
1A 'If You Can Keep It': How ready are American security agencies for Iran?
10 snips
Mar 9, 2026 Daniel Byman, CSIS terrorism and irregular warfare expert; Suzanne Spaulding, cybersecurity and infrastructure protection veteran; Shane Harris, national security reporter. They discuss risks of Iranian retaliation, cyberattack capabilities, proxy and assassination options, possible Russian cyber cooperation, impacts of agency firings and furloughs on readiness, and what signs to watch in the coming weeks.
AI Snips
Chapters
Transcript
Episode notes
Iran Will Likely Use Asymmetric Retaliation
- Iran is likely to use asymmetric tools like cyber attacks, proxy forces, and targeted operatives rather than large conventional strikes.
- Shane Harris notes Iran has a history of hiring individuals, scouting targets, and using Hezbollah-linked networks for overseas and possibly domestic actions.
Iran Cyber Power Is Dangerous But Not Peer Level
- Iran's cyber capability is real but below Russia/China and focused on disruption and infiltration rather than complex infrastructure destruction.
- Suzanne Spaulding cites past attacks like Saudi Aramco and the Sands Casino as examples of destructive but limited-scope Iranian cyber operations.
Russia Could Amplify Iran's Operations
- Russia could bolster Iran's cyber and intelligence reach, making Iranian operations more capable.
- Shane Harris highlights historical Russian‑Iranian intelligence sharing and existing tech/drone exchanges as enabling cooperation now.

