SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
INSS Insight No. 375, October 15, 2012 
Iran's Cyber Warfare
Gabi Siboni and Kronenfeld

The recent statement by US Secretary of Defense Leon Panetta about the need to confront
Iranian cyber warfare waged against American targets highlights developments of the last
two years regarding Iran's extended activity to construct defensive and offensive cyber
capabilities. Apparently underway is a large cyber campaign by Iran, both to attack
various targets in retaliation for the sanctions imposed against it and to repel the cyber
attacks directed at it.
Iran is working to develop and implement a strategy to operate in cyberspace. The
approach by Supreme Leader Khamenei to opportunities and risks inherent in cyberspace,
reflected in his March 2012 announcement on the establishment of the Supreme Cyber
Council, shows how central the issue is in Iran. Defensively, Iran is working to realize
two main goals: first, to create a "technological envelope" that will protect critical
infrastructures and sensitive information against cyberspace attacks such as the Stuxnet
virus, which damaged the Iranian uranium enrichment program, and second, to stop and
foil cyberspace activity by opposition elements and opponents to the regime, for whom
cyberspace is a key platform for communicating, distributing information, and organizing
anti-regime activities. The Iranian program to create a separate, independent
communications network is particularly important in this context.
Offensively, the cyberspace strategy is part of the doctrine of asymmetrical warfare, a
central principle in the Iranian concept of the use of force. Cyberspace warfare, like other
classical asymmetrical tactics such as terrorism and guerilla warfare, is viewed by Iran as
an effective tool to inflict serious damage on an enemy with military and technological
superiority. In a case of escalation between Iran and the West, Iran will likely aim to
                                                            
Dr. Gabi Siboni is the head of the Cyber Warfare Program at INSS. Sami Kronenfeld is an intern
in the program. This essay is shortened version of a forthcoming article on Iran’s cyberspace
capabilities, to be published in the December issue of Military and Strategic Affairs.
 
INSS Insight No. 375   

 

 

 

 

 

 

 

 

 

 

 

Iran's Cyber Warfare 

 

launch a cyber attack against critical infrastructures in the United States and its allies,
including energy infrastructures, financial institutions, transportation systems, and others.
In order to realize the goals of its strategy, Iran has allocated about $1 billion to develop
and acquire technology and recruit and train experts. The country has an extensive
network of educational and academic research institutions dealing with information
technology, computer engineering, electronic engineering, and math. In addition, the
government operates its own institute – the Iran Telecommunications Research Center,
the research and professional branch of the Information and Communications Ministry.
The institute trains and operates advanced research teams in various fields, including
information security. Another government body is the Technology Cooperation Officer,
which belongs to the president’s bureau, and initiates information technology research
projects. This body has been identified by the European Union and others in the West as
involved in the Iranian nuclear program.
The Iranian cyberspace system comprises a large number of cyber organizations,
formally related to various establishment institutions and involved in numerous fields.
One central organization with a primarily defensive orientation is the Cyber Defense
Command, operating under Iran’s Passive Defensive Organization, affiliated with the
General Staff of the Armed Forces. Alongside military personnel, this cyberspace
organization includes representatives of government ministries, such as the ministries of
communications, defense, intelligence, and industry, and its main goal is to develop a
defensive doctrine against cyberspace threats. Another cyberspace body of a defensive
nature is the MAHER Information Security Center, operating under the aegis of the
communications and information technology ministry. The center is in charge of
operating rapid response teams in case of emergencies and cyber attacks. Iran also has a
Committee for Identifying Unauthorized Sites and FETA, the police cyberspace unit,
which in addition to dealing with internet crime also monitors and controls Iranian
internet usage, with emphasis on internet cafés throughout the country that allow
relatively anonymous web surfing.
The picture is less clear regarding Iran’s offensive cyberspace capabilities. Clearly the
capabilities of the Revolutionary Guards make Iran one of the most advanced nations in
the field of cyberspace warfare, with capabilities, inter alia, to install malicious code in
counterfeit computer software, develop capabilities to block computer communications
networks, develop viruses and tools for penetrating computers to gather intelligence, and
develop tools with delayed action mechanisms or mechanisms connected to control
servers. There is also evidence of links between the Revolutionary Guards and hacker
groups in Iran and abroad that operate against the enemies of the regime at home and
around the world. The use of outsourcing allows the Revolutionary Guards and Iran to
maintain distance and deniability about Iran’s involvement in cyberspace warfare and
 

2
INSS Insight No. 375   

 

 

 

 

 

 

 

 

 

 

 

Iran's Cyber Warfare 

 

cyber crime. A prominent hacker group linked to the Revolutionary Guards is the
Ashiyane Digital Security Team, whose members are motivated by an ideology
supporting the Iranian regime and the Islamic Revolution and who target the enemies of
the regime for attack. The Basij, subordinate to the Revolutionary Guards, also became
active in cyberspace when in 2010 established the Basij Cyberspace Council. The
activities of the Basij focus primarily on creating pro-Iranian propaganda in cyberspace,
and the organization works on developing more advanced cyberspace capabilities and
using Revolutionary Guards cyberspace operatives to train hackers in high offensive
capabilities.
Iran is already active offensively, as evidenced by several events in recent years. In 2011
there were two attacks on companies providing security permissions; most prominent was
the attack from June to August 2011 on DigiNotar in the Netherlands, whose databases –
the major source of SSL permissions in Holland – were attacked. During those months,
certificates for authenticating websites, including the certificate authenticating the
google.com domain, were stolen; the latter item allowed attackers to pose as Google and
redirect Gmail servers. In fact, the attack allowed Iran to penetrate more than 300,000
computers, primarily in Iran, and seems to have been designed to monitor users at home
for internal security purposes.
In September 2012, a number of financial institutions in the United States came under
attack, including sites belonging to the Bank of America, Morgan Chase, and CitiGroup.
According to American analysts, the most destructive attack occurred in August 2012 on
the computers of the Saudi Arabian oil company Aramco and the Qatari gas company
RasGas. The attack was carried out by means of a computer virus called Shamoo, which
spread through company servers and destroyed information stored in them. A group
called the Cutting Sword of Justice took responsibility for the attack and claimed it was
aimed at the main source of income of Saudi Arabia, which was accused of committing
crimes in Syria and Bahrain.
The development of Iran’s cyberspace capabilities and the most recent attacks should
concern the United States as well as Israel. The success of the attack on Aramco
computers is of concern because the standard defensive systems proved insufficient
against the focused and anonymous attacks. It is therefore necessary to develop tools that
can deal with such threats. One of the directions being developed involves identification,
blocking, and neutralization of unusual behavior in computers under attack. Such tools
could neutralize threats even after the malicious code managed to penetrate the targeted
computer. The attack on Aramco was designed more to destroy information
indiscriminately in tens of thousands of company computers and less (if at all) to gather
intelligence. If intelligence gathering in cyberspace can be considered legitimate in some
cases, a large scale attack such as the one by Iran against a civilian target marks a
 

3
INSS Insight No. 375   

 

 

 

 

 

 

 

 

 

 

 

Iran's Cyber Warfare 

 

transition by Iran to retaliatory action. Secretary Panetta’s recent statement on the need to
close accounts with those responsible for this attack demonstrates this, but what
ultimately counts is the test of action and not of words.
The focus of Iran’s cyberspace activity directed against Israel and other countries in the
West requires appropriate defensive arrangements, beginning with an up-to-date doctrine
of cyberspace defense. The attackers’ sophistication requires intelligence-based defenses
as well as the generic ones. In light of developments in Iran, the State of Israel must place
the issue of Iranian cyberspace activity among its highest intelligence priorities, in order
to identify advance preparations and foil attacks before they are underway. Similar to the
Iranian nuclear program, the challenge is not Israel's alone, rather that of many other
states in the West as well as the Gulf states. It is therefore necessary to initiate broad
interstate cooperation to gather intelligence and foil Iranian cyber activity.

 

4

Weitere ähnliche Inhalte

Was ist angesagt?

An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...IOSR Journals
 
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAdvanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAvinash Sinha
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsOPSWAT
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsPaul Parke
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Mehrdad Jingoism
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_clubAntz911
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsIRJET Journal
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsHappiest Minds Technologies
 

Was ist angesagt? (17)

An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAdvanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_club
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 

Ähnlich wie 375

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Kevin Fream
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxjmiham
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxtumainjoseph
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxtumainjoseph
 
T CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxT CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxtumainjoseph
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
Cybersecurity for everyone - Course Final Project.pdf
Cybersecurity for everyone - Course Final Project.pdfCybersecurity for everyone - Course Final Project.pdf
Cybersecurity for everyone - Course Final Project.pdfkahehif874
 

Ähnlich wie 375 (20)

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
C018131821
C018131821C018131821
C018131821
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptx
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptx
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptx
 
T CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxT CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptx
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
Cybersecurity for everyone - Course Final Project.pdf
Cybersecurity for everyone - Course Final Project.pdfCybersecurity for everyone - Course Final Project.pdf
Cybersecurity for everyone - Course Final Project.pdf
 

Mehr von Waqas Amir

Pakistan’s ISI Plans for surveillance
Pakistan’s ISI Plans for surveillancePakistan’s ISI Plans for surveillance
Pakistan’s ISI Plans for surveillanceWaqas Amir
 
Unpatched Security Flaws Openly Solicited by US Navy
Unpatched Security Flaws Openly Solicited by US NavyUnpatched Security Flaws Openly Solicited by US Navy
Unpatched Security Flaws Openly Solicited by US NavyWaqas Amir
 
Government resources
Government resourcesGovernment resources
Government resourcesWaqas Amir
 
Police can Grab cell phone records without Warrant, Rules Court
Police can Grab cell phone records without Warrant, Rules CourtPolice can Grab cell phone records without Warrant, Rules Court
Police can Grab cell phone records without Warrant, Rules CourtWaqas Amir
 
Boeing 787s can lose control while flying due to Software bug: Report
Boeing 787s can lose control while flying due to Software bug: ReportBoeing 787s can lose control while flying due to Software bug: Report
Boeing 787s can lose control while flying due to Software bug: ReportWaqas Amir
 
Big brother-exposed-r2 k-handbook-on-surveillance-web
Big brother-exposed-r2 k-handbook-on-surveillance-webBig brother-exposed-r2 k-handbook-on-surveillance-web
Big brother-exposed-r2 k-handbook-on-surveillance-webWaqas Amir
 
Reserchers show how medical robots can be hacked during surgery
Reserchers show how medical robots can be hacked during surgeryReserchers show how medical robots can be hacked during surgery
Reserchers show how medical robots can be hacked during surgeryWaqas Amir
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Waqas Amir
 
Woman suing google for losing “thousands” due to google play store hack
Woman suing google for losing “thousands” due to google play store hackWoman suing google for losing “thousands” due to google play store hack
Woman suing google for losing “thousands” due to google play store hackWaqas Amir
 
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agencyUs in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agencyWaqas Amir
 
Child Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: ReportChild Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: ReportWaqas Amir
 
Sherman testimony
Sherman testimonySherman testimony
Sherman testimonyWaqas Amir
 
Android App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsAndroid App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsWaqas Amir
 
Facebook's revised policies_and_terms_v1.2
Facebook's revised policies_and_terms_v1.2Facebook's revised policies_and_terms_v1.2
Facebook's revised policies_and_terms_v1.2Waqas Amir
 
Adiós gps darpa working on alternative position tracking technology
Adiós gps darpa working on alternative position tracking technologyAdiós gps darpa working on alternative position tracking technology
Adiós gps darpa working on alternative position tracking technologyWaqas Amir
 
Study reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesStudy reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesWaqas Amir
 
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY Court
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY CourtStingray Mobile Phone Surveillance Details to be unveiled.. Orders NY Court
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY CourtWaqas Amir
 
FBI Admits Using Stingray Devices to Disrupt Phone Service.
FBI Admits Using Stingray Devices to Disrupt Phone Service.FBI Admits Using Stingray Devices to Disrupt Phone Service.
FBI Admits Using Stingray Devices to Disrupt Phone Service.Waqas Amir
 
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...Waqas Amir
 
Nsa hiding undetectable spyware in hard drives worldwide
Nsa hiding undetectable spyware in hard drives worldwideNsa hiding undetectable spyware in hard drives worldwide
Nsa hiding undetectable spyware in hard drives worldwideWaqas Amir
 

Mehr von Waqas Amir (20)

Pakistan’s ISI Plans for surveillance
Pakistan’s ISI Plans for surveillancePakistan’s ISI Plans for surveillance
Pakistan’s ISI Plans for surveillance
 
Unpatched Security Flaws Openly Solicited by US Navy
Unpatched Security Flaws Openly Solicited by US NavyUnpatched Security Flaws Openly Solicited by US Navy
Unpatched Security Flaws Openly Solicited by US Navy
 
Government resources
Government resourcesGovernment resources
Government resources
 
Police can Grab cell phone records without Warrant, Rules Court
Police can Grab cell phone records without Warrant, Rules CourtPolice can Grab cell phone records without Warrant, Rules Court
Police can Grab cell phone records without Warrant, Rules Court
 
Boeing 787s can lose control while flying due to Software bug: Report
Boeing 787s can lose control while flying due to Software bug: ReportBoeing 787s can lose control while flying due to Software bug: Report
Boeing 787s can lose control while flying due to Software bug: Report
 
Big brother-exposed-r2 k-handbook-on-surveillance-web
Big brother-exposed-r2 k-handbook-on-surveillance-webBig brother-exposed-r2 k-handbook-on-surveillance-web
Big brother-exposed-r2 k-handbook-on-surveillance-web
 
Reserchers show how medical robots can be hacked during surgery
Reserchers show how medical robots can be hacked during surgeryReserchers show how medical robots can be hacked during surgery
Reserchers show how medical robots can be hacked during surgery
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Woman suing google for losing “thousands” due to google play store hack
Woman suing google for losing “thousands” due to google play store hackWoman suing google for losing “thousands” due to google play store hack
Woman suing google for losing “thousands” due to google play store hack
 
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agencyUs in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
 
Child Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: ReportChild Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: Report
 
Sherman testimony
Sherman testimonySherman testimony
Sherman testimony
 
Android App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsAndroid App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion Campaigns
 
Facebook's revised policies_and_terms_v1.2
Facebook's revised policies_and_terms_v1.2Facebook's revised policies_and_terms_v1.2
Facebook's revised policies_and_terms_v1.2
 
Adiós gps darpa working on alternative position tracking technology
Adiós gps darpa working on alternative position tracking technologyAdiós gps darpa working on alternative position tracking technology
Adiós gps darpa working on alternative position tracking technology
 
Study reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesStudy reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutes
 
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY Court
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY CourtStingray Mobile Phone Surveillance Details to be unveiled.. Orders NY Court
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY Court
 
FBI Admits Using Stingray Devices to Disrupt Phone Service.
FBI Admits Using Stingray Devices to Disrupt Phone Service.FBI Admits Using Stingray Devices to Disrupt Phone Service.
FBI Admits Using Stingray Devices to Disrupt Phone Service.
 
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...
 
Nsa hiding undetectable spyware in hard drives worldwide
Nsa hiding undetectable spyware in hard drives worldwideNsa hiding undetectable spyware in hard drives worldwide
Nsa hiding undetectable spyware in hard drives worldwide
 

Kürzlich hochgeladen

Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreiebhavenpr
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.pptsammehtumblr
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackPsychicRuben LoveSpells
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkobhavenpr
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docxkfjstone13
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Developmentnarsireddynannuri1
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Tableget joys
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 

Kürzlich hochgeladen (20)

Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 

375

  • 1. INSS Insight No. 375, October 15, 2012  Iran's Cyber Warfare Gabi Siboni and Kronenfeld The recent statement by US Secretary of Defense Leon Panetta about the need to confront Iranian cyber warfare waged against American targets highlights developments of the last two years regarding Iran's extended activity to construct defensive and offensive cyber capabilities. Apparently underway is a large cyber campaign by Iran, both to attack various targets in retaliation for the sanctions imposed against it and to repel the cyber attacks directed at it. Iran is working to develop and implement a strategy to operate in cyberspace. The approach by Supreme Leader Khamenei to opportunities and risks inherent in cyberspace, reflected in his March 2012 announcement on the establishment of the Supreme Cyber Council, shows how central the issue is in Iran. Defensively, Iran is working to realize two main goals: first, to create a "technological envelope" that will protect critical infrastructures and sensitive information against cyberspace attacks such as the Stuxnet virus, which damaged the Iranian uranium enrichment program, and second, to stop and foil cyberspace activity by opposition elements and opponents to the regime, for whom cyberspace is a key platform for communicating, distributing information, and organizing anti-regime activities. The Iranian program to create a separate, independent communications network is particularly important in this context. Offensively, the cyberspace strategy is part of the doctrine of asymmetrical warfare, a central principle in the Iranian concept of the use of force. Cyberspace warfare, like other classical asymmetrical tactics such as terrorism and guerilla warfare, is viewed by Iran as an effective tool to inflict serious damage on an enemy with military and technological superiority. In a case of escalation between Iran and the West, Iran will likely aim to                                                              Dr. Gabi Siboni is the head of the Cyber Warfare Program at INSS. Sami Kronenfeld is an intern in the program. This essay is shortened version of a forthcoming article on Iran’s cyberspace capabilities, to be published in the December issue of Military and Strategic Affairs.  
  • 2. INSS Insight No. 375                          Iran's Cyber Warfare    launch a cyber attack against critical infrastructures in the United States and its allies, including energy infrastructures, financial institutions, transportation systems, and others. In order to realize the goals of its strategy, Iran has allocated about $1 billion to develop and acquire technology and recruit and train experts. The country has an extensive network of educational and academic research institutions dealing with information technology, computer engineering, electronic engineering, and math. In addition, the government operates its own institute – the Iran Telecommunications Research Center, the research and professional branch of the Information and Communications Ministry. The institute trains and operates advanced research teams in various fields, including information security. Another government body is the Technology Cooperation Officer, which belongs to the president’s bureau, and initiates information technology research projects. This body has been identified by the European Union and others in the West as involved in the Iranian nuclear program. The Iranian cyberspace system comprises a large number of cyber organizations, formally related to various establishment institutions and involved in numerous fields. One central organization with a primarily defensive orientation is the Cyber Defense Command, operating under Iran’s Passive Defensive Organization, affiliated with the General Staff of the Armed Forces. Alongside military personnel, this cyberspace organization includes representatives of government ministries, such as the ministries of communications, defense, intelligence, and industry, and its main goal is to develop a defensive doctrine against cyberspace threats. Another cyberspace body of a defensive nature is the MAHER Information Security Center, operating under the aegis of the communications and information technology ministry. The center is in charge of operating rapid response teams in case of emergencies and cyber attacks. Iran also has a Committee for Identifying Unauthorized Sites and FETA, the police cyberspace unit, which in addition to dealing with internet crime also monitors and controls Iranian internet usage, with emphasis on internet cafés throughout the country that allow relatively anonymous web surfing. The picture is less clear regarding Iran’s offensive cyberspace capabilities. Clearly the capabilities of the Revolutionary Guards make Iran one of the most advanced nations in the field of cyberspace warfare, with capabilities, inter alia, to install malicious code in counterfeit computer software, develop capabilities to block computer communications networks, develop viruses and tools for penetrating computers to gather intelligence, and develop tools with delayed action mechanisms or mechanisms connected to control servers. There is also evidence of links between the Revolutionary Guards and hacker groups in Iran and abroad that operate against the enemies of the regime at home and around the world. The use of outsourcing allows the Revolutionary Guards and Iran to maintain distance and deniability about Iran’s involvement in cyberspace warfare and   2
  • 3. INSS Insight No. 375                          Iran's Cyber Warfare    cyber crime. A prominent hacker group linked to the Revolutionary Guards is the Ashiyane Digital Security Team, whose members are motivated by an ideology supporting the Iranian regime and the Islamic Revolution and who target the enemies of the regime for attack. The Basij, subordinate to the Revolutionary Guards, also became active in cyberspace when in 2010 established the Basij Cyberspace Council. The activities of the Basij focus primarily on creating pro-Iranian propaganda in cyberspace, and the organization works on developing more advanced cyberspace capabilities and using Revolutionary Guards cyberspace operatives to train hackers in high offensive capabilities. Iran is already active offensively, as evidenced by several events in recent years. In 2011 there were two attacks on companies providing security permissions; most prominent was the attack from June to August 2011 on DigiNotar in the Netherlands, whose databases – the major source of SSL permissions in Holland – were attacked. During those months, certificates for authenticating websites, including the certificate authenticating the google.com domain, were stolen; the latter item allowed attackers to pose as Google and redirect Gmail servers. In fact, the attack allowed Iran to penetrate more than 300,000 computers, primarily in Iran, and seems to have been designed to monitor users at home for internal security purposes. In September 2012, a number of financial institutions in the United States came under attack, including sites belonging to the Bank of America, Morgan Chase, and CitiGroup. According to American analysts, the most destructive attack occurred in August 2012 on the computers of the Saudi Arabian oil company Aramco and the Qatari gas company RasGas. The attack was carried out by means of a computer virus called Shamoo, which spread through company servers and destroyed information stored in them. A group called the Cutting Sword of Justice took responsibility for the attack and claimed it was aimed at the main source of income of Saudi Arabia, which was accused of committing crimes in Syria and Bahrain. The development of Iran’s cyberspace capabilities and the most recent attacks should concern the United States as well as Israel. The success of the attack on Aramco computers is of concern because the standard defensive systems proved insufficient against the focused and anonymous attacks. It is therefore necessary to develop tools that can deal with such threats. One of the directions being developed involves identification, blocking, and neutralization of unusual behavior in computers under attack. Such tools could neutralize threats even after the malicious code managed to penetrate the targeted computer. The attack on Aramco was designed more to destroy information indiscriminately in tens of thousands of company computers and less (if at all) to gather intelligence. If intelligence gathering in cyberspace can be considered legitimate in some cases, a large scale attack such as the one by Iran against a civilian target marks a   3
  • 4. INSS Insight No. 375                          Iran's Cyber Warfare    transition by Iran to retaliatory action. Secretary Panetta’s recent statement on the need to close accounts with those responsible for this attack demonstrates this, but what ultimately counts is the test of action and not of words. The focus of Iran’s cyberspace activity directed against Israel and other countries in the West requires appropriate defensive arrangements, beginning with an up-to-date doctrine of cyberspace defense. The attackers’ sophistication requires intelligence-based defenses as well as the generic ones. In light of developments in Iran, the State of Israel must place the issue of Iranian cyberspace activity among its highest intelligence priorities, in order to identify advance preparations and foil attacks before they are underway. Similar to the Iranian nuclear program, the challenge is not Israel's alone, rather that of many other states in the West as well as the Gulf states. It is therefore necessary to initiate broad interstate cooperation to gather intelligence and foil Iranian cyber activity.   4