Strategies in the Iran-Israel Conflict: Internet Blackouts, Cryptocurrency Destruction, and Home Surveillance

The ongoing conflict between Israel and Iran is not only a confrontation involving combatants, drones, and explosive devices but is also intensifying in the digital domain. Both nations have a rich history of engaging in cyber warfare. A significant point of contention is Iran’s nuclear initiative, which was famously attacked by the sophisticated Stuxnet worm—one of the early forms of cyber sabotage aimed at causing real-world damage.

In response to perceived threats, Iran recently enacted a near-total internet blackout. My colleague Johanna Bouyan provides insights:

According to CloudFlare, a cybersecurity firm, Iranian internet traffic is “currently averaging around 97% or lower compared to levels from a week ago.”

The reduction in internet speeds follows claims from an anti-Iranian hacking group, possibly linked to Israel, stating they had breached Iran’s state-owned bank, Sepa. A government spokesperson from Iran, Fateme Mohajelani, indicated on Twitter/X that officials were limiting internet access to thwart further cyber intrusion.

On Wednesday, concerns in Iran were validated. My colleague Dan Mirmo reports:

Hacking groups associated with Israel are purportedly behind a $900 million (£67 million) heist at Iran’s cryptocurrency exchange.

The group calling itself Gonjeshke Dalande, known for its predatory tactics, announced it had successfully hacked the Novitex exchange, mere days after asserting it had destroyed data at Iran’s state-owned bank.

Elliptic, a consultancy specializing in cryptocurrency crime, reported identifying over $900 million in cryptocurrency transfers to hacker wallets from Nobitex. The hackers effectively “burn” these assets, storing them in “vanity addresses” that lack encryption keys, thereby rendering them inaccessible, according to Elliptic.

Iran has attempted to retaliate; however, much like the broader conflict, Israel’s strikes appear to be more effective and disruptive. Israeli authorities have warned citizens that Iran is seizing internet-connected home security cameras to gather real-time intelligence. Bloomberg reports. Cybersecurity experts assert that Hamas and Russian hackers have employed similar tactics. While home security cameras may represent a new front in the cyber conflict, they lack the capability to interfere with central banking systems, as Israel has done.

By the end of Friday, Iran seemed to have lifted internet restrictions for some users, as reported by The New York Times. However, even those with limited access felt their connections were precarious.

City of Love? PornHub Takes a Stand Against Paris Over Children’s Age Verification Online

Photo: Nikolas Kokovlis/Nurphoto/Rex/Shutterstock

PornHub, widely regarded as the most visited adult content site globally, resumed operations in France after a three-week blackout.

The platform’s owner, Iro, suspended access in protest against a new French regulation requiring adult websites to verify user ages using credit cards or identification. Instead of implementing the age restriction, Pornhub opted to withdraw access for approximately 70 million users.

Following this, Pornhub returned online after French courts temporarily put the law on hold while reviewing its compliance with the European Union’s constitution. However, the dispute between Paris and Pornhub signifies a growing global dialogue around online age verification.

This debate occupies a challenging intersection of differing online regulations aimed at protecting children and upholding privacy and freedom of expression—an area fraught with complexity, even in the U.S., where digital regulations often aim for practicality.

As of now, over 20 states have enacted age verification laws affecting adult content websites. Pornhub has been forced to block access in 17 of these states. Texas, which boasts a population of 31 million, serves as a prime example. The state legislature passed a law in September 2023 mandating ID verification for accessing adult sites, causing Pornhub to go dark in Texas by March—greeting users with a message calling the law “invalid, accidental, dangerous.” Meanwhile, while access is still allowed in Louisiana under similar laws, site traffic has plummeted by 80%. This serves as a barrier to ID requirements. The U.S. Supreme Court is considering whether such laws infringe on constitutional rights to free speech.

Research on U.S. law indicates that these laws are ineffective in achieving their stated goals. Online search data suggests that individuals in states with age verification laws are searching for non-compliant adult sites to bypass age restrictions and using VPNs to disguise their locations from internet service providers.

Other battlegrounds extending beyond age verification include restrictions on social media for underage users. Australia, which has enacted a ban on minors accessing social media, is currently testing various enforcement technologies but has found them lacking.

Skip past newsletter promotions

The UK is emerging as the next battleground. New online safety legislation mandating age verification for adult content will take effect in July. Will London mirror Paris, or follow Texas?

Dissecting the Trump Phone

Composite: Guardian/Getty Images/Trump Mobile/Trump Watch/eBay

Last week, Donald Trump introduced a mobile phone brand named “T1,” elegantly designed with his name and emblazoned with an American flag. It is especially marketed in Alabama, California, and Florida, with a monthly service plan priced at $47.45.

However, the T1 phones face significant challenges in delivering on their promises. The manufacturer will be subject to similar market pressures as other manufacturers, where both inexpensive labor and specialized electronics expertise are largely based in China, not the U.S. This partly explains why Apple products are labeled “Designed in California.”

Looking forward, analysts predict that Trump’s proposed tariffs could cause smartphone prices to soar by double or even triple digits. Currently, the U.S. lacks a developed electronics supply chain capable of fully assembling mobile phones domestically. In April, analysts at UBS cautioned that the cost of an iPhone 16 Pro Max with 256GB might potentially rise by 79%, from $1,199 to approximately $2,150, if a total tariff of 145% were implemented. Apple seemed to acknowledge this forecast by expediting the shipment of nearly $2 billion worth of iPhones to the U.S. before tariffs on China were instituted.

An example of a mobile phone that has been assembled in the U.S., known as the Liberty Phone, is operational but not entirely manufactured there. Trump’s offerings could potentially cost around four times more than $2,000. The Liberty Phones source certain components domestically, but still require screens, batteries, and cameras that are manufactured overseas. According to the Wall Street Journal, the CEO of Purism, the company that manufactures these devices, stated that its operating system can run only basic applications like calculators and web browsers.

Although the specs for the Liberty Phone are inferior compared to the Trump T1, its price will be steeper, and the likelihood of the T1 reaching the market as promised appears slim. Many of the anticipated technical features of the T1 come at a price point nearly double that of what Trump has claimed. A comprehensive list compiled by The Verge suggests that Chinese firms might manufacture phones under Trump’s brand label.

Eric Trump, who co-manages this venture alongside his brother Donald Jr., admitted that the initial batch of T1 phones was not made in the U.S. “Eventually, every phone will be produced in the United States,” Eric Trump reassured. He added last week. I understand.

Read more: Why can’t mobile phones be repaired in the U.S. to avoid Trump’s tariffs?

Wider Technology

Source: www.theguardian.com

Could Israeli Airstrikes Trigger a Nuclear Incident in Iran?

Iran’s Arak Heavy Water Nuclear Facility was damaged by Israeli bombing

ShutterStockEdit

Israel’s assault regarding Iran’s nuclear activities has raised concerns about potential radioactive incidents, according to experts, including the director of the International Atomic Energy Agency (IAEA). New Scientist While there have been reports of radiological and chemical contamination at one nuclear enrichment facility, the overall risk remains low.

Peter Bryant from the University of Liverpool notes that the terms “nuclear” and “radiation” understandably provoke fear, but despite extensive bombings, there have been no reported external leaks as of now.

Iran’s nuclear ambitions trace back to the 1950s, including attempts to develop nuclear weapons. The country pledged to allow IAEA inspections to verify that its energy facilities are not being utilized for weapon production; however, the agency recently issued a report criticizing Iran for failing to comply with non-proliferation obligations. Evidence of uranium traces at certain plants suggests that a covert nuclear weapons program might still be in progress.

Following reports regarding Iranian facilities responsible for uranium enrichment, Israel launched its strikes. Naturally occurring uranium exists in a mixture of three isotopes, but the enriched variant has a greater proportion of uranium-235, which can be used for both electrical generation in reactors and for nuclear arms. Given this dual-purpose potential, Iran has committed to restricting enrichment under the Treaty on the Non-Proliferation of Nuclear Weapons.

Philip Bleak from the Middlebury International Institute in California points out that the IAEA reports indicate Iran has already accumulated over 400 kilograms of uranium concentrated to 60%. This quantity is adequate for multiple rudimentary nuclear weapons, and Israeli intelligence suggests that the actual figures may be underreported to the IAEA. Even uranium at 60% purity significantly exceeds the requirements for fueling a power plant, implying that Iran harbors intentions to develop nuclear capabilities.

Iran maintains two primary enrichment sites: the Fordow Fuel Enrichment Plant (FFEP) and the Natanz Nuclear Facility. Israel’s strikes on Natanz resulted in internal radiation leaks; however, according to the IAEA, there have been no signs of external contamination.

In contrast, the Fordow facility remains operational due to its underground location, making it susceptible to destruction only by powerful US munitions. Only a powerful US bomb could destroy it. Former President Donald Trump has indicated he might assess support for Israel in this matter.

The Arak Heavy Water Reactor has also been targeted in bombings; however, it was never commissioned and housed no radioactive substances. If operational, it could have enabled the conversion of uranium into plutonium, a material viable for nuclear weaponry. Additionally, the Isfahan Nuclear Technology Center and certain missile sites designed for nuclear weapons launch were also bombed.

Bleak asserts that fresh uranium poses “very modest” health risks irrespective of enrichment levels. “A significant amount must enter your body to have a meaningful impact, similar to what uranium miners experienced,” he explains.

This is why the enrichment facilities targeted in strikes represent minimal risk outside their immediate vicinity, according to Bryant. Moreover, since these plants are built deep underground for resistance against attacks, any radioactive emissions would be further contained. “Uranium fuel can be handled without issue,” states Bryant. “You would need to physically ingest it to face health problems.”

Nonetheless, should a working reactor be targeted and operational for months prior to an attack, it may accumulate “dangerous fission byproducts,” which represent a more significant radiological threat. Bleak warns that if such materials escape, scenarios akin to Chernobyl or Fukushima could arise.

Bryant expresses confidence that such leaks are exceedingly unlikely, attributing this to advancements in reactor design that can withstand heavy bombardments. Furthermore, civilian power plants are not core to Iran’s nuclear weapons program and are unlikely to be prioritized targets for Israel, he says. Bushehr, Iran’s only functioning nuclear power facility, has not been targeted thus far.

Despite assurances from scientific experts, New Scientist reports that IAEA Director Rafael Grossi cautioned earlier this week about the real risks of harm.

“I have consistently stated that we should never attack nuclear facilities, irrespective of the circumstances, as they can pose hazards to both humanity and the environment,” he asserted.

topic:

Source: www.newscientist.com

North Korea and Iran have been found using AI for hacking, Microsoft reveals

Microsoft announced on Wednesday that adversaries of the United States, primarily Iran and North Korea, and to a lesser extent Russia and China, are starting to take advantage of generative artificial intelligence to launch or coordinate offensive cyber operations.

Microsoft disclosed that it collaborated with business partner OpenAI to identify and prevent numerous threats exploiting the AI technology it developed.

In a blog post, the company stated that these techniques are still in their early stages and are not particularly novel or unique, but they do broaden the capabilities of U.S. rivals to use large-scale language models to infiltrate networks and exert influence, emphasizing the importance of publicly exposing this.

Cybersecurity companies have been using machine learning to detect anomalous behavior within networks for years, but the introduction of OpenAI’s ChatGPT-led large-scale language model has intensified the cat-and-mouse game, as both criminals and aggressive hackers are leveraging it.

Microsoft’s investment in OpenAI is substantial, and the company noted in its announcement on Wednesday that generative AI is anticipated to power malicious social engineering and lead to the development of more advanced deepfakes and voice clones, at a time when disinformation is on the rise and threats to democracy are rampant, with more than 50 countries holding elections in a year.

Microsoft provided examples of how adversaries were using large-scale language models, including the disabling of AI accounts and assets for specific groups.

The North Korean cyber-espionage group known as Kimsky used the model to study foreign think tanks and generate content for spear-phishing hacking campaigns.

The Iranian Revolutionary Guards Corps utilized large-scale language models for social engineering, troubleshooting software issues, and researching ways to bypass detection on compromised networks, using phishing emails and accelerated email creation.

The Russian military intelligence unit, Fancy Bear, employed the model to study satellite and radar technology potentially linked to the Ukraine war.

China’s cyber-espionage group known as Aquatic Panda targeted various industries, higher education, and governments from France to Malaysia, with limited exploration of how large-scale language models can enhance technical operations, and another Chinese group, Maverick Panda, interacted with the model to gather information on high-profile individuals and regions.

On another blog, OpenAI announced that its current GPT-4 model chatbots are “limited to malicious cybersecurity tasks beyond what is already achievable with publicly available non-AI-powered tools,” a situation that cybersecurity researchers aim to change.

Jen Easterly, head of the U.S. Cybersecurity and Infrastructure Security Agency, informed Congress of the growing threat from China and the potential impact of artificial intelligence, stressing the need to develop AI with security in mind.

Amidst concerns about the irresponsible release of large language models, Microsoft and other companies are facing criticism for not taking focused action to address vulnerabilities, which has disappointed some cybersecurity experts who advocate for creating more secure underlying models to counter potential misuse.

Edward Amoroso, a professor at New York University and former AT&T chief security officer, emphasized the increasingly powerful role of AI and large-scale language models as potential weapons in cyber warfare, stating that they ultimately pose a threat to every nation-state.

Source: www.theguardian.com