Iran and the Soft War for Internet Dominance
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
DRAFT Arabtex a System for Typesetting Arabic User Manual Version 4.00
DRAFT ArabTEX a System for Typesetting Arabic User Manual Version 4.00 12 Klaus Lagally May 25, 1999 1Report Nr. 1998/09, Universit¨at Stuttgart, Fakult¨at Informatik, Breitwiesenstraße 20–22, 70565 Stuttgart, Germany 2This Report supersedes Reports Nr. 1992/06 and 1993/11 Overview ArabTEX is a package extending the capabilities of TEX/LATEX to generate the Perso-Arabic writing from an ASCII transliteration for texts in several languages using the Arabic script. It consists of a TEX macro package and an Arabic font in several sizes, presently only available in the Naskhi style. ArabTEX will run with Plain TEXandalsowithLATEX2e. It is compatible with Babel, CJK, the EDMAC package, and PicTEX (with some restrictions); other additions to TEX have not been tried. ArabTEX is primarily intended for generating the Arabic writing, but the stan- dard scientific transliteration can also be easily produced. For languages other than Arabic that are customarily written in extensions of the Perso-Arabic script some limited support is available. ArabTEX defines its own input notation which is both machine, and human, readable, and suited for electronic transmission and E-Mail communication. However, texts in many of the Arabic standard encodings can also be processed. Starting with Version 3.02, ArabTEX also provides support for fully vowelized Hebrew, both in its private ASCII input notation and in several other popular encodings. ArabTEX is copyrighted, but free use for scientific, experimental and other strictly private, noncommercial purposes is granted. Offprints of scientific publi- cations using ArabTEX are welcome. Using ArabTEX otherwise requires a license agreement. There is no warranty of any kind, either expressed or implied. -
D Igital Text
Digital text The joys of character sets Contents Storing text ¡ General problems ¡ Legacy character encodings ¡ Unicode ¡ Markup languages Using text ¡ Processing and display ¡ Programming languages A little bit about writing systems Overview Latin Cyrillic Devanagari − − − − − − Tibetan \ / / Gujarati | \ / − Armenian / Bengali SOGDIAN − Mongolian \ / / Gurumukhi SCRIPT Greek − Georgian / Oriya Chinese | / / | / Telugu / PHOENICIAN BRAHMI − − Kannada SINITIC − Japanese SCRIPT \ SCRIPT Malayalam SCRIPT \ / | \ \ Tamil \ Hebrew | Arabic \ Korean | \ \ − − Sinhala | \ \ | \ \ _ _ Burmese | \ \ Khmer | \ \ Ethiopic Thaana \ _ _ Thai Lao The easy ones Latin is the alphabet and writing system used in the West and some other places Greek and Cyrillic (Russian) are very similar, they just use different characters Armenian and Georgian are also relatively similar More difficult Hebrew is written from right−to−left, but numbers go left−to−right... Arabic has the same rules, but also requires variant selection depending on context and ligature forming The far east Chinese uses two ’alphabets’: hanzi ideographs and zhuyin syllables Japanese mixes four alphabets: kanji ideographs, katakana and hiragana syllables and romaji (latin) letters and numbers Korean uses hangul ideographs, combined from jamo components Vietnamese uses latin letters... The Indic languages Based on syllabic alphabets Require complex ligature forming Letters are not written in logical order, but require a strange ’circular’ ordering In addition, a single line consists of separate -
United States RBDS Standard Specification of the Radio Broadcast Data System (RBDS) April, 2005
NRSC STANDARD NATIONAL RADIO SYSTEMS COMMITTEE NRSC-4-A United States RBDS Standard Specification of the radio broadcast data system (RBDS) April, 2005 Part II - Annexes NAB: 1771 N Street, N.W. CEA: 1919 South Eads Street Washington, DC 20036 Arlington, VA 22202 Tel: (202) 429-5356 Fax: (202) 775-4981 Tel: (703) 907-7660 Fax: (703) 907-8113 Co-sponsored by the Consumer Electronics Association and the National Association of Broadcasters http://www.nrscstandards.org NOTICE NRSC Standards, Bulletins and other technical publications are designed to serve the public interest through eliminating misunderstandings between manufacturers and purchasers, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for his particular need. Existence of such Standards, Bulletins and other technical publications shall not in any respect preclude any member or nonmember of the Consumer Electronics Association (CEA) or the National Association of Broadcasters (NAB) from manufacturing or selling products not conforming to such Standards, Bulletins or other technical publications, nor shall the existence of such Standards, Bulletins and other technical publications preclude their voluntary use by those other than CEA or NAB members, whether the standard is to be used either domestically or internationally. Standards, Bulletins and other technical publications are adopted by the NRSC in accordance with the NRSC patent policy. By such action, CEA and NAB do not assume any liability to any patent owner, nor do they assume any obligation whatever to parties adopting the Standard, Bulletin or other technical publication. Note: The user's attention is called to the possibility that compliance with this standard may require use of an invention covered by patent rights. -
The Arabi System — TEX Writes in Arabic and Farsi
The Arabi system | ] ¨r` [ A\ TEX writes in Arabic and Farsi Youssef Jabri Ecole´ Nationale des Sciences Appliqu´ees, Oujda, Morocco yjabri (at) ensa dot univ-oujda dot ac dot ma Abstract In this paper, we will present a newly arrived package on CTAN that provides Arabic script support for TEX without the need for an external pre-processor. The Arabi package adds one of the last major multilingual typesetting capabilities to Babel by adding support for the Arabic ¨r and Farsi ¨FCA languages. Other languages using the Arabic script should also be more or less easily imple- mentable. Arabi comes with many good quality free fonts, Arabic and Farsi, and may also use commercial fonts. It supports many 8-bit input encodings (namely, CP-1256, ISO-8859-6 and Unicode UTF-8) and can typeset classical Arabic poetry. The package is distributed under the LATEX Project Public License (LPPL), and has the LPPL maintenance status \author-maintained". It can be used freely (including commercially) to produce beautiful texts that mix Arabic, Farsi and Latin (or other) characters. Pl Y ¾Abn Tn ®¤ Tr` ¤r Am`tF TAk t§ A\ ¨r` TEC .¤r fOt TEX > < A\ Am`tFA d¤ dnts ¨ n A\ (¨FCA ¤ ¨r)tl Am`tF TAk S ¨r` TEC , T¤rm rb Cdq tmt§¤ ¯m ¢k zymt§ A\n @h , T§db @n¤ Y At§ ¯ ¢ Y TAR . AARn £EA A \` Am`tF® A ¢± ¾AO ¾AA ¨r` dq§ . Tmlk ¨ ¤r AkJ d§dt ¨CA A` © ¨ ¨t ªW d Am`tF ¢nkm§ Am Am`tF¯ r ªW Tmm ¯¤ ¨A ¨r` , A\n TbsnA A w¡ Am . -
Proto-Elamite
L2/20192 20200921 Preliminary proposal to encode ProtoElamite in Unicode Anshuman Pandey [email protected] pandey.github.io/unicode September 21, 2020 Contents 1 Introduction 2 2 Overview of the Sign Repertoire 3 2.1 Sign names . 4 2.2 Numeric signs . 4 2.3 Numeric signs with extended representations . 5 2.4 Complex capacity signs . 6 2.5 Complex graphemes . 7 2.6 Signs in compounds without independent attestation . 10 2.7 Alternate or variant forms . 11 2.8 Scribal designs . 11 3 Proposed Encoding Model 12 4 Proposed Characters 13 4.1 Numeric signs . 13 4.2 General ideographic signs . 17 5 Characters Not Suitable for Encoding 110 6 References 110 7 Acknowledgments 111 1 Preliminary proposal to encode ProtoElamite in Unicode Anshuman Pandey 1 Introduction The term ‘ProtoElamite’ refers to a writing system that was used at the beginning of the 3rd millenium BCE in the region to the east and southeast of Mesopotamia, known as Elam, which corresponds to the eastern portion of presentday Iran. The name was assigned by the French epigraphist JeanVincent Scheil in the early 20th century, who believed it to be the predecessor of a ‘proper’ Elamite script, which would have been used for recording the Elamite language, simply on account of the location of the tablets at Susa, which was the capital city of Elam. While no ‘proper’ descendent of the script has been identified, scholars continue to use the name ‘ProtoElamite’ as a matter of convention (Dahl 2012: 2). ProtoElamite is believed to have been developed from an accounting system used in Mesopotamia, in a manner similar to the development of ‘ProtoCuneiform’. -
Saa5x9x Family Economy Teletext and TV Microcontrollers
INTEGRATED CIRCUITS DATA SHEET SAA5x9x family Economy teletext and TV microcontrollers Preliminary specification 1998 Dec 14 Supersedes data of 1997 Jul 07 File under Integrated Circuits, IC02 Philips Semiconductors Preliminary specification Economy teletext and TV microcontrollers SAA5x9x family CONTENTS 9.3 East/West selection 9.4 National option characters 1 FEATURES 9.5 The twist attribute 1.1 General 9.6 Language group identification 1.2 Microcontroller 9.7 525-line operation 1.3 Teletext acquisition 9.8 On-Screen Display characters 1.4 Teletext Display 9.9 Control characters 1.5 Additional features of SAA529xA devices 9.10 Quadruple width display (SAA549x) 1.6 Additional features of SAA549x devices 9.11 Page attributes 9.12 Display modes 2 GENERAL DESCRIPTION 9.13 On-Screen Display boxes 2.1 Device masking history 9.14 Screen colour 3 ORDERING INFORMATION 9.15 Redefinable colours (SAA549x) 4 QUICK REFERENCE DATA 9.16 Cursor 9.17 Other display features 5 BLOCK DIAGRAM 9.18 Display timing 6 PINNING INFORMATION 9.19 Horizontal timing 6.1 Pinning 9.20 Vertical timing 6.2 Pin description 9.21 Display position 9.22 Clock generator 7 FUNCTIONAL DESCRIPTION 9.23 Reset signal 7.1 Microcontroller 10 CHARACTER SETS 7.2 80C51 features not supported 7.3 Additional features 10.1 Pan-European 7.4 Microcontroller interfacing 10.2 Cyrillic 10.3 Greek/Turkish 8 TELETEXT DECODER 10.4 Arabic/English/French 8.1 Data slicer 10.5 Thai 8.2 Acquisition timing 10.6 Arabic/Hebrew 8.3 Teletext acquisition 10.7 Iranian 8.4 Rolling headers and time 11 LIMITING -
Technical Advisory Group on Machine Readable Travel Documents (Tag/Mrtd) Twentieth Meeting
TAG/MRTD/20-WP/17 6/09/11 English Only International Civil Aviation Organization WORKING PAPER TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTIETH MEETING Montréal, 7 to 9 September 2011 Agenda Item 2: Activities of the NTWG Agenda Item 2.9: Transliteration Rules (Arabic) TRANSLITERATION RULES (ARABIC) (Presented by the NTWG) 1. INTRODUCTION 1.1 The purpose of the working paper is to inform the TAG of the progress made on the recommended transliteration of Arabic national characters for Doc Doc 9303, Machine Readable Travel Documents , Part 1 — Machine Readable Passports , Volume1, Section IV, Appendix 9. These recommended transliterations apply to the MRZ only. 2. BACKGROUND 2.1 Transliteration of Arabic characters applies mainly to the name of the holder of the MRTD, and is critical for determining the true identity of the holder. At present, Arabic names are transcribed (phonetically) to Latin characters on an ad-hoc basis and this compromises identity management. 2.2 The only true and reliable source of identification is the original form of the name in Arabic characters. Thus, any transliteration scheme must preserve the original form of the name. 2.3 It would be advantageous to countries using the Arabic script if encoding the name in the MRZ led to machine reading producing the original form of the name in Arabic. This would allow these countries to gain the benefit of machine reading without having to deal with an intermediate form of the name as an inaccurate Latin transcription. 2.4 There is no known existing transliteration scheme for Arabic script that is suitable for the MRZ. -
Crowdstrike Global Threat Intel Report
TWO THOUSAND FOURTEEN CROWDSTRIKE GLOBAL THREAT INTEL REPORT www.crowdstrike.com TWO THOUSAND FOURTEEN CROWDSTRIKE GLOBAL THREAT INTEL REPORT INTRODUCTION .........................................................................4 Table of KEY FINDINGS ............................................................................7 STATE OF THE UNION .............................................................9 Contents: NOTABLE ACTIVITY ............................................................... 13 Criminal ................................................................................ 13 State ...................................................................................... 19 Hacktivist/Nationalist ............................................................. 25 2014 Zero-Day Activity ........................................................... 34 Event-Driven Operations ......................................................... 39 KNOW THE ADVERSARY ....................................................49 Effect of Public Reporting on Adversary Activity ........................ 49 HURRICANE PANDA .................................................................50 GOTHIC PANDA ..........................................................................55 Overview of Russian Threat Actors ........................................... 57 2015 PREDICTIONS.................................................................61 CONCLUSION ........................................................................... 73 2 Introduction Intelligence -
Despite Infighting and Volatility, Iran Maintains Aggressive Cyber Operations Structure
CYBER THREAT ANALYSIS | Despite Infighting and Volatility, Iran Maintains Aggressive Cyber Operations Structure By Insikt Group® CTA-IR-2020-0409 CYBER THREAT ANALYSIS | IRAN Recorded Future’s Insikt Group® is conducting ongoing research on the organizations involved in Iran’s cyber program. This report serves to provide greater insight into the major military and intelligence bodies involved in Iran’s offensive cyber program. Although offensive cyber capabilities include domestic attacks, we researched those organizations with declared international missions. Due to the secretive nature of some organizations and lack of verifiable information, we incorporated competing hypotheses to adhere to industry analytic standards. For the purposes of this research, we investigated the Islamic Revolutionary Guard Corps (IRGC), including the Basij, as well as the Ministry of Intelligence and Security (MOIS), and the Ministry of Defense and Armed Force Logistics (MODAFL). Although the report suggests links between a select number of advanced persistent threat (APT) groups and certain intelligence organizations, we are unable to conclusively assign them to specific agencies due to gaps in information about each group. The sources for our research primarily include intelligence surfaced in the Recorded Future® Platform, industry research released by Symantec, FireEye, ClearSky, and PaloAlto, among others, and open source news reports. Executive Summary While the Iranian cyber program remains at the forefront of Tehran’s asymmetric capabilities, its intelligence apparatus is colored by various dysfunctions and seemingly destabilizing traits. In particular, the politicization of its various intelligence agencies and ensuing domestic feuds have reportedly polarized officer-level rank and file throughout the various security crises of the Islamic Republic. -
Arabic Samaritan Yezidi
The Unicode® Standard Version 14.0 – Core Specification To learn about the latest version of the Unicode Standard, see https://www.unicode.org/versions/latest/. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trade- mark claim, the designations have been printed with initial capital letters or in all capitals. Unicode and the Unicode Logo are registered trademarks of Unicode, Inc., in the United States and other countries. The authors and publisher have taken care in the preparation of this specification, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The Unicode Character Database and other files are provided as-is by Unicode, Inc. No claims are made as to fitness for any particular purpose. No warranties of any kind are expressed or implied. The recipient agrees to determine applicability of information provided. © 2021 Unicode, Inc. All rights reserved. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction. For information regarding permissions, inquire at https://www.unicode.org/reporting.html. For information about the Unicode terms of use, please see https://www.unicode.org/copyright.html. The Unicode Standard / the Unicode Consortium; edited by the Unicode Consortium. — Version 14.0. Includes index. ISBN 978-1-936213-29-0 (https://www.unicode.org/versions/Unicode14.0.0/) 1. -
Iranian Cyber-Activities in the Context of Regional Rivalries and International Tensions
CSS CYBER DEFENSE PROJECT Hotspot Analysis: Iranian cyber-activities in the context of regional rivalries and international tensions Zürich, May 2019 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Iranian cyber-activities in the context of regional rivalries and international tensions Authors: Marie Baezner © 2019 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group Myriam Dunn Cavelty, Deputy Head for Research and Teaching, Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie (2019): Hotspot Analysis: Iranian cyber-activities in context of regional rivalries and international tensions, May 2019, Center for Security Studies (CSS), ETH Zürich. 1 Iranian cyber-activities in the context of regional rivalries and international tensions Table of Contents 1 Introduction 4 2 Background and chronology 5 3 Description 9 3.1 Attribution and actors 9 Iranian APTs 9 Iranian patriotic hackers 11 Western actors 12 3.2 Targets 12 Iranian domestic targets 12 Middle East 12 Other targets 13 3.3 Tools and techniques 13 Distributed Denial of Service (DDoS) attacks 13 Fake personas, social engineering and spear phishing 13 -
Cyber Threat Data Model and Use Cases Final Report
CAN UNCLASSIFIED TA-35—Cyber Threat Data Model and Use Cases Final Report Dr. Antoine Lemay International Safety Research (ISR) Prepared by: ISR 38 Colonnade Road North Ottawa, Ontario Canada K2E 7J6 Contractor's document number: ISR Report 6099-01-03 Version 2.0 PSPC Contract Number: W7714-156105-T35 Technical Authority: Melanie Bernier, Defence Scientist Contractor's date of publication: September 2017 Defence Research and Development Canada Contract Report DRDC-RDDC-2017-C290 November 2017 CAN UNCLASSIFIED CAN UNCLASSIFIED IMPORTANT INFORMATIVE STATEMENTS The information contained herein is proprietary to Her Majesty and is provided to the recipient on the understanding that it will be used for information and evaluation purposes only. Any commercial use including use for manufacture is prohibited. Disclaimer: This document is not published by the Editorial Office of Defence Research and Development Canada, an agency of the Department of National Defence of Canada, but is to be catalogued in the Canadian Defence Information System (CANDIS), the national repository for Defence S&T documents. Her Majesty the Queen in Right of Canada (Department of National Defence) makes no representations or warranties, expressed or implied, of any kind whatsoever, and assumes no liability for the accuracy, reliability, completeness, currency or usefulness of any information, product, process or material included in this document. Nothing in this document should be interpreted as an endorsement for the specific use of any tool, technique or process examined in it. Any reliance on, or use of, any information, product, process or material included in this document is at the sole risk of the person so using it or relying on it.