Iran's leaders fight Internet; Internet wins (so far)
Being dependent on the Net means having to live with it
Computerworld - Iran's government in recent days has tried to cut off Internet access for most of its election protesters by shutting down routers at the nation's perimeters, ripping satellite dishes off roofs, cutting cables and turning off telephone switching networks.
Iran, in effect, has declared cyberwar on itself. And it doesn't appear to be winning the fight because of the resilience of a communications grid originally designed to be both resilient and pervasive. In fact, its actions may also be crippling banking systems and hindering commerce in what is a technologically advanced nation. Cutting off Internet access affects more than Web sites or Twitter and Facebook. Credit card and ATM systems could be affected, as could critical infrastructures.
One cybersecurity expert, Stephen Spoonamore, a partner at Global Strategic Partners LLC in Washington, pointed out that at about the same time Iran was trying shut down phone and switching systems this weekend -- a response to the huge crowds of citizens upset by what they see as a stolen presidential election -- electric power was lost in Tehran.
Was the power loss an intentional -- or a side effect? Spoonamore think it's the latter.
He said that once the Iranians began turning off switches to the nation's phone networks, IP-enabled pieces of its electric grid didn't get commands they expected. When you lose switching, "you end up with systems going down that you didn't expect to go down," he said.
What Iran is trying to do is a lot harder than running a cyberwar. In a war like Russia's attack on Georgia last year, the attacker can be indiscriminate and see any unanticipated results as a boon. But Iran is trying to "selectively eliminate connectivity," said Spoonamore -- something the Internet itself was designed and built to thwart.
Twitter users and bloggers, combined with infrequent media reports, have all detailed efforts by Iran to hinder communications in the apparent hopes of quashing protests. And while Iran can censor or block access to the domains it doesn't like, the Internet provides a way around selective blocking.
The most popular method for bypassing censorship is through the use of proxy servers, servers that sit between the point of origin and ultimate destination, which is often enough a service that has been blocked the government. The user connects to the proxy service and is rerouted and disguised.
Some users, particularly those worried about government repercussions, seek more sophisticated methods of protection. If you are an activist in Iran "you care very much that no one can figure out where your IP address is," said Andrew Lewman, executive director of the Dedham, Mass.-based nonprofit group, Tor Project Inc.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts