12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

60 5. CYBER ATTACK AGAINST INTERNAL DISSIDENTSpurposes. Groups such as the ICA, the <strong>Cyber</strong> Fighters, or the Cutting Sword could also possiblytarget organizations such as the Green Movement for purposes of information theft. Theuse of DNS hijacking could clearly sever this purpose: dissidents attempting <strong>to</strong> log on <strong>to</strong> theirgroup’s home page may receive a malware payload as a result of this technique. The malwarecan then reside on their system, sending information on the users back <strong>to</strong> the hackers (as weshall see in similar events occurring in China in Chapter 7) or even disabling the systems as inthe Aramco attack.The Iranian <strong>Cyber</strong> PoliceBy mid-2010, the Ahmadinejad regime apparently felt a desperate need <strong>to</strong> showcase thenation’s cyber prowess. Not only had they experienced negative repercussions from dissidents’use of Twitter following the 2009 elections, but in June 2010, the Stuxnet worm becameknown <strong>to</strong> the general public based on a security report by a small Belarusian firm known asVirusBlockAda. 135 We will discuss Stuxnet more in detail later in the book (Chapter 13), butthe political effect within the Iranian regime was very significant. In early 2011, the Iraniangovernment announced the creation of a “<strong>Cyber</strong> Police” that will handle “Internet crimes.”According <strong>to</strong> Iranian Police Chief Esmaeil Ahmadi Moghaddam, the “Internet crimes” inquestion include the use of cyberspace for “espionage and riots”—perhaps a reference <strong>to</strong>Stuxnet and the 2009 postelection protests. Further, he stated that the <strong>Cyber</strong> Police would specificallyfocus on dissident groups. 136 The <strong>Cyber</strong> Police has already been active—making afew headlines in 2012. Specifically, they arrested several Iranian Facebook users from a groupcalled “Daaf and Paaf” that had organized an online beauty contest on Facebook. The chief ofthe <strong>Cyber</strong> Police, Kamal Hadian, stated that the group was spreading corruption and immorality.137 More recently, the <strong>Cyber</strong> Police announced that they plan <strong>to</strong> start blocking the illegaluse of Virtual Private Networks (VPNs) within Iran. 138 Likely this is because VPNs can allowusers <strong>to</strong> access Web sites outside of the Iranian Internet—avoiding filtered and blockedcontent. VPN would also prevent the Iranian government from examining the conten<strong>to</strong>f the communications of an Iranian user with the rest of the world. In another current development,there are reports that the Iranian government intends <strong>to</strong> create a “Halal Internet”that imposes what has been termed as an “Electronic Curtain” of moni<strong>to</strong>ring and restrictionon Iranian Internet traffic. 139The use of social media in the wake of the 2009 Iranian presidential elections, as well as thediscovery of Stuxnet led the Iranian government <strong>to</strong> accelerate and strengthen its cyber efforts.The ICA, with possible connections <strong>to</strong> the IRGC, has launched several high-profile attacksand at the same time seems <strong>to</strong> be establishing a sizable botnet. The <strong>Cyber</strong> Police, on the otherhand, appears <strong>to</strong> be cracking down on the internal use of the Internet in Iran. In one way, theICA can be viewed as an offensive asset and the <strong>Cyber</strong> Police as a defensive one.Both the ICA and <strong>Cyber</strong> Police are relatively new, and it is feasible we will read more aboutthem in the near future. Another harrowing possibility includes the collaboration of thetwo bodies: the intelligence gathered by the ICA by breaking in<strong>to</strong> dissident systems couldbe transmitted <strong>to</strong> the <strong>Cyber</strong> Police, which would proceed <strong>to</strong> arrest the identified dissident.Further, it is certainly possible that these organizations (or others like them) may also startworking with tech-savvy Iranian proxies, such as Hezbollah (discussed in Chapter 4) andKata’ib Hezbollah (discussed in Chapter 9).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!