Iran Shuts Down The Internet

Iran has almost completely shut off access to the Internet across the country and as protests over an increase in fuel prices has intensified. The government is apparently seeking to silence protestors and quell unrest.

Real-time network data show connectivity has fallen to just 7% of ordinary levels following twelve hours of progressive network disconnections as public protests have continued across the country, accordimg to Netblocks. 

Iranian authorities first began disrupting internet access across multiple cities, including Tehran, last week when widespread protests over fuel rationing and price rises of more than 50 percent began to take place after widespread protests. 

Iranians began experiencing Internet slowdowns oapproaching a a near-total internet and mobile data blackout.​ So how does a country like Iran switch off the Internet to a population of more than 80 million? 

Though some countries, like China have built their Internet infrastructure from the start with government control in mind, most don't have a central set of levers they can pull to influence country-wide access to content or connectivity.  But regimes around the world, including Russia and Iran, have increasingly been retrofitting traditional private and decentralised networks with cooperation agreements, technical implants, or a combination to give officials more influence. 

In countries like Ethiopia, Venezuela, and Iraq, along with disputed regions like Kashmir, government-led social media blocking and more extensive outages have become the norm.

“This is the most wide-scale Internet shutdown that we’ve seen in Iran,” says Adrian Shahbaz, research director at the pro-democracy group Freedom House,  which tracks internet censorship and restriction worldwide. “It’s surprising to see the Iranian authorities block all internet connections rather than only international internet connections, because the latter is a tactic that they’ve used in the past. ..... It could mean they are more fearful of their own people and worry that they cannot control the information space amidst these economic protests.” Shahbaz told Wired.

The process to block an entire country's internet connectivity depends on the set-up. Countries with lowlevels of  internet penetration typically have just one government-controlled internet service provider, perhaps alongside smaller ISPs. 

But all usually gain access from an under-sea cable or international network node, creating "upstream" choke points that officials can use to essentially block a country's connectivity at its source.

The more extensive and diverse a country's infrastructure, though, the more involved the digital blackout process becomes. Alp Toker, the director of non-partisan connectivity tracking group NetBlocks, says it took Iranian authorities about 24 hours to completely block the nation's inbound and outbound traffic, leaving it hovering at about 5 to 7 percent of typical connectivity levels. 

Increasingly over the past decade, the Iranian regime has focused on building out a centralised national "intranet" that allows it to provide citizens with web services while policing all content on the network and limiting information from external sources. 

Known as the "National information network" or SHOMA, the effort has centered on the state-owned Telecommunication Company or Iran, which is run by a number of former government officials. In the process of establishing this internal web, the Iranian regime has taken more and more control over both public and private connectivity in the name of national security. 

El Arabiya:           Wired

You Might Also Read:

Russia Will Try Leaving The Global Internet:

Mass Surveillance: Cuba Filters Text Messages:

 

 

 

« Measuring Your Organisation’s Cyber Security
N Korean Hackers Are Targeting India »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Nuix

Nuix

Nuix specialise in extracting knowledge from unstructured data. Applications include Digital Forensics, Cybersecurity Intelligence, Information Governance, eDiscovery.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Inveteck Global

Inveteck Global

Inveteck Global is a Ghana-based cyber security firm providing strategic guidance and technical solutions to all our clients to best serve their individual needs.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.

EK3 Technologies

EK3 Technologies

EK3 Technologies mission is to provide comprehensive cybersecurity and IT solutions that allow our clients to focus on sustaining their business.