Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
After Iran strike, Israel gets cyber unit
by Staff Writers
Tel Aviv, Israel (UPI) Aug 16, 2011


disclaimer: image is for illustration purposes only

Israel's military has set up a cyberdefense division, primarily against the Iranian threat, thus boosting the country's cyberwar capabilities after it allegedly attacked Tehran's nuclear program in 2010 with the Stuxnet virus and changed the face of warfare.

The Jerusalem Post reports that the new unit in the C4I Directorate -- command, control, communications, computers and intelligence -- is headed by an army colonel who formerly commanded Matzov, the Hebrew acronym for the Center for Encryption and Information Security.

That's the unit previously responsible for protecting military networks and strategic state concerns such as water and electricity from cyberattack.

The addition of the cyberdefense division followed the announcement by Israeli Prime Minister Binyamin Netanyahu in July of the creation of a National Cybernetic Task Force, believed to comprise at least 80 people, to defend Israel's vital infrastructure from Internet-based strikes.

The division is expected to work closely with Israel's expanding high-tech sector, one of the most advanced in the world, and its defense industry to develop systems to shield the economy and government from cyberattacks.

Little is known about the new unit, or indeed about Israel's expanding cyberwar capabilities but it is widely believed that Israel has become the leading practitioner of cyberwarfare.

This stems from the ground-breaking use of the highly sophisticated Stuxnet computer virus against Iran, a strike widely attributed to Israel. The attack was detected in the Islamic Republic's uranium enrichment facility at Natanz, 160 miles south of Tehran, in June 2010.

The virus reportedly attacked highly secure computers and manipulated the arrays of centrifuges, which do the enriching, to self-destruct.

It was a stunning blow to Iran's contentious nuclear program, which Israel and the United States allege is intended to produce nuclear weapons. Tehran denies that.

Frank Rieger, a key member of the hacker group known as the Chaos Computer Club, calls the Stuxnet weapon "a digital bunker-buster."

International cyber specialists reportedly tracked the virus through a maze of false Internet sites to Israel's foreign intelligence service, the Mossad.

German newsmagazine Der Spiegel said Israeli sources familiar with the Stuxnet operation insist it was "a blue-and-white operation … a purely Israeli operation," referring to Israel's national colors.

The sources say that a secret unit of Israel's Military Intelligence -- most likely the highly classified Unit 8200 which traditionally has been responsible for signals intelligence -- was responsible for programming much of the Stuxnet code.

Mossad did the rest and first unleashed the computer-killing virus June 22, 2009, against Iran, the report said. That was the first of three attacks that led to the sabotaged centrifuges at Natanz.

Iran has made a major effort to develop a cyberattack capability to retaliate for the extensive damage reportedly caused at Natanz, which apparently set back the nuclear program by several months.

It's difficult to determine what progress the Iranians have made but in March, Gen. Ali Fazli, commander of the Revolutionary Guards Corps' paramilitary Basij organization, claimed it had launched attacks on Web sites of "the enemies."

Yuval Diskin, the former head of Israel's General Security Service, known as Shin Bet, said before he stepped down in April that the Israelis have detected what appeared to be several attempts to attack key infrastructure centers in the Jewish state.

"All over the world, including in Israel, there are cyberattacks," Diskin said. "We can't say for certain the attacks were against critical infrastructure but there are fingerprints and tracks that indicate maybe there were attempts and they were treated.

"Israel needs to grow in this field since this is something that's happening today already -- and it's not waiting for tomorrow. This is a threat that's already knocking on our door."

As far as can be determined, this battle in cyberspace has been going on since 2004.

That's when Israel revealed that the cryptologists with Unit 8200 had cracked an Iranian communications code that allowed the Israelis to read message traffic concerning Iran's secret nuclear program.

It's highly unusual for the Israelis -- or anyone else, for that matter -- to admit being able to decipher an adversary's codes. But a recent analysis noted that "perhaps the Iranians stopped using the code in question, or perhaps the Israelis just wanted to scare the Iranians."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
'Hacktivists' target San Francisco subway website
San Francisco (AFP) Aug 14, 2011
The international group of hackers known as Anonymous began a cyber attack on the San Francisco subway's online presence Sunday, in retaliation for the agency's bid to shut down cellphone service to limit a protest over a fatal shooting. As of late Sunday the main website for the Bay Area Rapid Transit (BART) was still functioning, but the San Francisco Chronicle and other media reported the ... read more


CYBER WARS
GRAIL Launch Less Than One Month Away

The Lunar Farside And The Ancient Big Splat

"Big Splat" May Explain The Moon's Mountainous Far Side

LADEE Completes Mission Critical Design Review

CYBER WARS
Opportunity Reaches Endeavour Crater

Lava, not water, said cause of Mars beds

No Convenience Stores Between Earth and Mars... Yet

Opportunity For A Captain Cook At Endeavour Crater

CYBER WARS
NASA Selects Seven Firms To Provide Near-Space Flight Services

NASA moves forward in manned spaceflight

Russia space chief regrets focus on manned missions

Boeing Selects Atlas V Rocket for Initial Commercial Crew Launches

CYBER WARS
Toys for Tiangong

Why Tiangong is not a Station Hub

China to launch experimental satellite in coming days

Spotlight Time for Tiangong

CYBER WARS
SpaceX plans November test flight to space station

Crew Stows Spacesuits, Completes Robotics Checkout

The Orbital Perspective of Astronaut Ron Garan

Voyage to Vaccine Discovery Continues with Space Station Salmonella Study

CYBER WARS
NASA selects Virgin Galactic for Suborbital Flights

Arabsat-5C is welcomed in French Guiana for Arianespace's next Ariane 5 launch

SES-2 Satellite Launch Preparations Kick off in Kourou

Arianespace blasts another pair of satellites into orbit

CYBER WARS
Alien World is Blacker than Coal

Strange planet is blacker than coal

Exoplanet Aurora Makes For An Out-of-this-World Sight

Distant planet aurorae modeled

CYBER WARS
Samsung to launch banned tablet on Dutch market

Apple, publishers sued for alleged price fixing: report

DC-8 Flying Lab Validates Laser Instruments

HP cuts tablet price in bid to challenge iPad




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement