Your feedback is important to us!
We invite all our readers to share with us their views and comments about this article.
Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site.
Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus)
Iran's cyber capability is the focus of a detailed new study called "Iran's Cyber Threat," to be published soon by Collin Anderson and Karim Sadjadpour of the Carnegie Endowment for International Peace.The Carnegie study describes a small but useful Iranian cyber capability that evolved partly to gather foreign intelligence and partly to spy on domestic opposition groups that coalesced in the 2009 Green Movement. Iranian hackers developed payback motive, too, after 2012 newspaper reports about the U.S. and Israeli "Stuxnet" malware attacks on the Iranian nuclear program that had started in 2007 .A decade ago, Iran began mobilizing its own resources. The attacks became more serious in 2011, after an Iranian hacker penetrated a Dutch security firm called DigiNotar, opening Gmail users in Iran to government surveillance, according to the Carnegie study.Iran successfully attacked the U.S. as well.Iran has an arsenal of cyberstones, so to speak, ready to throw.
China challenge is America’s new Sputnik moment
Marines’ new head has set
bar for reform
In U.S.-China ties, ‘friction is the new normal’
FOLLOW THIS ARTICLE