Iran Turns Off The Internet

As protests over economic instability and government censorship persist in Iran, the Hassan Rouhani government has reportedly wielded its favorite suppression tactic: blocking the Internet.

Multiple reports say the government was blocking Internet on mobile networks starting on Dec. 30, including social media services like Instagram and messaging services like Telegram, to try and stop the protesters from organising and amplifying their message. This is the biggest anti-government public demonstration since 2009.

“How nervous the government is about losing control over the population is proportional to various control tactics they implement over the Internet,” said Mahsa Alimardani, who researches Internet freedoms in Iran for Article 19. “In the past few hours there are also some reports of home connections (up until today mostly left undisturbed) also facing some blocks to accessing foreign web content.”

The extent of this blackout is not yet clear, Iranian students and others have reported that desktop versions of the Telegram system were still working, and internet research company Oracle detected DNS queries.

The situation only builds on Iran’s ongoing issues with internet censorship and control. During Iran’s elections earlier this year, young citizens were hoping the Rouhani administration would open up access to the internet, and Rouhani promised to increase Internet speeds and cut down on censorship. But so far, the administration and the new internet minister have failed to deliver on those promises. 

Iranians have taken to using VPNs and building apps to bypass Iran’s erratic suppression of information. And some reportedly removed their network passwords during the protests to allow more people to access internet if the mobile networks were blocked. 

Meanwhile, Internet suppression has become an increasingly dangerous and common government weapon across the world. The Democratic Republic of Congo cut mobile and web services ahead of protests just a few days ago, and similar blackouts have been in Kashmir and Gabon.

Motherboard

You Might Also Read: 

Signal: The Snowden-Approved Crypto App Comes to Android:

Turkey Blocks Wikipedia:

Russia To Block LinkedIn:

Zello Protest App Blocked in Russia:

Russia Plans To Shut Facebook For Its Election:


 

 

« Offensive Security, Cyber Insurance & Cryptocurrencies: 2018 Predictions
Risky Business - Going Driverless In Moscow »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Zurich

Zurich

Zurich is a leading multi-line insurer providing a wide range of property and casualty, and life insurance products and services in more than 210 countries and territories.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

ActiveNav

ActiveNav

ActiveNav provide dark data discovery solutions for compliance and information governance.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.

DeepSurface Security

DeepSurface Security

DeepSurface is the first risk-based vulnerability management platform that allows cybersecurity teams to automate the process of analyzing and prioritizing vulnerabilities.