Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
The Internet

Iran Bans Officials From Using Internet-Connected Devices (timesofisrael.com) 61

An anonymous reader shares a report: Iran's cybersecurity authority has banned officials from using devices that connect to the internet, apparently fearing being tracked or hacked by Israel. According to the state-linked Fars news agency, Iranian officials and their bodyguards have been told they are not allowed to use any equipment that connects to public internet or telecommunications networks.

Iran Bans Officials From Using Internet-Connected Devices

Comments Filter:
  • Alternative (Score:5, Funny)

    by CubicleZombie ( 2590497 ) on Tuesday June 17, 2025 @01:42PM (#65456095)

    Time to use all those pagers they bought a few years ago.

    • by Anonymous Coward

      Time to use all those pagers they bought a few years ago.

      Or the walkie-talkies?

    • Time to use all those pagers they bought a few years ago.

      Iran didn't use all those pagers, Hezbollah did. What eventually made the Israelis use the pager bombs was some of the pagers being sent to Iran for in-depth forensic examination. Furthermore, after Russia hacked SolarWinds and used their update servers to install backdoors on systems belonging to government departments such as US Homeland Security, State, Commerce and Treasury, that time Chinese intelligence hacked US military contractors, stole F-35 design data and then hacked the US federal government's

    • by PPH ( 736903 )

      All unexploded ones RMA'd to their original source in Israel by now.

  • Get the popcorn (Score:5, Insightful)

    by Big Hairy Gorilla ( 9839972 ) on Tuesday June 17, 2025 @01:44PM (#65456105)
    It's like religion. Everyone will say they won't use the internet. Then they will go home and try to figure out how to use it and not get caught.
    • When someone is trying to kill you and has missiles and bombs to do the job if they know where you are, it tends to focus your mind a bit. They probably aren't worried about he bodyguards use at home, although perhaps the bodyguard's family and neighbors ought to be worried. Apparently it only took a few examples to get the Ukrainian and Russian troops to stop using their cell phones.
      • by Zak3056 ( 69287 ) on Tuesday June 17, 2025 @02:12PM (#65456235) Journal

        When someone is trying to kill you and has missiles and bombs to do the job if they know where you are, it tends to focus your mind a bit.

        You'd think so, but the war in Ukraine shows otherwise. The Russians suffered heavily early on due to using cell phones--and they kept using them even after figuring out they'd lost something like four general officers due to them/staff/bodyguards using their phones, causing even more losses. I can't help but agree with the GP, some assholes are always going to come to the conclusion that "everyone else shouldn't do it, but it will be fine if it's only me."

    • by Himmy32 ( 650060 )
      Preventing targeted missile exploding in the living room is a step beyond what motivates everyone else.
  • by TWX ( 665546 ) on Tuesday June 17, 2025 @01:46PM (#65456115)

    Obviously one of the problems with the use of any given technology during wartime is that if it isn't local, there's a reasonably good chance that there will be attempts by one's adversary to use that technology against one in some capacity.

    For traditional conflicts before the computer age this was often a matter of raw materials or finished products being denied delivery. In the IT age it means things like hidden subroutines to degrade performance or outright disable or damage systems, or to snoop or locate.

    So yeah, Iran is using the same Internet protocols and other systems that the rest of the world uses, and there are lots of known issues with those open protocols, and that's even before getting to the hardware itself, where it sources from, and what sort of backdoors or other penetration into that hardware might have been achieved by Israel. If Iran is mostly using commercial, off-the-shelf equipment that anyone including Israel could purchase same as they did then I have no doubt that samples have been obtained and put through testing.

    • by thegarbz ( 1787294 ) on Tuesday June 17, 2025 @01:50PM (#65456133)

      Obviously one of the problems with the use of any given technology during wartime is that if it isn't local, there's a reasonably good chance that there will be attempts by one's adversary to use that technology against one in some capacity.

      See the USA doesn't have this problem. Even with home grown infrastructure the highest echelons of the armed forces will simply openly share war plans with journalists.

      • by TWX ( 665546 )

        While sometimes there's strategy in communicating exactly what one is going to do when one is in such an overwhelming position to where the adversary knowing what's coming can't do anything about it to the point that it might be even more demoralizing and force and advantage, I doubt that the method that the drunkard used is going to achieve that.

    • Wrong approach (Score:4, Interesting)

      by Gravis Zero ( 934156 ) on Tuesday June 17, 2025 @03:07PM (#65456413)

      Does Iran have any home-grown IP infrastructure?

      The problem with this approach is that you (as a nation) effectively create a unique target for exploitation. This means that you would be on it's own to ensure what they built is secure. This makes you an easy target for well funded adversaries who specialize in cyber-intrusion because they have more experience, more resources, and ultimately a greater capability to find and exploit flaws before you.

      While a better approach would be to develop, export, and then cooperate to secure software/hardware, you still need a lot of people working the problem.

      The best approach (when greatly outmatched) is to develop a hardware platform using globally utilized components and avoiding using SoCs. For the software, you want to utilizing existing developed software and submit additions, modifications, fixes to keep the community alive. The more widely the software is used, the more likely security researchers will be investigating it globally.

      The idea that building your own thing means it's secure is arrogant. China's "Hygon" x86_64 chips that are required for government machines are based on AMD's Zen architecture but have several modifications. However, MITRE only has 8 CVEs that even mention "Hygon" meaning it's effectively on China to secure their chips since people are not actively seeking to use their chips, not even within China. Ultimately, if there is a way to subvert security that is unique to Hygon chips then China must find it because other nations aren't about to tell them when they find a flaw.

    • by PPH ( 736903 )

      You use open source, COTS technology. But you assume that it has been compromised. You just have to generate a (relatively) secure message before placing it on those hardware/software platforms. IOW, encode your messages on paper. Then send them.

      Traffic analysis might be enough to expose the structure of covert organizations. Although the Iranian military is pretty well known to Israel, so what is there to hide? The FBI cracked the ANTIFA organization by arresting a bunch of them, capturing their phones IM

      • by mysidia ( 191772 )

        Traffic analysis might be enough to expose the structure of covert organizations.

        What if 20% of the members of the organization have a daily task to make sure they create and send a total of at least 10 to 20 encrypted messages each at random times of day? The actual 20% of org members who have this task would rotate daily, And most members of the org have no knowledge or assignment other than to create and send the messages.

        A random number between 0 and 50% of the total messages are sent to actual othe

        • What if 20% of the members of the organization have a daily task to make sure they create and send a total of at least 10 to 20 encrypted messages each at random times of day?

          Over 20 years ago I remember Greenpeace International had scripts that automatically did this. They would define a minimum traffic level, and data caught by the email spam filter would be used to pad out the traffic.

          It did require each office to use a small custom router box, but that's the level of security they needed; better than a small country would have.

    • by mysidia ( 191772 )

      there's a reasonably good chance that there will be attempts by one's adversary to use that technology against one in some capacity.
      Yes, there is. But this also makes fixating on the internet connection perhaps unreasonable.
      So as you're probably aware, there notoriously exist these devices called Stingrays.

      Cell phones that don't use Internet are still just as good at exposing your location over the corresponding protocols.

      At this point you're going to stand out If all the cellphones in an area with pur

      • by TWX ( 665546 )

        there's a reasonably good chance that there will be attempts by one's adversary to use that technology against one in some capacity.
        Yes, there is. But this also makes fixating on the internet connection perhaps unreasonable.
        So as you're probably aware, there notoriously exist these devices called Stingrays.

        Cell phones that don't use Internet are still just as good at exposing your location over the corresponding protocols.

        At this point you're going to stand out If all the cellphones in an area with purposefully no internet connectivity can be identified and located precisely. But your officials' cellphones are the only phones oddly configured that way. Or they use a specific make and model device which is not used by the rest of the population, but still connect to the cell network.

        I was assuming that they were mandating that these so-ordered officials stop using digital communications themselves altogether, phones or otherwise.

        • by mysidia ( 191772 )

          I was assuming that they were mandating that these so-ordered officials stop using digital communications
          The article states a limited ban on connected devices. Officials and their security teams are forbidden from using devices such as Laptops and phones which connect to public networks.

          Thus suggesting that there are also private networks, and they may still use some devices which do not connect to public networks.

  • So they are going to start using paper and runners (who take circuitous routes) to exchange messages between the officials?

    • by quenda ( 644621 )

      Time to revive the messenger camel.

    • So they are going to start using paper and runners (who take circuitous routes) to exchange messages between the officials?

      There are a lot of alternatives to the public internet. How easy is it to detect fiber optic communications and identify the users and their locations. My guess is at some point there will be a secure public communications network, the internet isn't it.

      • by mysidia ( 191772 )

        My guess is at some point there will be a secure public communications network, the internet isn't it.

        You just go to a telecom provider and order either Point-to-Point circuits or Dark fiber to be installed between your buildings and a centralized building of yours with the extra stipulation that your point to point links have to traverse dedicated fiber exclusively.

        Then when you go to connect up the fiber ports you configure and provision either 802.1AE MacSec [juniper.net] or QSFP-DD transceivers with Layer 1 enc

    • You can have a network that doesn't route to the Internet...

      • by ls671 ( 1122017 )

        Sure, then my bet is that it will route directly to Mossad instead. Apparently they are everywhere in Iran.

        • Sure, then my bet is that it will route directly to Mossad instead. Apparently they are everywhere in Iran.

          Whether they are, or are not, the concerns and paranoia that is introduced about not knowing for sure what your adversary has access to, and knows about your capabilities and plans and locations, can be a valuable tool which can be used to limit how you do things, and sometimes making you even more vulnerable as you end up using different solutions that are even more vulnerable. In thirty years (or so) there will be a book published with the details.

      • by alexhs ( 877055 )

        You can have a network that doesn't route to the Internet...

        It might not be enough. If the network is compromised, all Israel would need is a satellite connection to exfiltrate the relevant metadata.
        That is, no need to compromise the border routers, no need for high bandwidth.

    • by RobinH ( 124750 )
      It worked for Bin Laden... for a few years anyway.
    • No wonder my Commodore stock went up.

    • by Equuleus42 ( 723 )

      So they are going to start using paper and runners (who take circuitous routes) to exchange messages between the officials?

      One possible solution is to use RFC-1149 [wikipedia.org]...

  • A better model would be Harvard, which gave a janitor's 69 children free educalation.
  • I thought they locked it (and cell phones) down to prevent opposition movements from taking advantage of the situation and ousting the regime. Did that not last past the initial attack, or were they still allowing some use?
  • Just slap a post-it-note on the side and send it off.
  • Trump: "I don't care" that Tulsi Gabbard said Iran wasn't close to having nuclear weapon [thehill.com] Just like that, with no lube. At least Bush waxed rhetoric about patriotism and 9/11 prior to starting Iraq quagmire.
    • Nobody cared what Tulsi Gabbard said, or thought that the intelligence community would share information with her, regardless of what title she was given.

      That's nothing like Colin Powell, who was broadly trusted across political lines, lying to the UN.

      • by sinij ( 911942 )
        I don't think you understand how bureaucracy works. You don't get to disobey Director. You can slow-walk, you can fail to do a good job on purpose, you can tie it up with a red tape, but if Tulsi wants access to some intel, there is absolutely nothing that could be done to keep her out for more than a brief delay.
  • Iran has the internet? I could only imagine how censored it is
  • ...those devices just can't connect to the public internet.

    There's a fair chance that a non-public network already exists for secure communications between high-level officials. The US has such networks - it's the sort of network that Hegseth was supposed to use instead of Signal.

    That does raise the question of whether Iran already has such networks already, or still needs to build one. Which in turn raises the question of how many Mossad agents are / were / will be involved in the construction and maintena

    • That does raise the question of whether Iran already has such networks already, or still needs to build one.

      That's easy to answer. They had one, but on the one hand it was infiltrated, and on the other hand their routers have been exploding.

      That's why they would be using public internet; their private network is failing. And the government isn't trying to function, they're trying to preserve enough of a remnant to reassert power after the conflict.

  • y'all get together in a big room at the same time.

    Why here's an inviting one in pristine condition...

  • Due in part to the rhetoric characterizing Iran as an evil empire, I had this vision of Iran being somewhat...powerful. It's still early days, but it seems in just a few days Israel has managed to knock the entire country's defense infrastructure to smithereens. Now they seem like more of a blustering bully who's been smacked in the jaw and is now running for cover.

    I can't say I'm a fan of Israel's attack, *or* of Iran's hostility over decades, but the point is, I certainly did not expect this kind of outco

The difficult we do today; the impossible takes a little longer.

Working...