Iran Adds Hacking to Their High School Curriculum

Iran Adds Hacking to Their High School Curriculum

Being previously involved in education, having served students as a teacher, there are classes that I believe would greatly enhance the curricula of all schools. Take for instance money management skills to help students learn how not to create debt for themselves. How about adding a gun safety program so students can learn how to properly Iran Adds Hacking to Their High School Curriculumhandle fire arms? What about adding self-defense classes?

Never would I have thought about adding computer hacking classes, though.

Iran, however, has thought differently.

A mid-August announcement from FARS, the voice of the Iranian Republican Guard Corp. (IRGC), stated that a computer hacking class will be added to the high school curriculum in Iran.

According to General Ali Fazali, acting commander of the Basij militia, this hacking class will be called “Defensive Readiness.” The plan is to simply add this hacking component to the curriculum already in place, “Civil Defense Training,” taught via a manual to junior and senior high school students.

“This year, we will witness changes in the contents, teachers and teaching hours of the defensive preparedness lesson,” said General Fazali.

Basically, Iranian students will be taught how to track and bring down drone aircraft by hacking into their computer systems.

As I sit here writing, shaking my head in disbelief, I can’t help but think of how teaching hacking can and probably will go terribly wrong. It’s highly probable that once students have the skills to hack they won’t stop with drones, hacking anything and everything they dislike in an attempt to make a statement or just to wreak havoc for fun.

Besides that, people are naturally curious. I know that if I learned a new skill, I would want to try it out immediately…not wait for a situation, like a drone to fly into my country/territory, to occur.

Going even a bit deeper, can hacking really be taught? Think about it. Hacking is about knowing each and every detail of a computer system, and being able to find holes and backdoors that give unauthorized access. This takes ingenuity, reasoning and trial and error…and of course, patience. Can characteristics like this be taught, or are these just a part of an individual’s natural chemistry?

Truth of it all is, by the time you have finished reading this article, Iranian students have learned one more element related to computer hacking, bring them closer to their ultimate goal of hacking drones.

Sources:

http://www.huffingtonpost.com/micah-d-halpern/iran-hacking-school_b_3836482.html?utm_hp_ref=tw 

 http://hackersnewsbulletin.com/2013/08/iran-will-teach-drone-hacking-in-high-schools.html

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.