sectsco.org/documents/
    9. United Nations Conference on Trade and Development (UNCTAD). (2020). Digital economy report 2019: Value creation and capture—Implications for developing countries [Sales No. E.20.II.D.3]. https://unctad.org/system/files/official-document/der2019_en.pdf
    10. World Bank Group. (2022). World development report 2021: Data for better lives. https://doi.org/10.1596/978-1-4648-1600-0
    11. CERT-AM. (2023). Advanced persistent threats in Armenia: Technical analysis. National Security Service Publication.
    12. ENISA. (2023). ENISA threat landscape 2023: Overview of activities. Publications Office of the European Union.
    13. Iranian Supreme Council of Cyberspace. (2022). Directive No. 8/1401 on cross-border data flows.
    14. Kavkaz Cybersecurity Monitor. (2023). Annual report on cyber operations in the South Caucasus. Tbilisi State University Press.
    15. Minasyan, S. (2023). Post-war security architecture in the South Caucasus. Institute for Caucasus Studies.
    16. Organization of American States (OAS). (2022). OAS cybersecurity program: Annual report 2022.
    17. African Union (AU). (2023). Progress report on the implementation of the African Union Convention on Cyber Security and Personal Data Protection (Malabo Convention) [Doc. Assembly/AU/10(XXXVI)].
    18. United Nations Office on Drugs and Crime (UNODC). (2021). Global study on cybercrime.
    19. Asia-Pacific Forum on Cybercrime (APF). (2023). Report on regional cybercrime cooperation mechanisms.
    20. World Economic Forum (WEF). (2024). advancing cyber resilience: Regional cooperation models.
    21. Customs Statistics of the Republic of Armenia. (2010). Annual report 2010. Statistical Committee of the Republic of Armenia.
    22. Ministry of Information and Communications Technology of Iran. (2021). Annual report on Iran-Armenia cyber cooperation. https://ict.gov.ir
    23. SCO Regional Anti-Terrorist Structure (RATS). (2020). Protocol on joint cyber threat intelligence sharing. http://ecrats.org/en/documents/
    24. SCO Secretariat. (2019). Framework for cooperation in combating cyber threats. http://eng.sectsco.org/documents/
    25. World Bank. (2022). Digital connectivity in the South Caucasus. World Bank Publications.
    26. Ministry of Foreign Affairs of Iran. (2022). Protocols of Iran-Armenia Joint Economic Commission (Annex 4).

    27.Center for Strategic Research of Expediency Council. (2023). National report on cybersecurity threats in West Asia (Report No. 1402-07). https://csr.ir/fa/report/140207-cyber

    28.Armenian National Security Service. (2021). Annual cybersecurity assessment report. https://nss.am/en/reports/2021-cyber

    29.Ministry of Communications and Information Technology of Iran. (2022). Iran-Armenia digital cooperation roadmap. https://ict.gov.ir/fa/news/1401-digital-roadmap

    30.Armenian e-Governance Infrastructure Agency. (2023). Cross-border data exchange protocols with Iran. https://e-gov.am/en/protocols/iran-2023

    31.Supreme Council of Cyberspace of Iran. (2020). National cybersecurity strategy document (Approved Document No. 3/99). Tehran.

    32.National Security Council of Armenia. (2019). Cybersecurity doctrine of the Republic of Armenia (Official Gazette No. 25-N). Yerevan.