Iran Turns Off The Internet

As protests over economic instability and government censorship persist in Iran, the Hassan Rouhani government has reportedly wielded its favorite suppression tactic: blocking the Internet.

Multiple reports say the government was blocking Internet on mobile networks starting on Dec. 30, including social media services like Instagram and messaging services like Telegram, to try and stop the protesters from organising and amplifying their message. This is the biggest anti-government public demonstration since 2009.

“How nervous the government is about losing control over the population is proportional to various control tactics they implement over the Internet,” said Mahsa Alimardani, who researches Internet freedoms in Iran for Article 19. “In the past few hours there are also some reports of home connections (up until today mostly left undisturbed) also facing some blocks to accessing foreign web content.”

The extent of this blackout is not yet clear, Iranian students and others have reported that desktop versions of the Telegram system were still working, and internet research company Oracle detected DNS queries.

The situation only builds on Iran’s ongoing issues with internet censorship and control. During Iran’s elections earlier this year, young citizens were hoping the Rouhani administration would open up access to the internet, and Rouhani promised to increase Internet speeds and cut down on censorship. But so far, the administration and the new internet minister have failed to deliver on those promises. 

Iranians have taken to using VPNs and building apps to bypass Iran’s erratic suppression of information. And some reportedly removed their network passwords during the protests to allow more people to access internet if the mobile networks were blocked. 

Meanwhile, Internet suppression has become an increasingly dangerous and common government weapon across the world. The Democratic Republic of Congo cut mobile and web services ahead of protests just a few days ago, and similar blackouts have been in Kashmir and Gabon.

Motherboard

You Might Also Read: 

Signal: The Snowden-Approved Crypto App Comes to Android:

Turkey Blocks Wikipedia:

Russia To Block LinkedIn:

Zello Protest App Blocked in Russia:

Russia Plans To Shut Facebook For Its Election:


 

 

« Offensive Security, Cyber Insurance & Cryptocurrencies: 2018 Predictions
Risky Business - Going Driverless In Moscow »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Telspace Systems

Telspace Systems

Telspace Systems provides penetration testing, vulnerability assessment and training services.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service - basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Communications Fraud Control Association (CFCA)

Communications Fraud Control Association (CFCA)

CFCA is the premier International Association for fraud risk management, fraud prevention and profitability control.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Oxygen Technologies

Oxygen Technologies

Oxygen Technologies is a business systems strategy and integration company offering a variety of solutions to give our clients ways to work smarter not harder.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.