From a Nov. 30 CAMERA.org post:
Iran is again increasing cyberattacks against the United States, although many major news media outlets have not covered the aggression.
The New York Times reported (“Iranian Hackers Attack State Dept. via Social Media Accounts,” Nov. 24, 2015) American officials and private security groups “say they see a surge in sophisticated computer espionage by Iran, culminating in a series of cyberattacks against State Department officials over the past month.”
According to the paper, Iran has been identifying specific State Department employees who focus on Iran and the Middle East and hacking into their email and social media accounts. One anonymous senior U.S. official called the attacks “subtle” noting the Islamic Republic’s savvy use of social media, such as Facebook, to target young U.S. officials.
The attacks, the Times notes, are “nothing new,” having begun in the latter years of the Bush administration and proceeded since then to target U.S. agencies, banks and citizens and Saudi and Qatari energy entities, among others.
The New York Times reported Iranian cyber-attacks transitioned in 2014 from attempting to disrupt, degrade and destroy targets to “spear phishing” for espionage:
“Beginning May 2014, researchers found evidence that Iranian hackers were targeting Iranian dissidents, and later policy makers, senior military personnel and defense contractors in the United States, England and Israel, according to a report by iSight Partners, a computer intelligence firm in Dallas.”
The attacks increased, reaching more than 1,500 attempts at the time of their apex in May 2015. Just prior to talks between the U.S. and Iran over the latter’s alleged illegal nuclear program, Iranian cyber-attacks began “probing critical infrastructure networks in what appeared to be reconnaissance for cyberattacks meant to cause physical damage,” the Times noted. However, as negotiations between the United States and Iran began, attacks against the United States noticeably dropped off, although attacks against Israel did not.
In August, two weeks after the Iran deal was reached, Iranian cyberattacks resumed.
Researchers from Check Point, an Israeli cybersecurity company, were able to hack into the Iranian hackers’ target list. It “included 1,600 individuals, from scholars, scientists, chief executives and ministry officials to education institutes, journalists and human rights activists across the globe.”
This renewed flurry of Iranian cyberattacks was predicted in an April 2015 report by American Enterprise Institute scholars Frederick Kagan and Tommy Stiansen. This study noted that since the beginning of 2014 to March 2015, Iranian cyberattacks had increased by 128 percent.
“Iranian companies, including some under international sanctions and some affiliated with the Islamic Revolutionary Guard Corps (IRGC) and global terrorist organizations like Hezbollah, are hosting websites, mail servers, and other IT systems in the United States, Canada, Germany, the United Kingdom, and elsewhere. Simply by registering and paying a fee, Iranian security services and ordinary citizens can gain access to advanced computer systems and software that the West has been trying to prevent them from getting at all.”
The report further noted “hundreds of thousands of domains registered to Iranian people or companies” are “a result of Western failures to enforce IT sanctions and regulations governing technology transfers”—and are sometimes used to conduct cyberattacks against the U.S. and its allies.
News coverage and commentary about renewed Iranian cyberattacks has been sparse.
The Washington Post, in an November 18 online-only column by guest bloggers Dina Esfandiary and Ariane Tabatabai, predicted that attacks will increase.
The Wall Street Journal (“U.S. Detects Flurry of Iranian Hacking,” November 4) and The New York Times, alone apparently of major print outlets, reported the Iranian hacking increase.
Publications that had reported on the Iran nuclear deal—and endorsed it editorially, such as The Baltimore Sun and Los Angeles Times, among others, did not cover the Iranian attacks.
USA Today didn’t report the renewed attacks, despite having run a prescient op-ed by Ilan Berman of D.C.-based think tank American Foreign Policy Council in 2014 that called for paying close attention to the Islamic Republic’s cyber activities (“Sony hack gives cover to Iran; With eyes on North Korea, growing threat from Tehran gets overlooked,” December 30).
A little coverage in three major outlets; where was the rest of it?
(from Committee for Accuracy in Middle East Reporting, camera.org)
1. What two types of bias is the report an example of?
2. Why to you think most news organizations ignored this important story?
3. Why do you think this story is important for Americans to be aware of? (Ask a parent the same question.)
Scroll down to the bottom of the page for the answers.
1. The report is an example of bias by omission and story selection.
2. Opinion question. Answers vary.
3. Opinion question. Answers vary.