Iran Shuts Down The Internet

Iran has almost completely shut off access to the Internet across the country and as protests over an increase in fuel prices has intensified. The government is apparently seeking to silence protestors and quell unrest.

Real-time network data show connectivity has fallen to just 7% of ordinary levels following twelve hours of progressive network disconnections as public protests have continued across the country, accordimg to Netblocks. 

Iranian authorities first began disrupting internet access across multiple cities, including Tehran, last week when widespread protests over fuel rationing and price rises of more than 50 percent began to take place after widespread protests. 

Iranians began experiencing Internet slowdowns oapproaching a a near-total internet and mobile data blackout.​ So how does a country like Iran switch off the Internet to a population of more than 80 million? 

Though some countries, like China have built their Internet infrastructure from the start with government control in mind, most don't have a central set of levers they can pull to influence country-wide access to content or connectivity.  But regimes around the world, including Russia and Iran, have increasingly been retrofitting traditional private and decentralised networks with cooperation agreements, technical implants, or a combination to give officials more influence. 

In countries like Ethiopia, Venezuela, and Iraq, along with disputed regions like Kashmir, government-led social media blocking and more extensive outages have become the norm.

“This is the most wide-scale Internet shutdown that we’ve seen in Iran,” says Adrian Shahbaz, research director at the pro-democracy group Freedom House,  which tracks internet censorship and restriction worldwide. “It’s surprising to see the Iranian authorities block all internet connections rather than only international internet connections, because the latter is a tactic that they’ve used in the past. ..... It could mean they are more fearful of their own people and worry that they cannot control the information space amidst these economic protests.” Shahbaz told Wired.

The process to block an entire country's internet connectivity depends on the set-up. Countries with lowlevels of  internet penetration typically have just one government-controlled internet service provider, perhaps alongside smaller ISPs. 

But all usually gain access from an under-sea cable or international network node, creating "upstream" choke points that officials can use to essentially block a country's connectivity at its source.

The more extensive and diverse a country's infrastructure, though, the more involved the digital blackout process becomes. Alp Toker, the director of non-partisan connectivity tracking group NetBlocks, says it took Iranian authorities about 24 hours to completely block the nation's inbound and outbound traffic, leaving it hovering at about 5 to 7 percent of typical connectivity levels. 

Increasingly over the past decade, the Iranian regime has focused on building out a centralised national "intranet" that allows it to provide citizens with web services while policing all content on the network and limiting information from external sources. 

Known as the "National information network" or SHOMA, the effort has centered on the state-owned Telecommunication Company or Iran, which is run by a number of former government officials. In the process of establishing this internal web, the Iranian regime has taken more and more control over both public and private connectivity in the name of national security. 

El Arabiya:           Wired

You Might Also Read:

Russia Will Try Leaving The Global Internet:

Mass Surveillance: Cuba Filters Text Messages:

 

 

 

« Measuring Your Organisation’s Cyber Security
N Korean Hackers Are Targeting India »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Rwanda Information Society Authority (RISA)

Rwanda Information Society Authority (RISA)

RISA is at the forefront of all ICT project implementation, research, infrastructure and innovation within the ICT sector in Rwanda.

MedCrypt

MedCrypt

MedCrypt are a team of medical device experts focused on bringing modern cybersecurity features to the next generation of healthcare technology.

BI.ZONE

BI.ZONE

BI.ZONE creates high-tech products and solutions to protect IT infrastructures and applications, and provides services from cyber intelligence and proactive defence to cybercrime investigation.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.