Sale!

Exposing Ashiyane Digital Security Team – Report and Social Network Analysis Graph – [PDF] + Maltego Graph

$500.00 $450.00

This qualitative analysis (45 pages) seeks to assess the Computer Network Operations (CNO) of Islamic Republic of Iran, through the prism of the adversary’s understanding of Tactics, Techniques and Procedures (TTP), a structured and geopolitically relevant, enriched OSINT assessment of their operations, consisting of interpreted hacking literature, videos, and, custom made hacking tools, extensive SNA (Social Network Analysis) of the country’s Hacking Ecosystem, real-life personalization of the key individuals behind the groups (personally identifiable photos, personal emails, phone numbers, Blogs, Web Sites, Social Networking accounts etc.). It’s purpose is to ultimately empower decision/policy makers, as well as intelligence analysts, with recommendations for countering Islamic Republic of Iran’s growing understanding and application of CNO tactics and strategies.

Compare

Description

Today’s growing cyber warfare arms race, prompts for systematic, structured, and multidisciplinary enriched processes to be utilized, in order to anticipate/neutralize and properly attribute an adversary’s strategic, tactical and operational Computer Network Operation (CNO) capabilities, so that an adequate response can be formulated and executed on the basis of a factual research answering some of the most relevant questions in the ‘fifth domain’ of warfare – who are our adversaries, what are they up to, when are they going to launch an attack against us, how exactly are they going to launch it, and what are they going to target first?

  • Overview and In-Depth Analysis of Iran’s Most Popular Hacking Groups
  • Personally Identifiable Information and Enriched OSINT Analysis
  • Iran Hacking Group’s Team Members Personal Photos
  • Iran Hacking Team’s Personal Group Photos
  • Personal and Group-Published Hacking and Security Tools
  • Analysis of Iran’s Cyber Academic Sector
  • Social Network Analysis Maltego Graph

Primary Iranian Hacking and Hacker including Web Site Defacement Groups Analyzed in this Report include:

  • Ashiyane Digital Security Team
  • Iranhack Security Team
  • Iranian Datacoders Security Team
  • Iran Security Team a.k.a SEPANTA Team/Iran Cyber Army 2012/2013
  • IDH Security Team
  • Bastan Security Team
  • NOPO Digital Security Team
  • Shekaf Security Team
  • Mafia Hacking Team
  • Iran Black Hats Team
  • Delta Hacking Security Team
  • Digital Boys Underground Team
  • IrIst Security Team

This qualitative analysis (45 pages) seeks to assess the Computer Network Operations (CNO) of Islamic Republic of Iran, through the prism of the adversary’s understanding of Tactics, Techniques and Procedures (TTP), a structured and geopolitically relevant, enriched OSINT assessment of their operations, consisting of interpreted hacking literature, videos, and, custom made hacking tools, extensive SNA (Social Network Analysis) of the country’s Hacking Ecosystem, real-life personalization of the key individuals behind the groups (personally identifiable photos, personal emails, phone numbers, Blogs, Web Sites, Social Networking accounts etc.). It’s purpose is to ultimately empower decision/policy makers, as well as intelligence analysts, with recommendations for countering Islamic Republic of Iran’s growing understanding and application of CNO tactics and strategies.

This report’s methodology, relies on collecting, interpreting, enriching, turning into actionable intelligence, factually enriched data regarding Islamic Republic of Iran’s, academic incubators of the next generation of cyber warriors, Iran’s understanding and applicability of offensive information and asymmetric cyber warfare capabilities, and an in-depth assessment of the regime’s vast hacking community, in the context of training, and producing operational assets, through large scale educational, training, and socializing assets.

  • Assessment of Iran’s understanding of offensive CNO (Computer Network Operations) in the context of information and asymmetric warfare
  • Assessment of Iran’s Academic Incubators in the context of RMA (Revolution in Military Affairs), NCW (Network Centric Warfare), and CNO capabilities
  • Assessment of Iran’s offensive CNO-capable offensive hacking groups

The analysis also includes a direct and enriched Social Network Analysis Graph of all the currently active Iranian Hacking Groups using Maltego.

Iran Hacker Groups Cyber Intelligence Report Table of Contents

  • Analyst’s Comment
  • Executive Summary
  • Dimensions of the Report
  • Assessing the Current State of the Iranian Cyber Threat
  • Iran’s Academic Incubators of the Next Generation of Cyber Warriors
  • ISC (Iranian Society of Cryptology)
  • Iranian Scientific Society of C4I
  • Analyzing Islamic Republic of Iran’s offensive CNO groups
  • Ashiyane Digital Security Team
  • Iranhack Security Team
  • Iranian Datacoders Security Team
  • Iran Security Team a.k.a SEPANTA Team/Iran Cyber Army 2012/2013
  • IDH Security Team
  • Bastan Security Team
  • NOPO Digital Security Team
  • Shekaf Security Team
  • Mafia Hacking Team
  • Iran Black Hats Team
  • Delta Hacking Security Team
  • Digital Boys Underground Team
  • IrIst Security Team
  • Conclusion

Iran Hacker Groups Cyber Intelligence Report Excerpt

Despite the unpleasant international environment it currently exists in, Iran’s interest in further developing its asymmetric warfare potential, has never been more vigorous, as a way to break out of the “catch-up mode” in today’s Network-Centric Warfare (NCW) battleground reality. Having systematically invested in Internet Censorship and Surveillance “solutions” to retain control of a population that’s becoming more self-aware in terms of utilizing modern communication technologies, like the Internet, smart phones, and Social Networks, next to possible “revolution escalation through regionalisation”, among the country’s current priorities remain a smooth transformation through a long envisioned Revolution in Military Affairs (RMA) on behalf of the country’s military and scientific leadership.

Thanks to a vibrant academic community performing active research in the areas of Information Operations, Software Development and Cryptography, localizing English language materials, and apparently, actively keeping itself up-to-data with the latest developments in these areas internationally, thanks to vast repositories of self produced academic context, the country’s academic elite continues to act as major driving force behind the technological rise of Iran’s understanding of RMA, NCW, and offensive CNO operations.

Furthermore, the compromise of the Iran’s critical infrastructure through an indirect ‘touch point’ with its closed communications network, prompted its leadership to rethink its current position in the cyber domain, fully realizing the controlled large scale negative impact, on the future generation of cyber warriors. The true impact of eventual ‘touch point’, can best formulated as “virtual think-to-go’ that will inevitably boost the regime’s operational understanding and eventual preparedness, through government tolerated civilian CNO teams, indicating an operational understanding, raising an early warning system indicator, for potential regime’s offensive CNO capabilities.

Through the years, Islamic Republic of Iran government tolerated civilian hacking teams, continued to compromise thousands of high-profile Web sites on a monthly basis, educating masses of novice offensive/defensive participants who later on launch their own hacking groups, publishing details of discovered Web application vulnerabilities, associated custom-published exploit code for them, next to popularizing malicious community-favored “releases”, the Iranian hacking underground continues to represent a closely nurtured ecosystem, through what appears to be a government’s position of offensive CNO capability building, intersecting with the notion of civilian heroism.

Reviews

There are no reviews yet.

Be the first to review “Exposing Ashiyane Digital Security Team – Report and Social Network Analysis Graph – [PDF] + Maltego Graph”

Your email address will not be published. Required fields are marked *