Iran Turns Off The Internet

As protests over economic instability and government censorship persist in Iran, the Hassan Rouhani government has reportedly wielded its favorite suppression tactic: blocking the Internet.

Multiple reports say the government was blocking Internet on mobile networks starting on Dec. 30, including social media services like Instagram and messaging services like Telegram, to try and stop the protesters from organising and amplifying their message. This is the biggest anti-government public demonstration since 2009.

“How nervous the government is about losing control over the population is proportional to various control tactics they implement over the Internet,” said Mahsa Alimardani, who researches Internet freedoms in Iran for Article 19. “In the past few hours there are also some reports of home connections (up until today mostly left undisturbed) also facing some blocks to accessing foreign web content.”

The extent of this blackout is not yet clear, Iranian students and others have reported that desktop versions of the Telegram system were still working, and internet research company Oracle detected DNS queries.

The situation only builds on Iran’s ongoing issues with internet censorship and control. During Iran’s elections earlier this year, young citizens were hoping the Rouhani administration would open up access to the internet, and Rouhani promised to increase Internet speeds and cut down on censorship. But so far, the administration and the new internet minister have failed to deliver on those promises. 

Iranians have taken to using VPNs and building apps to bypass Iran’s erratic suppression of information. And some reportedly removed their network passwords during the protests to allow more people to access internet if the mobile networks were blocked. 

Meanwhile, Internet suppression has become an increasingly dangerous and common government weapon across the world. The Democratic Republic of Congo cut mobile and web services ahead of protests just a few days ago, and similar blackouts have been in Kashmir and Gabon.

Motherboard

You Might Also Read: 

Signal: The Snowden-Approved Crypto App Comes to Android:

Turkey Blocks Wikipedia:

Russia To Block LinkedIn:

Zello Protest App Blocked in Russia:

Russia Plans To Shut Facebook For Its Election:


 

 

« Offensive Security, Cyber Insurance & Cryptocurrencies: 2018 Predictions
Risky Business - Going Driverless In Moscow »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

Pipeline Security

Pipeline Security

Pipeline is a leader in cybersecurity, offering comprehensive services to protect organizations from evolving threats.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

IPKeys Cyber Partners

IPKeys Cyber Partners

IPKeys Cyber Partners, together with the IPKeys Power Partners unit, provide Cyber Security and CIP Compliance for utilities, grid operators and public safety organization across the USA.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

Invary

Invary

Invary's expert Runtime Integrity solution, powered by NSA-licensed technology, verifies the security and confidentiality of your system.