The Cyber Political Party Of God: How Hezbollah Could Transform Cyberterrorism

By: Ben Schaefer, Columnist
Source Link

Since 1982, Hezbollah, the Lebanese “Party of God” as well as Iran-backed Shiite terrorist organization, has antagonized its enemies through a strong mix of armed attacks as well as psychological warfare. Among these tactics, Hezbollah pioneered the role of cyber-operations equally a tool of coercion over a decade agone as well as continues to role the Internet equally a weapon today. Inspired as well as refined alongside the assistance of Iran, Hezbollah is shifting its coercive tactics from urban streets as well as battlefields to the routers of their Western adversaries.


Hezbollah formed during the Israeli line of piece of job of Lebanese Republic inwards 1982 as well as is credited equally a constituent inwards Israel’s withdrawal from Lebanese Republic inwards 2000.[i] The group’s success tin last attributed—at to the lowest degree inwards part—to substantial fiscal backing from Iran, which donated to a greater extent than coin to Hezbollah than to whatever other unusual militia group.[ii]Iran’s backing has allowed Hezbollah to develop a forcefulness of equally many equally 30,000 fighters,[iii] equally good equally an advanced psychological operations capability through its broadcast station as well as media wing, Al-Manar. [iv] In return, Islamic Republic of Iran gained a stalwart ally inwards the Arabic-speaking Middle East, as well as a conduit for subversive tactics that Tehran tin plausibly deny.[v]

Through its pregnant resources base, Hezbollah has produced an advanced technical capability that allows the grouping to role the Internet to attain pregnant strategic objectives.[vi] In 2006, during the 34-day Israel-Hezbollah War, Hezbollah launched sophisticated cyber-attacks against websites inwards multiple countries that supported Israel, including targets inwards the United States.[vii] These attacks focused on spreading Hezbollah’s propaganda, but also compromised legitimate websites to give Hezbollah supporters a agency of providing fiscal donations to the group.[viii]

More recently, inwards 2015, Hezbollah infiltrated both someone as well as populace entities inwards Israel’s defense forcefulness sector inwards an laid on known equally “Volatile Cedar.”[ix] The initial study describing the breach, distributed past times the Israeli cybersecurity theater Check Point, does non straight implicate Hezbollah;[x] however, based on the targets, operational methods, as well as resources required, the laid on has to a greater extent than oft than non been attributed to the group.[xi] If the assessment proves accurate, Volatile Cedar demonstrates a pregnant cyber capability past times a non-state actor.[xii]
In fact, Hezbollah has benefited inwards cyberspace from its ties to Iran, an payoff non available to unopen to other terrorist groups. After Islamic Republic of Iran suffered a blow to its nuclear seek facilities past times the Stuxnet virus inwards 2010, it greatly increased query as well as evolution efforts for its ain cyber abilities.[xiii] H5N1 study past times the British Technology theater Small Media indicates that inwards 2015, Tehran had increased its spending on cybersecurity past times 1,200 per centum inwards a mere two-year period,[xiv] as well as allowed Tehran to ascend to the top-tier of cyber threats against the United States of America of America inwards 2018.[xv]

As Tehran’s favored proxy-militia, Hezbollah has already received tools as well as preparation from Iran.[xvi] Further, because Hezbollah provides Islamic Republic of Iran alongside a mensurate of plausible deniability inwards regional meddling, Islamic Republic of Iran volition probable piece of job along to role its Lebanese cyber-warriors for everything from espionage, equally “Volatile Cedar” could indicate, to offensive operations similar large-scale Distributed Denial of Service attacks against fiscal institutions inwards countries similar State of Israel as well as Saudi Arabia.

Hezbollah’s capabilities could quest a broader shift inwards cyberterrorism. The grouping has oft been at the forefront of using novel tactics as well as methods equally tools of coercion as well as inspires other terrorist organizations to follow its lead. For example, inwards the 1980’s, Hezbollah pioneered the role of suicide tactics equally a agency of gaining an payoff over the amend resourced Israeli Defense Forces.[xvii] This tactic proved as well as then effective that suicide bombing remains a mutual weapon inwards many terrorists’ arsenals to this day. As Hezbollah’s cyber capabilities grow stronger as well as to a greater extent than successes are noted, other terrorist groups may adopt similar techniques.

Hezbollah’s cyber capabilities demonstrate that non-state actors tin undertake Internet operations commensurate to their nation-state counterparts. The grouping has a proven rail tape of developing tactics ahead of their time, as well as its advanced role of cyber operations should last treated no differently. Cyberterrorism straightaway poses a greater threat to the West than always before, as well as Hezbollah could last the harbinger of a novel moving ridge of Internet terrorists.

[i] “Profile: Lebanon’s Hezbollah Movement,” BBC, March 15, 2016, http://www.bbc.com/news/world-middle-east-10814698.

[ii] Casey Addis as well as Christopher Blanchard, “Hezbollah: Background as well as Issues for Congress,” Congressional Research Service (R41446, Jan 3, 2011), 4. Available at: https://fas.org/sgp/crs/mideast/R41446.pdf.

[iii] Ben Hubbard, “Iran Out to Remake Mideast alongside Arab Enforcer: Hezbollah,” The New York Times, August 27, 2017, https://www.nytimes.com/2017/08/27/world/middleeast/hezbollah-iran-syria-israel-lebanon.html.

[iv] Colin P. Clark, “How Hezbollah Came to Dominate Information Warfare,” The RAND Blog, September 19, 2017, https://www.rand.org/blog/2017/09/how-hezbollah-came-to-dominate-information-warfare.html.


[vi] Addis as well as Blanchard, “Hezbollah,” 4.

[vii] Colin P. Clark, “Hezbollah has Been Active inwards America for Decades,” The National Interest, August 26, 2017, http://nationalinterest.org/feature/hezbollah-has-been-active-america-decades-22051?page=show.

[viii] Hilary Hylton as well as Austin Tuesday, “How Hizballah Hijacks the Internet, “ Time, August 8, 2006, https://content.time.com/time/world/article/0,8599,1224273,00.html.

[ix] Jeff Moskowitz, “Cyberattack Tied to Hezbollah Ups the Ante for Israel’s Digital Defense,” The Christian Science Monitor, June 1, 2015, https://www.csmonitor.com/World/Passcode/2015/0601/Cyberattack-tied-to-Hezbollah-ups-the-ante-for-Israel-s-digital-defenses.

[x] “Volatile Cedar: Threat Intelligence as well as Research,” Check Point (March 30, 2015): 6. Available at: https://www.checkpoint.com/downloads/volatile-cedar-technical-report.pdf.

[xi] Moskowitz, “Cyberattack Tied to Hezbollah.”

[xii] Collin Anderson as well as Karim Sadjadpour, “Iran’s Cyber Threat: Espionage, Sabotage, as well as Revenge,” Carnegie Endowment for International Peace (Washington, DC: Carnegie Endowment for International Peace, 2018), 36.

[xiii] Natasha Bertrand, “Iran is Building a Non-Nuclear Threat Faster than Experts ‘Would Have Ever Imagined,’” Business Insider, March 27, 2015, http://www.businessinsider.com/irans-cyber-army-2015-3.

[xiv] “Iranian Internet Infrastructure as well as Policy Report: Special Edition, the Rouhani Review (2013-2015),” Small Media (February 2015): 7. Available at: https://smallmedia.org.uk/sites/default/files/u8/IIIP_Feb15.pdf.

[xv] Daniel Coats, “Worldwide Threat Assessment of the US Intelligence Community,” Director of National Intelligence (February 13, 2018): 5. Available at: https://www.dni.gov/files/documents/Newsroom/Testimonies/2018-ATA—Unclassified-SSCI.pdf.

[xvi] Anderson as well as Sadjadpour, “Iran’s Cyber Threat,” 21.

[xvii] Carl Anthony Wege, “Hezbollah’s Communication System: H5N1 Most Important Weapon,” International Journal of Intelligence as well as Counterintelligence 27, no. 2 (2014): 241.

Buat lebih berguna, kongsi:

Trending Kini: