Click here for the Middle East Cyber War Master Index with the Complete Timeline.
This week of Cyber War on the Middle East front, has shown a slight change on the Cyber Conflict trend. For the first time since January, psyops have deserved a primary role, maybe on the wake of the video released by the Anonymous against Israel one week ago. Not only the Jerusalem Post calls the video into question, but also argues that it may have been forged by Iran, identifying a state sponsored impersonation behind the entry of Anonymous in this cyber war.
But this has not been the only psyops event as an alleged message from Mossad to the Anonymous has appeared on pastebin, whose beginning sounds like a dark warning: If you want to be a hero start with saving your own lives. Although there are many doubts on its truthfulness, it deserves a particular attention since outlines a new age on psyops, what I call “pastebin psyops”.
But a war is not made only of psyops, so this week has also seen more hostile actions, among which the most remarkable one has been the leak of 300,000 accounts from Israeli Ministry of Construction and Housing. This action had been preannounced by a wave of attacks on primary Israeli sites (which targeted also the PM site), and most of all, has been carried on by 0xOmar, the absolute initiator of this cyber conflict.
Palestine has been targeted as well, and it is really interesting to read under this perspective a statement by Ammar al-Ikir, the head of Paltel, the Palestinian telecommunications provider according to whom cyber attacks on Palestinian websites and internet servers have escalated since Palestine joined UNESCO.
On the Iranian front chronicle report of a failed cyber attacks againstPress TV, Iran’s English-language 24-hour news channel and most of all of a controversial statement by Gholam Reza Jalali, a senior Iranian military official in charge of head of the Iranian Cyber Intelligence, according to whom the country’s nuclear facilities have finally been made immune to cyber attacks. And it is not a coincidence that in this week Iran has kicked off the first national conference on Cyber Defense. A matter that deserves a special attention by Tehran because of the growing number of attacks on Iran’s cyber space by US and Israel. On the other hand, Israel did a similar move one month ago, at very early stage of the cyber conflict.
According to Jerusalem Post, Iran has been targeted by a Second Cyber Attack after Stuxnet. The new malware has been dubbed Stars, and, according to Iran officials, has been intercepted before it could make further damages.
Fortunately, our young experts have been able to discover this virus and the Stars virus is now in the laboratory for more investigations…
Said Gholamreza Jalali to the semi-official Mehr news. He did not specify the target of Stars or its intended impact.
The particular characteristics of the Stars virus have been discovered. The virus is congruous and harmonious with the [computer] system and in the initial phase it does minor damage and might be mistaken for some executive files of government organizations.”
So far no other news were unleashed… Another cyber bullet shot against Iran?
- ‘Stars’ Virus Detected By Iran In Second Cyber War Attempt (huffingtonpost.com)
- Iran says it has detected second cyber attack (canada.com)
- Iran Claims It Has Detected Second Cyber Attack (foxnews.com)
It was exactly a month ago when commenting on the Mobile Warfare in Syria, I predicted a possible peak in the protests for the half of April. Unfortunately I was a (quite easy actually) good prophet even if my prediction was not completely correct since we are now in the second half of the month. The wave is moving and in the last days the situation has plunged: protests are rising and from the “Black Friday”, the day in which the protests reached the peak, sources report nearly 300 victims in the wave of violence which shook the Country.
As usual I am watching with interest the roles that mobile technologies and social networks are playing and I am noticing the same patterns which characterized the revolutions of this beginning of 2011: social networks used for witnessing the events, common persons becoming improvised reporters armed only with their mobile devices (weapons), and governments desperately trying to stop the streams of bits from the hot zones with coarse attempts.
Consequently it is not surprising that many tweets are just reporting (together with the dramatic news of new military repressions) the cut-off of Internet, Mobile Phones and landlines in Nawa (Governorate of Daraa).
Nevertheless, Syrian Citizens keep on witnessing, what is happening and their tweets and updates are shacking the web (and the world): they show the importance and power of Mobile Warfare and the weapons citizens are using are well summarized by this tweet which encloses the essence of the mobile warfare:
The shots of the gun are viewable, for instance on the Facebook Syrian Revolution 2011 page, which is continuously fed with video “shot” from mobile devices. Moreover, in this moment, mobile communications in Daraa are possible only thanks to Jordanian Mobile Networks:
Will it happen an hijacking of the mobile network with the collaboration of a close country as occurred in Libya with the “Free Libyana”? Difficult to say, but for sure some other tweets do not exclude this possibility:
Few seconds after publishing the post I found an interesting information, emphasizing the power of mobile warfare, according to which reports by the “Israeli”, announced yesterday that the United States intends to allocate funding for the “revolutions” through the Internet in the “Arab countries” to help the activists bring about change for their countries.
The information have been mentioned by tge “Jerusalem Post” (but I did not fond any conform so far). According to the latter, the administration of President Barack Obama plans to spend more than $ 25 million to facilitate the use of the Internet through activists who’s governments hinder the use of Internet services.
U.S. Assistant Secretary of State for Public Democracy, Human Rights and Labor “Michael Posner” announced to the newspaper “the current administration believes that democratic change must be emanated from within. “
Wars and battlefield are really changing and the parallelism between real weapons and cyber weapons is getting more and more pertinent strengthening the concept of War 2.0: in the “old” world, foreign enemy countries financed internal rebels providing them weapons; in the new world they learn them how to use internet.
Thanks to Twitter I came across this interesting article from NYT, which further enhances the similarities between cyber-activism and real activism. Exiles drive the revolution allowing the sharing of images and information all over the World. Meanwhile they created a network to smuggle “weapons” inside Syria. Which kind of weapons? Of course satellite phones, along with hundreds of cameras and laptops.
Several say they relied on Syrian businessmen — abroad or in Syria — to finance one of their most impressive feats. After witnessing the Egyptian government’s success in shutting down the Internet and mobile phone networks in January, they made a concerted attempt to circumvent a similar move by delivering satellite phones and modems across Syria. Ammar Abdulhamid, an activist in Maryland, estimated that they delivered 100 satellite phones, along with hundreds of cameras and laptops.
Thanks to this “smuggling” we may listen to the tweets of freedom. The mobile warfare seems unstoppable…
- 954,292 hits since November 2010
Follow me on TwitterMy Tweets
About This Blog
In this blog I express my personal opinion, which does not necessarily reflects the opinion of my organization, about events and news or interest, concerning information security, winking to mobile world and, why not, to some curious personal event.
Every information is reported with its source.
Anyone intending to use information contained in my post is free to do so, provided that mention my blog in your article.
Top Posts & Pages
- List Of Hacked Celebrities Who Had (Nude) Photos Leaked
- 16-31 August 2014 Cyber Attacks Timeline
- 2014 Cyber Attacks Timeline Master Index
- 1-15 August 2014 Cyber Attacks Timeline
- 2013 Cyber Attacks Statistics
- 2012 Cyber Attacks Statistics
- Cyber Attacks Timeline Master Indexes
- 2013 Cyber Attacks Statistics (Summary)
- A (Graphical) World of Botnets and Cyber Attacks
- About Me