Synopsis
This manuscript demonstrates how the Iranian regime, under the supervision and guidance of the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and Security (MOIS), has employed new cyberwarfare and tactics in a desperate attempt to counter the growing dissent inside the country, in particular the nationwide uprising that erupted in late December 2017. NCRI-US reveals information about the regime’s new wave of cyber repression, and key players involved. This book shows how a domestic mobile apps marketplace modeled after Google Play, is supervised by the IRGC to distribute spyware-enabled apps. IRGC front companies are developing spyware-enabled apps for cyber-surveillance and repression. Ironically, some of these apps are available on Google Play, Apple Store, and GitHub, potentially exposing millions of users worldwide to the regime’s spyware and surveillance.
About the Author
National Council of Resistance of Iran-US Representative Office acts as the Washington office for Iran's Parliament-in-exile, which seeks to establish a democratic, secular, non-nuclear republic in Iran. NCRI-US, registered as a non-profit tax-exempt organization, has been instrumental in exposing many nuclear sites of Iran, including the sites in Natanz, Arak, Lashkar Abad, Lavizan 1, 2, and 3, as well as the headquarters and operations of SPND. It has exposed the biological and chemical weapons program of Iran as well as its ambitious missile program. NCRI-US has also exposed the terrorist network of Iran including Iranian regime's involvement in the bombing of Khobar Towers in Saudi Arabia, and the Jewish Community Center in Argentina. NCRI-US is also active in cyber security, human rights and democracy advocacy in Iran.
"About this title" may belong to another edition of this title.