Iran Turns Off The Internet

As protests over economic instability and government censorship persist in Iran, the Hassan Rouhani government has reportedly wielded its favorite suppression tactic: blocking the Internet.

Multiple reports say the government was blocking Internet on mobile networks starting on Dec. 30, including social media services like Instagram and messaging services like Telegram, to try and stop the protesters from organising and amplifying their message. This is the biggest anti-government public demonstration since 2009.

“How nervous the government is about losing control over the population is proportional to various control tactics they implement over the Internet,” said Mahsa Alimardani, who researches Internet freedoms in Iran for Article 19. “In the past few hours there are also some reports of home connections (up until today mostly left undisturbed) also facing some blocks to accessing foreign web content.”

The extent of this blackout is not yet clear, Iranian students and others have reported that desktop versions of the Telegram system were still working, and internet research company Oracle detected DNS queries.

The situation only builds on Iran’s ongoing issues with internet censorship and control. During Iran’s elections earlier this year, young citizens were hoping the Rouhani administration would open up access to the internet, and Rouhani promised to increase Internet speeds and cut down on censorship. But so far, the administration and the new internet minister have failed to deliver on those promises. 

Iranians have taken to using VPNs and building apps to bypass Iran’s erratic suppression of information. And some reportedly removed their network passwords during the protests to allow more people to access internet if the mobile networks were blocked. 

Meanwhile, Internet suppression has become an increasingly dangerous and common government weapon across the world. The Democratic Republic of Congo cut mobile and web services ahead of protests just a few days ago, and similar blackouts have been in Kashmir and Gabon.

Motherboard

You Might Also Read: 

Signal: The Snowden-Approved Crypto App Comes to Android:

Turkey Blocks Wikipedia:

Russia To Block LinkedIn:

Zello Protest App Blocked in Russia:

Russia Plans To Shut Facebook For Its Election:


 

 

« Offensive Security, Cyber Insurance & Cryptocurrencies: 2018 Predictions
Risky Business - Going Driverless In Moscow »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.

IndoSec

IndoSec

IndoSec is an annual cybersecurity summit that powers an in-person gathering of cybersecurity leaders from Indonesia’s major corporations, leading businesses and key government entities.

Validia

Validia

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative AI.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.