How Cyber-Geopolitics Will Destabalize the Middle East
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Country of Origin Information Report Syria June 2021
Country of origin information report Syria June 2021 Page 1 of 102 Country of origin information report Syria | June 2021 Publication details City The Hague Assembled by Country of Origin Information Reports Section (DAF/AB) Disclaimer: The Dutch version of this report is leading. The Ministry of Foreign Affairs of the Netherlands cannot be held accountable for misinterpretations based on the English version of the report. Page 2 of 102 Country of origin information report Syria | June 2021 Table of contents Publication details ............................................................................................2 Table of contents ..........................................................................................3 Introduction ....................................................................................................5 1 Political and security situation .................................................................... 6 1.1 Political and administrative developments ...........................................................6 1.1.1 Government-held areas ....................................................................................6 1.1.2 Areas not under government control. ............................................................... 11 1.1.3 COVID-19 ..................................................................................................... 13 1.2 Armed groups ............................................................................................... 13 1.2.1 Government forces ....................................................................................... -
Being Lesbian in Iran
Human Rights Report Being Lesbian in Iran Human Rights Report: Being Lesbian in Iran 1 About OutRight Every day around the world, LGBTIQ people’s human rights and dignity are abused in ways that shock the conscience. The stories of their struggles and their resilience are astounding, yet remain unknown—or willfully ignored—by those with the power to make change. OutRight Action International, founded in 1990 as the International Gay and Lesbian Human Rights Commission, works alongside LGBTIQ people in the Global South, with offices in six countries, to help identify community-focused solutions to promote policy for lasting change. We vigilantly monitor and document human rights abuses to spur action when they occur. We train partners to expose abuses and advocate for themselves. Headquartered in New York City, OutRight is the only global LGBTIQ-specific organization with a permanent presence at the United Nations in New York that advocates for human rights progress for LGBTIQ people. [email protected] https://www.facebook.com/outrightintl http://twitter.com/outrightintl http://www.youtube.com/lgbthumanrights http://OutRightInternational.org/iran OutRight Action International 80 Maiden Lane, Suite 1505, New York, NY 10038 U.S.A. P: +1 (212) 430.6054 • F: +1 (212) 430.6060 This work may be reproduced and redistributed, in whole or in part, without alteration and without prior written permission, solely for nonprofit administrative or educational purposes provided all copies contain the following statement: © 2016 OutRight Action International. This work is reproduced and distributed with the permission of OutRight Action International. No other use is permitted without the express prior written permission of OutRight Action International. -
Officials Say Flynn Discussed Sanctions
Officials say Flynn discussed sanctions The Washington Post February 10, 2017 Friday, Met 2 Edition Copyright 2017 The Washington Post All Rights Reserved Distribution: Every Zone Section: A-SECTION; Pg. A08 Length: 1971 words Byline: Greg Miller;Adam Entous;Ellen Nakashima Body Talks with Russia envoy said to have occurred before Trump took office National security adviser Michael Flynn privately discussed U.S. sanctions against Russia with that country's ambassador to the United States during the month before President Trump took office, contrary to public assertions by Trump officials, current and former U.S. officials said. Flynn's communications with Russian Ambassador Sergey Kislyak were interpreted by some senior U.S. officials as an inappropriate and potentially illegal signal to the Kremlin that it could expect a reprieve from sanctions that were being imposed by the Obama administration in late December to punish Russia for its alleged interference in the 2016 election. Flynn on Wednesday denied that he had discussed sanctions with Kislyak. Asked in an interview whether he had ever done so, he twice said, "No." On Thursday, Flynn, through his spokesman, backed away from the denial. The spokesman said Flynn "indicated that while he had no recollection of discussing sanctions, he couldn't be certain that the topic never came up." Officials said this week that the FBI is continuing to examine Flynn's communications with Kislyak. Several officials emphasized that while sanctions were discussed, they did not see evidence that Flynn had an intent to convey an explicit promise to take action after the inauguration. Flynn's contacts with the ambassador attracted attention within the Obama administration because of the timing. -
Iran: Ethnic and Religious Minorities
Order Code RL34021 Iran: Ethnic and Religious Minorities Updated November 25, 2008 Hussein D. Hassan Information Research Specialist Knowledge Services Group Iran: Ethnic and Religious Minorities Summary Iran is home to approximately 70.5 million people who are ethnically, religiously, and linguistically diverse. The central authority is dominated by Persians who constitute 51% of Iran’s population. Iranians speak diverse Indo-Iranian, Semitic, Armenian, and Turkic languages. The state religion is Shia, Islam. After installation by Ayatollah Khomeini of an Islamic regime in February 1979, treatment of ethnic and religious minorities grew worse. By summer of 1979, initial violent conflicts erupted between the central authority and members of several tribal, regional, and ethnic minority groups. This initial conflict dashed the hope and expectation of these minorities who were hoping for greater cultural autonomy under the newly created Islamic State. The U.S. State Department’s 2008 Annual Report on International Religious Freedom, released September 19, 2008, cited Iran for widespread serious abuses, including unjust executions, politically motivated abductions by security forces, torture, arbitrary arrest and detention, and arrests of women’s rights activists. According to the State Department’s 2007 Country Report on Human Rights (released on March 11, 2008), Iran’s poor human rights record worsened, and it continued to commit numerous, serious abuses. The government placed severe restrictions on freedom of religion. The report also cited violence and legal and societal discrimination against women, ethnic and religious minorities. Incitement to anti-Semitism also remained a problem. Members of the country’s non-Muslim religious minorities, particularly Baha’is, reported imprisonment, harassment, and intimidation based on their religious beliefs. -
The Iranian Cyber Threat
The Iranian Cyber Threat May 2021 0 Contents Introduction .............................................................................................................................................. 2 Cyber Retaliation ..................................................................................................................................... 2 Iran’s National Security Strategy .............................................................................................................. 4 Laying the Groundwork ........................................................................................................................... 5 Structure ................................................................................................................................................... 5 Defense ................................................................................................................................................... 6 Offense .................................................................................................................................................... 6 History of Iranian Cyber Attacks and Incidents ........................................................................................... 7 The Attacks .............................................................................................................................................. 8 Iranian Cyber Army ................................................................................................................................. -
Reimagining US Strategy in the Middle East
REIMAGININGR I A I I G U.S.S STRATEGYT A E Y IIN THET E MMIDDLED L EEASTS Sustainable Partnerships, Strategic Investments Dalia Dassa Kaye, Linda Robinson, Jeffrey Martini, Nathan Vest, Ashley L. Rhoades C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/RRA958-1 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0662-0 Published by the RAND Corporation, Santa Monica, Calif. 2021 RAND Corporation R® is a registered trademark. Cover composite design: Jessica Arana Image: wael alreweie / Getty Images Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface U.S. -
Reporting, and General Mentions Seem to Be in Decline
CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations. -
The Iranian Cyber Threat
The Iranian Cyber Threat May 2020 0 Contents Introduction ............................................................................................................................................ 1 Structure ................................................................................................................................................. 4 History of Iranian Cyber Attacks and Incidents ......................................................................................... 6 Conclusions ........................................................................................................................................... 11 Introduction In the early morning hours of January 3, 2020, Iran’s Islamic Revolutionary Guard Corps (IRGC) Quds Force commander Qassem Soleimani was killed in a U.S. drone strike that targeted his convoy immediately after landing at Baghdad’s international airport. Iranian leaders vowed “harsh retaliation” for the attack, and followed up on this threat by firing a salvo of over a dozen ballistic missiles at two Iraqi air bases housing U.S. troops in the early morning hours of January 8, wounding over 100 soldiers. While Iran has not yet taken additional major acts of revenge, it has signaled that it is likely to strike U.S. interests again at a future time of its choosing. Iran’s Supreme Leader, Ayatollah Ali Khamenei, intoned that while the ballistic missile attack represented a “slap on the face” for the U.S., “military action like this (ballistic missile) attack is not sufficient,” vowing to refuse to enter negotiations and to continue to confront the U.S. until its influence is expelled from the region. In the intervening period, Iran’s leaders have maintained a steady drumbeat of threatening rhetoric aimed at the U.S., with Soleimani’s successor, Esmail Qaani, for instance vowing to “hit his enemy in a manly fashion.” With U.S.-Iran tensions heightened, the U.S. national security apparatus has cautioned that one avenue for retaliation Iran is likely to pursue is launching offensive cyber attacks targeting the U.S. -
Crude Oil for Natural Gas: Prospects for Iran-Saudi Reconciliation
Atlantic Council GLOBAL ENERGY CENTER ISSUE BRIEF BY JEAN-FRANCOIS SEZNEC Crude Oil for Natural Gas Prospects for Iran-Saudi Reconciliation OCTOBER 2015 The relations between Iran and Saudi Arabia are often presented as an intractable struggle between powers Global Energy Center - tions: Shia in Iran and Sunni in Saudi Arabia.1 The Saudis feelthat threatenedfind legitimacy by what in their they respective consider anIslamic encroaching tradi At a time of unprecedented volatility and opportunity, the Atlantic Council Global Energy 2 The Center works to promote global access to affordable, “Shia crescent” of Iranian influence, extending from reliable, and sustainable energy. al-Sham (Syria-Lebanon) to Iraq, Iran, and Yemen. Alongside government, industry, and civil society House of Saud, in particular, views this “crescent” as an- partners, the Center devises creative responses attempt to bring an end to its stewardship of Islam’s to helpenergy-related develop energy geopolitical strategies conflicts, and policies advances that stretchingholiest sites across and replace the states it with of the Shia Gulf supervision. Cooperation Simi sustainable energy solutions, and identifies trends larly, Iran fears the threat of encircling Sunni influence, ensure long-term prosperity and security. Council (GCC), through to Egypt, Jordan, Pakistan, and parts of Syria. Certainly, the death of many hundreds than they appear. Saudi Arabia’s use of a sectarian soldiersof Hajjis tofrom the Iran Syrian and front other a fewcountries days later in Mecca are creat on - narrative to describe the 2011 uprising in Bahrain ingSeptember great tensions 24, 2015, between as well the as twothe dispatch Gulf giants. of Iranian Further and Iran’s self-appointed role as the champion of Shia rights underline how sectarian rhetoric has primarily thebeen opposing utilized bystate. -
Aibs-Shortlist-2-2020.Pdf
The AIBs 2020 The Shortlist TV and VIDEO Arts and culture The Dancer Thieves Banyak Films for Witness, Al Jazeera English The Red Door Project: Evolve Blue Chalk Media for The Red Door Project Spirit of Tokyo CNN Beethoven’s Ninth: Symphony for the World Deutsche Welle Matera Traveller Iran International Miyako, The Last Dance NHK in association with NHK Enterprises Chinese Folk Opera Phoenix Satellite Television Human interest MENtal Health: Breaking the Silence 5 News, ITN Fly on the Wall: The Virus Al Jazeera English Online Word of Truth: Transgender Arabs Living in the Middle East Alhurra Television African Voices: Female Pilots CNN Surviving the Special Forces De Mensen PANO: Secret on Instagram één for VRT Off the Grid: Missing Babies TRT World The Skin we Wear Very! For CNA, Mediacorp Pte Ltd Supporters of the AIBs 2020 The AIBs 2020 The Shortlist Natural world Fault Lines - Amazon Burning: Death and Destruction in Brazil’s Rainforest Al Jazeera English Borneo is Burning CNN Chris Packham: Plant A Tree to Save the World ITN Productions Sinking Island Radio Free Asia Freed to be Wild RT VOA Films: Illegal Logging Inside Mexico Monarch Butterfly Sanctuary VOA (Voice of America) Australia's Ocean Odyssey: A Journey Down the Wild Pacific Media for Australian Broadcasting East Australian Current Corporation and ARTE France Science and technology The Big Picture: The World According to A.I. Al Jazeera English Refugee Gardens: Turning Old Mattresses into Fresh Food BBC News Inventing Tomorrow CNN WFH: New Reality CNN Coded World Peddling -
Iranian Offensive Cyber Attack Capabilities
January 13, 2020 Iranian Offensive Cyber Attack Capabilities Threat Evolution internal internet security controls. The NCC is also tasked Iran’s use of cyberspace has evolved from an internal with “preparing for a cultural war” between Iran and its means of information control and repression to more enemies, according to the 2013 NCC Statute issued by Iran. aggressive attacks on foreign targets. The regime has been developing its own cybersecurity software and internet Islamic Revolutionary Guard Corps (IRGC). A branch architecture in order to protect and insulate its networks, of the Iranian Armed Forces, this military force oversees and it has been developing technological cyber expertise as offensive cyber activities. a form of asymmetric warfare against a superior conventional U.S. military. IRGC Electronic Warfare and Cyber Defence Organization. This organization provides training courses Iran also has a history of using cyberattacks in retaliation in cyber defenses and denies access to and censors online against the United States. In 2010, a computer worm known content and communications. as Stuxnet was discovered by cybersecurity researchers to have infiltrated the computers that controlled nuclear Basij Cyber Council. Considered a paramilitary force, centrifuges in Iran, causing physical damage and preventing Basij comprises nonprofessionals, using volunteer hackers operation. The Stuxnet worm was reported to have been a under IRGC specialist supervision. These volunteers are joint effort between the governments of the United States sometimes referred to as “cyber war commandos.” and Israel. Following the discovery of the Stuxnet malware, U.S. assets experienced an increase in the severity and National Passive Defense Organization (NPDO). -
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide