- Iran: Eight Prisoners Hanged on Drug Charges
- Daughter of late Iranian president jailed for ‘spreading lies’ - IRAN: Annual report on the death penalty 2016 - Taheri Facing the Death Penalty Again - Dedicated team seeking return of missing agent in Iran - Iran Arrests 2, Seizes Bibles During Catholic Crackdown
- Trump to welcome Netanyahu as Palestinians fear U.S. shift
- Details of Iran nuclear deal still secret as US-Tehran relations unravel - Will Trump's Next Iran Sanctions Target China's Banks? - Don’t ‘tear up’ the Iran deal. Let it fail on its own. - Iran Has Changed, But For The Worse - Iran nuclear deal ‘on life support,’ Priebus says
- Female Activist Criticizes Rouhani’s Failure to Protect Citizens
- Iran’s 1st female bodybuilder tells her story - Iranian lady becomes a Dollar Millionaire on Valentine’s Day - Two women arrested after being filmed riding motorbike in Iran - 43,000 Cases of Child Marriage in Iran - Woman Investigating Clinton Foundation Child Trafficking KILLED!
- Senior Senators, ex-US officials urge firm policy on Iran
- In backing Syria's Assad, Russia looks to outdo Iran - Six out of 10 People in France ‘Don’t Feel Safe Anywhere’ - The liberal narrative is in denial about Iran - Netanyahu urges Putin to block Iranian power corridor - Iran Poses ‘Greatest Long Term Threat’ To Mid-East Security |
Friday 02 January 2015Sony hack gives cover to Iran
In the wake of the hacking of Sony, all eyes are now on North Korea’s disruptive online capabilities. But the cyberwarfare potential of another rogue state — Iran — is also growing, and it could soon constitute a major threat to the United States and its allies. That’s the conclusion of a new report chronicling the past two years of Iranian activity in cyberspace. “Since at least 2012, Iranian actors have directly attacked, established persistence in, and extracted highly sensitive materials from the networks of government agencies and major critical infrastructure companies in the following countries: Canada, China, England, France, Germany, India, Israel, Kuwait, Mexico, Pakistan, Qatar, Saudi Arabia, South Korea, Turkey, United Arab Emirates and the United States,” notes the 86-page study, issued by California-based cybersecurity firm Cylance earlier this month. The cause for Iran’s activism can be traced back to 2009-10, when the Stuxnet cyberworm temporarily wreaked havoc on its uranium enrichment capabilities. That bit of malware — commonly attributed to Israel and the U.S. — was followed by others, including the software script Stars, the cyberespionage program Duqu, and Flame, a virus reportedly designed to map Iran’s nuclear network. In all, Iran’s nuclear program has been attacked no fewer than six times over the past half-decade. As a result, Iran’s leaders have concluded — with considerable merit — that their regime has become the target of a sustained campaign of virtual subversion by the West. And they have responded in kind. Over the past two years, a number of significant cyber incidents have been tied to Iran in one way or another. These include a major hacking campaign against Saudi Aramco oil company in 2012, attacks on U.S. banks and financial institutions in 2012 and 2013, repeated attacks on Israeli infrastructure targets last year, and — most recently — the penetration last year of the U.S. Navy’s unclassified networks. All of these, the Cylance study concludes, are part of a systematic campaign by Iranian hackers to target critical infrastructure around the world. The scope of the effort mapped out by Cylance is breathtaking. It includes, among other targets, oil and gas firms in France, Kuwait, Qatar and Turkey; aviation hubs in Pakistan and South Korea; energy and utilities companies in Canada and the U.S.; and government agencies in Qatar, United Arab Emirates and America. Moreover, it might just be the tip of the iceberg. Iran’s cyber capabilities, the study points out, are evolving rapidly, and what has been identified might be just a fraction of the Islamic Republic’s online presence. The report concludes with a dire warning: “As Iran’s cyberwarfare capabilities continue to morph, the probability of an attack that could impact the physical world at a national or global level is rapidly increasing.” Government authorities appear to be taking this possibility seriously. The Cylance study has reportedly been distributed widely within the Department of Homeland Security, and the FBI recently issued a confidential guidance to U.S. firms that might become targets of Iranian cyberwarfare. The caution is undoubtedly warranted. Iran might be playing nice with the West at the moment. There has been a notable decrease in the frequency of cyber attacks on Western targets since the start of the current nuclear negotiations in November 2013. But if there is a breakdown of the talks, and a renewed imposition of sanctions against a recalcitrant Iranian regime, cyberwar could again be a distinct possibility. The Iranians, at least, seem to think so. In February, Iran’s supreme leader, Ayatollah Ali Khamenei, issued a special message to the country’s university students in which he urged them specifically to prepare for such a conflict with the West. The target, according to Khamenei, would be “the Dominance Power” — a common Iranian euphemism for the U.S. We should stand so instructed. Ilan Berman is vice president of the American Foreign Policy Council in Washington, D.C. |