Print        

Soft War (1): Cyberwar

Saturday, June 11, 2011

Author: Hamid Ziaei Parvar

Publisher: Tehran International Studies & Research Institute (TISRI)
Date: September 2004
ISBN: 964-8680-11-6
Language: Persian
Pages: 423

Tehran International Studies & Research Institute has been publishing a collection on the soft war to provide scientific insight away from propaganda into various aspects of and trends in cyber and media threats as well as psychological operations. The first volume of this collection will focus on cyberwarfare.

Cyberwar is a state in which military operations are controlled through computer data and every effort is made to prevent enemies from disturbing computer communications and access to information.

The present book discusses various aspects of computer and software technology and its application in war to provide a good ground for more research on the aforesaid subjects. It consists of three sections entitled “definitions and types of cyberwar,” “techniques used in cyberwar,” and “cyberwar and Iran.”

The first section provides definitions of basic concepts of cyberwar such as cyberwar, cyberterrorism, internet war, virtual war, hack and hacking, cybercrimes…. Penetrating computers, online crimes, protection of national infrastructures, classification of computer crimes, how to fight hackers, subversion over the internet in the United States, war of hackers as part of the US war in Iraq, the United States’ vulnerability and its fear of online attacks by Al-Qaeda are major subjects covered in the first section of the book.

The second section entitled “techniques used in cyberwar” has been subdivided into two chapters which focus on such issues as receiving signals, interception of phone calls and internet messages, telecommunication fraud, decoding messages, sensors, satellites, how to send parasites, assessing arms using radio frequencies, laws of monitoring in the United States and European Union, and application of electronic warfare in the Persian Gulf War. Security in computer networks and various types of viruses, how they are created and disseminated, spyware, cyberspace problems, and role of human factors in security of computer networks are other issues discussed in the second chapter of the second section.

The third section is focused on various issues related to the internet use in Iran. Here, introduction of the internet to Iran and its subsequent growth has been discussed to provide an insight into vulnerabilities of Iran’s computer networks. Then various forms of online attacks against banks in Iran and other countries have been reviewed. Computer hack in Iran and review of famous hacking cases, network security in Iran, electronic war in Iran, cybercrimes in Iran and obstacles to combating them, role of relevant organizations, networked sales in Iran and its weaknesses, informing people about networked trade, internet challenges between Iran and the United States and the war of filtering are the main subjects of the last section of the book.

Complete texts of Budapest Convention on Cybercrime, cybercrimes in Europe, summary translation of the US strategy on information and internet security in 2003, as well as network information protection strategies are additional issues discussed in the appendices.

About the Author

Ph.D. in Communications, University teacher in different Iranian universities , Expert on communications, journalism, information technology and cyber journalism, and Researcher in Tehran International Studies & Research Institute

طراحی و توسعه آگاه‌سیستم