Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Free Iran Virtual Summit shows positive power of cyberspace

By Theresa Payton, Dr. Ramesh Sepehrrad
cybersecurity
August 14, 2020

The internet has become a powerful force for global interconnectivity and democratization. What’s more, the internet has introduced new methods for collective mobilization, such as “e-rebellions” and virtual protests. The global pandemic has accelerated the use of cyberspace as a powerful venue for individuals, groups, and nations to share ideas, engage, mobilize, and challenge authoritarian states in an impactful way.

Meanwhile, the hacking of systems and the manipulation of our minds have turned into alarming threats. The Iranian regime uses a mix of cyber intrusions, domestic surveillance, digital manipulation campaigns, and terrorist activities to suppress the voice of dissent. The regime also hides behind cyber operatives and fake personas. They are inside digital infrastructure and active on social media platforms to advance a pro-Tehran policy agenda. Iran’s documented history of suppression includes arrests, executions and the filtering of all news through state-run media or even turning off Internet access for the public.

Last month the Iranian opposition was able to break through the regime’s cyber suppression.

On July 17th, Iran’s parliament in exile, the National Council of Resistance of Iran (NCRI), hosted an impressive three-day virtual event by connecting 30,000 locations via Zoom.  The record-breaking virtual summit included live participants from the United States, Iran, and over 100 other countries. For three days, Iran’s main opposition hosted several hours of simulcast of speakers, testimonies, and musical performances from every corner of the world and in seven languages to deliver the message of a free Iran globally. The French news agency, Agence France Presse, declared the summit as the first “e-rebellion” staged against the regime in Iran.

Over 1,000 political dignitaries and personalities from multiple countries in Europe, the Middle East, Asia, and the United States (including members of the US Congress from both parties and both chambers), participated in the global cyber summit and declared support for the Iranian people’s call for a free Iran. Four prime ministers, eight foreign ministers, three former heads of parliaments, a former Speaker of the United States House of Representatives, American diplomatic and military corps, and some technology leaders declared their solidarity with the parliament in exile. In her keynote speech, the president-elect of the NCRI, Maryam Rajavi, said the call for change in Iran was “heard during successive uprisings from December 2017 and January 2018 to November 2019 and January 2020.” She outlined the NCRI’s commitment to “overthrow the clerical regime,” “build a free and democratic Iran,” and to “remain faithful to people’s sovereignty and their vote” in a free Iran.

Perhaps the most spectacular aspect of the event is how the high profile and elaborate virtual event survived a state-sponsored series of multipronged cyberattacks before, during and after the summit. According to an exiled Iranian news site, a “pre-planned attack targeted several” websites and the opposition’s television broadcast of the live event. With the use of distributed denial-of-service (DDoS) attacks during the event, Iran’s regime weaponized DDOS as a political suppression tool. These attacks also targeted the internet service provider (ISP) where hackers redirected searches about this group to malicious sites run by the Iranian regime. Clearly, by the reaction of Iran’s tyrants, one can tell how much it fears the NCRI and their message of a free Iran.

Nonetheless, the NCRI’s global cyber event was carried out without any disruption and it proved once again how the Internet continues to be a battleground between the Iranian people and the tyrants in power.  As the call for freedom and regime change grows louder in Iran, it is crucial to understand how the international community can stand on the side of the democracy movement by implementing effective measures to curb the regime’s cyber repression of the Iranian people. The Iranian regime uses a mix of these heavy-handed tactics along with subtler, more covert attacks and manipulation campaigns on social media to spread disinformation and fake news at a velocity and scale that would have been unheard of before the digital age. The cyber operatives acting on behalf of the Iranian regime seek to blunt the media’s ability to investigate their false dealings. They also attempt to co-opt the media narrative into shoring up their reputations at home and to support their agenda to demonize the voice of Iran’s opposition, mainly those affiliated with the NCRI.

Tehran’s hypocrisy is evident in the frequent use of online applications like Twitter by Iran’s Supreme Leader and many regime officials while the service, along with other popular social media applications, are blocked to ordinary Iranians. 

The use of cyber technology, mobile devices and messaging platforms continues to be a strategic tool in aiding the Iranian opposition and protesters to organize, exchange information between different locals, and get their message out to the rest of the world. The NCRI July 17th event demonstrated how the message of a free Iran can be amplified with the use of technology. Such events will most likely continue and will be amplified with the ongoing protests inside Iran. The time has come for a comprehensive cyber policy strategy across countries and the private sector to help enable the Iranian people and their resistance movement for change. It is critical to support the Iranian people’s call for access to the Internet free of the regime’s filtering and surveillance. It is critical to ensure the NCRI’s presence grows and remains unharmed against Tehran’s cyber surveillance, espionage, disinformation, and attacks at home and abroad.  The call to action is on the free world to support the rising voice for democracy in Iran that is led by a woman, Maryam Rajavi.

KEYWORDS: COVID-19 cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Theresa payton

Theresa Payton is a former CIO at the White House, author, and President and CEO of the Fortalie Solutions cybersecurity firm.

Ramesh sepehrrad

Dr. Ramesh Sepehrrad is an author, scholar practitioner, and cybersecurity executive.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Event and stadium management

    Free one-day virtual summit for the sports and events industry: prepping for the return of fans

    See More
  • fake-news-freepik02.jpg

    Hoax causes Litecoin to spike 20%; shows power of misinformation

    See More
  • Data Shows Rise in Positive Test Rates for Workplace Illicit Drugs

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing