Hackers find ways of controlling hardware and software through releasing malicious computer viruses, and likewise governments use ‘soft and hard means’ to quell internal dissident voices of those who choose to speak out against them. This is the hard-line taken by the Iranian regime in light of a zero-day cyber attack, in 2005, which reportedly caused one-fifth of the regime’s nuclear centrifuges to fail at its main enrichment facility. Hitting harder the Iranian regime exploited this event with break-out retaliation that was fast and sudden. In an intelligence report published on the National Council of Resistance of Iran’s (NCRI’s) website (April 2016) it reveals a rhetoric wrapped up in the language of ‘soft’ and ‘hard’ means, and getting to the point translates into increased arbitrary censorship laws and at-will illicit laws to make arrests. Plus a platform for ramping-up levels of cyber espionage and sabotage ‘within Iran’ and to ‘strik[e] at “enemies” abroad’. The main Iranian opposition group People’s Mojahedin Organization of Iran (PMOI or Mujahedin-e Khalq, MEK) gathered this intelligence, of which cited in section 1.2, 2010 is posited as the moment that the Islamic Revolutionary Guard Corps (IRGC) commander Majid Sadeqian, met and calculated that the 2005 zero-day […]
The post A real threat on our internet liberties “The face of Tehran’s cyber warfare” appeared first on National Cyber Security.
View full post on National Cyber Security