SlideShare a Scribd company logo
1 of 4
Download to read offline
INSS Insight No. 375, October 15, 2012 
Iran's Cyber Warfare
Gabi Siboni and Kronenfeld

The recent statement by US Secretary of Defense Leon Panetta about the need to confront
Iranian cyber warfare waged against American targets highlights developments of the last
two years regarding Iran's extended activity to construct defensive and offensive cyber
capabilities. Apparently underway is a large cyber campaign by Iran, both to attack
various targets in retaliation for the sanctions imposed against it and to repel the cyber
attacks directed at it.
Iran is working to develop and implement a strategy to operate in cyberspace. The
approach by Supreme Leader Khamenei to opportunities and risks inherent in cyberspace,
reflected in his March 2012 announcement on the establishment of the Supreme Cyber
Council, shows how central the issue is in Iran. Defensively, Iran is working to realize
two main goals: first, to create a "technological envelope" that will protect critical
infrastructures and sensitive information against cyberspace attacks such as the Stuxnet
virus, which damaged the Iranian uranium enrichment program, and second, to stop and
foil cyberspace activity by opposition elements and opponents to the regime, for whom
cyberspace is a key platform for communicating, distributing information, and organizing
anti-regime activities. The Iranian program to create a separate, independent
communications network is particularly important in this context.
Offensively, the cyberspace strategy is part of the doctrine of asymmetrical warfare, a
central principle in the Iranian concept of the use of force. Cyberspace warfare, like other
classical asymmetrical tactics such as terrorism and guerilla warfare, is viewed by Iran as
an effective tool to inflict serious damage on an enemy with military and technological
superiority. In a case of escalation between Iran and the West, Iran will likely aim to
                                                            
Dr. Gabi Siboni is the head of the Cyber Warfare Program at INSS. Sami Kronenfeld is an intern
in the program. This essay is shortened version of a forthcoming article on Iran’s cyberspace
capabilities, to be published in the December issue of Military and Strategic Affairs.
 
INSS Insight No. 375   

 

 

 

 

 

 

 

 

 

 

 

Iran's Cyber Warfare 

 

launch a cyber attack against critical infrastructures in the United States and its allies,
including energy infrastructures, financial institutions, transportation systems, and others.
In order to realize the goals of its strategy, Iran has allocated about $1 billion to develop
and acquire technology and recruit and train experts. The country has an extensive
network of educational and academic research institutions dealing with information
technology, computer engineering, electronic engineering, and math. In addition, the
government operates its own institute – the Iran Telecommunications Research Center,
the research and professional branch of the Information and Communications Ministry.
The institute trains and operates advanced research teams in various fields, including
information security. Another government body is the Technology Cooperation Officer,
which belongs to the president’s bureau, and initiates information technology research
projects. This body has been identified by the European Union and others in the West as
involved in the Iranian nuclear program.
The Iranian cyberspace system comprises a large number of cyber organizations,
formally related to various establishment institutions and involved in numerous fields.
One central organization with a primarily defensive orientation is the Cyber Defense
Command, operating under Iran’s Passive Defensive Organization, affiliated with the
General Staff of the Armed Forces. Alongside military personnel, this cyberspace
organization includes representatives of government ministries, such as the ministries of
communications, defense, intelligence, and industry, and its main goal is to develop a
defensive doctrine against cyberspace threats. Another cyberspace body of a defensive
nature is the MAHER Information Security Center, operating under the aegis of the
communications and information technology ministry. The center is in charge of
operating rapid response teams in case of emergencies and cyber attacks. Iran also has a
Committee for Identifying Unauthorized Sites and FETA, the police cyberspace unit,
which in addition to dealing with internet crime also monitors and controls Iranian
internet usage, with emphasis on internet cafés throughout the country that allow
relatively anonymous web surfing.
The picture is less clear regarding Iran’s offensive cyberspace capabilities. Clearly the
capabilities of the Revolutionary Guards make Iran one of the most advanced nations in
the field of cyberspace warfare, with capabilities, inter alia, to install malicious code in
counterfeit computer software, develop capabilities to block computer communications
networks, develop viruses and tools for penetrating computers to gather intelligence, and
develop tools with delayed action mechanisms or mechanisms connected to control
servers. There is also evidence of links between the Revolutionary Guards and hacker
groups in Iran and abroad that operate against the enemies of the regime at home and
around the world. The use of outsourcing allows the Revolutionary Guards and Iran to
maintain distance and deniability about Iran’s involvement in cyberspace warfare and
 

2
INSS Insight No. 375   

 

 

 

 

 

 

 

 

 

 

 

Iran's Cyber Warfare 

 

cyber crime. A prominent hacker group linked to the Revolutionary Guards is the
Ashiyane Digital Security Team, whose members are motivated by an ideology
supporting the Iranian regime and the Islamic Revolution and who target the enemies of
the regime for attack. The Basij, subordinate to the Revolutionary Guards, also became
active in cyberspace when in 2010 established the Basij Cyberspace Council. The
activities of the Basij focus primarily on creating pro-Iranian propaganda in cyberspace,
and the organization works on developing more advanced cyberspace capabilities and
using Revolutionary Guards cyberspace operatives to train hackers in high offensive
capabilities.
Iran is already active offensively, as evidenced by several events in recent years. In 2011
there were two attacks on companies providing security permissions; most prominent was
the attack from June to August 2011 on DigiNotar in the Netherlands, whose databases –
the major source of SSL permissions in Holland – were attacked. During those months,
certificates for authenticating websites, including the certificate authenticating the
google.com domain, were stolen; the latter item allowed attackers to pose as Google and
redirect Gmail servers. In fact, the attack allowed Iran to penetrate more than 300,000
computers, primarily in Iran, and seems to have been designed to monitor users at home
for internal security purposes.
In September 2012, a number of financial institutions in the United States came under
attack, including sites belonging to the Bank of America, Morgan Chase, and CitiGroup.
According to American analysts, the most destructive attack occurred in August 2012 on
the computers of the Saudi Arabian oil company Aramco and the Qatari gas company
RasGas. The attack was carried out by means of a computer virus called Shamoo, which
spread through company servers and destroyed information stored in them. A group
called the Cutting Sword of Justice took responsibility for the attack and claimed it was
aimed at the main source of income of Saudi Arabia, which was accused of committing
crimes in Syria and Bahrain.
The development of Iran’s cyberspace capabilities and the most recent attacks should
concern the United States as well as Israel. The success of the attack on Aramco
computers is of concern because the standard defensive systems proved insufficient
against the focused and anonymous attacks. It is therefore necessary to develop tools that
can deal with such threats. One of the directions being developed involves identification,
blocking, and neutralization of unusual behavior in computers under attack. Such tools
could neutralize threats even after the malicious code managed to penetrate the targeted
computer. The attack on Aramco was designed more to destroy information
indiscriminately in tens of thousands of company computers and less (if at all) to gather
intelligence. If intelligence gathering in cyberspace can be considered legitimate in some
cases, a large scale attack such as the one by Iran against a civilian target marks a
 

3
INSS Insight No. 375   

 

 

 

 

 

 

 

 

 

 

 

Iran's Cyber Warfare 

 

transition by Iran to retaliatory action. Secretary Panetta’s recent statement on the need to
close accounts with those responsible for this attack demonstrates this, but what
ultimately counts is the test of action and not of words.
The focus of Iran’s cyberspace activity directed against Israel and other countries in the
West requires appropriate defensive arrangements, beginning with an up-to-date doctrine
of cyberspace defense. The attackers’ sophistication requires intelligence-based defenses
as well as the generic ones. In light of developments in Iran, the State of Israel must place
the issue of Iranian cyberspace activity among its highest intelligence priorities, in order
to identify advance preparations and foil attacks before they are underway. Similar to the
Iranian nuclear program, the challenge is not Israel's alone, rather that of many other
states in the West as well as the Gulf states. It is therefore necessary to initiate broad
interstate cooperation to gather intelligence and foil Iranian cyber activity.

 

4

More Related Content

What's hot

Criminal Law 1 - Punishment and Illegal Omission
Criminal Law 1 - Punishment and Illegal OmissionCriminal Law 1 - Punishment and Illegal Omission
Criminal Law 1 - Punishment and Illegal OmissionIrwan John Imbayan
 
Penaklukan constantinople (TITAS UKM)
Penaklukan constantinople (TITAS UKM)Penaklukan constantinople (TITAS UKM)
Penaklukan constantinople (TITAS UKM)Wan Norshafika
 
Karangan usaha-usaha-meningkatkan-pelancongan
Karangan usaha-usaha-meningkatkan-pelanconganKarangan usaha-usaha-meningkatkan-pelancongan
Karangan usaha-usaha-meningkatkan-pelanconganIzzati_Wahab
 
[SKI] PERADABAN BANGSA ARAB SEBELUM ISLAM
[SKI] PERADABAN BANGSA ARAB SEBELUM ISLAM[SKI] PERADABAN BANGSA ARAB SEBELUM ISLAM
[SKI] PERADABAN BANGSA ARAB SEBELUM ISLAMEM Nasrul
 
Faedah menyertai aktiviti kokurikulum kepada para pelajar
Faedah menyertai aktiviti kokurikulum kepada para pelajarFaedah menyertai aktiviti kokurikulum kepada para pelajar
Faedah menyertai aktiviti kokurikulum kepada para pelajarzeknasir
 
5 exceptions provided under Section 300 of Penal Code
5 exceptions provided under Section 300 of Penal Code5 exceptions provided under Section 300 of Penal Code
5 exceptions provided under Section 300 of Penal CodeNoorul Adibah Rosli
 
TILAWAH AL-QURAN: SUNNATULLAH
TILAWAH AL-QURAN: SUNNATULLAHTILAWAH AL-QURAN: SUNNATULLAH
TILAWAH AL-QURAN: SUNNATULLAHsitinorhidayah456
 
Ll1 slides revision
Ll1 slides revisionLl1 slides revision
Ll1 slides revisionxareejx
 
Poligami menurut hukum islam dan hukum positif
Poligami menurut hukum islam dan hukum positifPoligami menurut hukum islam dan hukum positif
Poligami menurut hukum islam dan hukum positifRizki Gumilar
 
Muhammad Hilman v Kerajaan Malaysia
Muhammad Hilman v Kerajaan MalaysiaMuhammad Hilman v Kerajaan Malaysia
Muhammad Hilman v Kerajaan Malaysiasurrenderyourthrone
 
UKM Law - Past Year Questions (Various Subjects)
UKM Law - Past Year Questions (Various Subjects)UKM Law - Past Year Questions (Various Subjects)
UKM Law - Past Year Questions (Various Subjects)surrenderyourthrone
 
AQAD / KONTRAK DALAM PERNIAGAAN ISLAM
AQAD / KONTRAK DALAM PERNIAGAAN ISLAMAQAD / KONTRAK DALAM PERNIAGAAN ISLAM
AQAD / KONTRAK DALAM PERNIAGAAN ISLAMFatzia Hijazu
 

What's hot (20)

Criminal Law 1 - Punishment and Illegal Omission
Criminal Law 1 - Punishment and Illegal OmissionCriminal Law 1 - Punishment and Illegal Omission
Criminal Law 1 - Punishment and Illegal Omission
 
Perkawinan campuran
Perkawinan campuranPerkawinan campuran
Perkawinan campuran
 
Penaklukan constantinople (TITAS UKM)
Penaklukan constantinople (TITAS UKM)Penaklukan constantinople (TITAS UKM)
Penaklukan constantinople (TITAS UKM)
 
Karangan usaha-usaha-meningkatkan-pelancongan
Karangan usaha-usaha-meningkatkan-pelanconganKarangan usaha-usaha-meningkatkan-pelancongan
Karangan usaha-usaha-meningkatkan-pelancongan
 
kata-kata motivasi
kata-kata motivasikata-kata motivasi
kata-kata motivasi
 
NOTA BM IB SL
NOTA BM IB SL NOTA BM IB SL
NOTA BM IB SL
 
[SKI] PERADABAN BANGSA ARAB SEBELUM ISLAM
[SKI] PERADABAN BANGSA ARAB SEBELUM ISLAM[SKI] PERADABAN BANGSA ARAB SEBELUM ISLAM
[SKI] PERADABAN BANGSA ARAB SEBELUM ISLAM
 
Faedah menyertai aktiviti kokurikulum kepada para pelajar
Faedah menyertai aktiviti kokurikulum kepada para pelajarFaedah menyertai aktiviti kokurikulum kepada para pelajar
Faedah menyertai aktiviti kokurikulum kepada para pelajar
 
5 exceptions provided under Section 300 of Penal Code
5 exceptions provided under Section 300 of Penal Code5 exceptions provided under Section 300 of Penal Code
5 exceptions provided under Section 300 of Penal Code
 
TILAWAH AL-QURAN: SUNNATULLAH
TILAWAH AL-QURAN: SUNNATULLAHTILAWAH AL-QURAN: SUNNATULLAH
TILAWAH AL-QURAN: SUNNATULLAH
 
Rapport Malaysia
Rapport MalaysiaRapport Malaysia
Rapport Malaysia
 
Ll1 slides revision
Ll1 slides revisionLl1 slides revision
Ll1 slides revision
 
Pengertian edo ram
Pengertian edo ramPengertian edo ram
Pengertian edo ram
 
Poligami menurut hukum islam dan hukum positif
Poligami menurut hukum islam dan hukum positifPoligami menurut hukum islam dan hukum positif
Poligami menurut hukum islam dan hukum positif
 
Adab menuntut ilmu
Adab menuntut ilmuAdab menuntut ilmu
Adab menuntut ilmu
 
Muhammad Hilman v Kerajaan Malaysia
Muhammad Hilman v Kerajaan MalaysiaMuhammad Hilman v Kerajaan Malaysia
Muhammad Hilman v Kerajaan Malaysia
 
Harta sepencarian
Harta sepencarianHarta sepencarian
Harta sepencarian
 
UKM Law - Past Year Questions (Various Subjects)
UKM Law - Past Year Questions (Various Subjects)UKM Law - Past Year Questions (Various Subjects)
UKM Law - Past Year Questions (Various Subjects)
 
Nikah & Mahar
Nikah & MaharNikah & Mahar
Nikah & Mahar
 
AQAD / KONTRAK DALAM PERNIAGAAN ISLAM
AQAD / KONTRAK DALAM PERNIAGAAN ISLAMAQAD / KONTRAK DALAM PERNIAGAAN ISLAM
AQAD / KONTRAK DALAM PERNIAGAAN ISLAM
 

Similar to INSS's Insight on Iran's cyber war skills

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Kevin Fream
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Mohamed N. El-Guindy
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxjmiham
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxtumainjoseph
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxtumainjoseph
 

Similar to INSS's Insight on Iran's cyber war skills (20)

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
C018131821
C018131821C018131821
C018131821
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptx
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptx
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptx
 

Recently uploaded

AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Axel Bruns
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaignanjanibaddipudi1
 
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCollege Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCall girls in Ahmedabad High profile
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
23042024_First India Newspaper Jaipur.pdf
23042024_First India Newspaper Jaipur.pdf23042024_First India Newspaper Jaipur.pdf
23042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 

Recently uploaded (20)

AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
 
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCollege Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
23042024_First India Newspaper Jaipur.pdf
23042024_First India Newspaper Jaipur.pdf23042024_First India Newspaper Jaipur.pdf
23042024_First India Newspaper Jaipur.pdf
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 

INSS's Insight on Iran's cyber war skills

  • 1. INSS Insight No. 375, October 15, 2012  Iran's Cyber Warfare Gabi Siboni and Kronenfeld The recent statement by US Secretary of Defense Leon Panetta about the need to confront Iranian cyber warfare waged against American targets highlights developments of the last two years regarding Iran's extended activity to construct defensive and offensive cyber capabilities. Apparently underway is a large cyber campaign by Iran, both to attack various targets in retaliation for the sanctions imposed against it and to repel the cyber attacks directed at it. Iran is working to develop and implement a strategy to operate in cyberspace. The approach by Supreme Leader Khamenei to opportunities and risks inherent in cyberspace, reflected in his March 2012 announcement on the establishment of the Supreme Cyber Council, shows how central the issue is in Iran. Defensively, Iran is working to realize two main goals: first, to create a "technological envelope" that will protect critical infrastructures and sensitive information against cyberspace attacks such as the Stuxnet virus, which damaged the Iranian uranium enrichment program, and second, to stop and foil cyberspace activity by opposition elements and opponents to the regime, for whom cyberspace is a key platform for communicating, distributing information, and organizing anti-regime activities. The Iranian program to create a separate, independent communications network is particularly important in this context. Offensively, the cyberspace strategy is part of the doctrine of asymmetrical warfare, a central principle in the Iranian concept of the use of force. Cyberspace warfare, like other classical asymmetrical tactics such as terrorism and guerilla warfare, is viewed by Iran as an effective tool to inflict serious damage on an enemy with military and technological superiority. In a case of escalation between Iran and the West, Iran will likely aim to                                                              Dr. Gabi Siboni is the head of the Cyber Warfare Program at INSS. Sami Kronenfeld is an intern in the program. This essay is shortened version of a forthcoming article on Iran’s cyberspace capabilities, to be published in the December issue of Military and Strategic Affairs.  
  • 2. INSS Insight No. 375                          Iran's Cyber Warfare    launch a cyber attack against critical infrastructures in the United States and its allies, including energy infrastructures, financial institutions, transportation systems, and others. In order to realize the goals of its strategy, Iran has allocated about $1 billion to develop and acquire technology and recruit and train experts. The country has an extensive network of educational and academic research institutions dealing with information technology, computer engineering, electronic engineering, and math. In addition, the government operates its own institute – the Iran Telecommunications Research Center, the research and professional branch of the Information and Communications Ministry. The institute trains and operates advanced research teams in various fields, including information security. Another government body is the Technology Cooperation Officer, which belongs to the president’s bureau, and initiates information technology research projects. This body has been identified by the European Union and others in the West as involved in the Iranian nuclear program. The Iranian cyberspace system comprises a large number of cyber organizations, formally related to various establishment institutions and involved in numerous fields. One central organization with a primarily defensive orientation is the Cyber Defense Command, operating under Iran’s Passive Defensive Organization, affiliated with the General Staff of the Armed Forces. Alongside military personnel, this cyberspace organization includes representatives of government ministries, such as the ministries of communications, defense, intelligence, and industry, and its main goal is to develop a defensive doctrine against cyberspace threats. Another cyberspace body of a defensive nature is the MAHER Information Security Center, operating under the aegis of the communications and information technology ministry. The center is in charge of operating rapid response teams in case of emergencies and cyber attacks. Iran also has a Committee for Identifying Unauthorized Sites and FETA, the police cyberspace unit, which in addition to dealing with internet crime also monitors and controls Iranian internet usage, with emphasis on internet cafés throughout the country that allow relatively anonymous web surfing. The picture is less clear regarding Iran’s offensive cyberspace capabilities. Clearly the capabilities of the Revolutionary Guards make Iran one of the most advanced nations in the field of cyberspace warfare, with capabilities, inter alia, to install malicious code in counterfeit computer software, develop capabilities to block computer communications networks, develop viruses and tools for penetrating computers to gather intelligence, and develop tools with delayed action mechanisms or mechanisms connected to control servers. There is also evidence of links between the Revolutionary Guards and hacker groups in Iran and abroad that operate against the enemies of the regime at home and around the world. The use of outsourcing allows the Revolutionary Guards and Iran to maintain distance and deniability about Iran’s involvement in cyberspace warfare and   2
  • 3. INSS Insight No. 375                          Iran's Cyber Warfare    cyber crime. A prominent hacker group linked to the Revolutionary Guards is the Ashiyane Digital Security Team, whose members are motivated by an ideology supporting the Iranian regime and the Islamic Revolution and who target the enemies of the regime for attack. The Basij, subordinate to the Revolutionary Guards, also became active in cyberspace when in 2010 established the Basij Cyberspace Council. The activities of the Basij focus primarily on creating pro-Iranian propaganda in cyberspace, and the organization works on developing more advanced cyberspace capabilities and using Revolutionary Guards cyberspace operatives to train hackers in high offensive capabilities. Iran is already active offensively, as evidenced by several events in recent years. In 2011 there were two attacks on companies providing security permissions; most prominent was the attack from June to August 2011 on DigiNotar in the Netherlands, whose databases – the major source of SSL permissions in Holland – were attacked. During those months, certificates for authenticating websites, including the certificate authenticating the google.com domain, were stolen; the latter item allowed attackers to pose as Google and redirect Gmail servers. In fact, the attack allowed Iran to penetrate more than 300,000 computers, primarily in Iran, and seems to have been designed to monitor users at home for internal security purposes. In September 2012, a number of financial institutions in the United States came under attack, including sites belonging to the Bank of America, Morgan Chase, and CitiGroup. According to American analysts, the most destructive attack occurred in August 2012 on the computers of the Saudi Arabian oil company Aramco and the Qatari gas company RasGas. The attack was carried out by means of a computer virus called Shamoo, which spread through company servers and destroyed information stored in them. A group called the Cutting Sword of Justice took responsibility for the attack and claimed it was aimed at the main source of income of Saudi Arabia, which was accused of committing crimes in Syria and Bahrain. The development of Iran’s cyberspace capabilities and the most recent attacks should concern the United States as well as Israel. The success of the attack on Aramco computers is of concern because the standard defensive systems proved insufficient against the focused and anonymous attacks. It is therefore necessary to develop tools that can deal with such threats. One of the directions being developed involves identification, blocking, and neutralization of unusual behavior in computers under attack. Such tools could neutralize threats even after the malicious code managed to penetrate the targeted computer. The attack on Aramco was designed more to destroy information indiscriminately in tens of thousands of company computers and less (if at all) to gather intelligence. If intelligence gathering in cyberspace can be considered legitimate in some cases, a large scale attack such as the one by Iran against a civilian target marks a   3
  • 4. INSS Insight No. 375                          Iran's Cyber Warfare    transition by Iran to retaliatory action. Secretary Panetta’s recent statement on the need to close accounts with those responsible for this attack demonstrates this, but what ultimately counts is the test of action and not of words. The focus of Iran’s cyberspace activity directed against Israel and other countries in the West requires appropriate defensive arrangements, beginning with an up-to-date doctrine of cyberspace defense. The attackers’ sophistication requires intelligence-based defenses as well as the generic ones. In light of developments in Iran, the State of Israel must place the issue of Iranian cyberspace activity among its highest intelligence priorities, in order to identify advance preparations and foil attacks before they are underway. Similar to the Iranian nuclear program, the challenge is not Israel's alone, rather that of many other states in the West as well as the Gulf states. It is therefore necessary to initiate broad interstate cooperation to gather intelligence and foil Iranian cyber activity.   4