<http://www.spacewar.com/> Military Space News

 









 



.

 <http://www.spacewar.com/cyberwars.html> CYBER WARS

Enter Unit 8200: Israel arms for cyberwar



disclaimer: image is for illustration purposes only

by Staff Writers
Tel Aviv, Israel (UPI) May 11, 2011 
Amid mounting tensions in the Middle East, Israel's outgoing internal
security chief, Yuval Diskin, says the Jewish state has been the target of
attempted cyberattacks on key state infrastructure.

The attacker's identity was not disclosed, if indeed it is known. But the
apparently unsuccessful attempts may have been retaliation by Iran for
recent cyberattacks, blamed on Israel, on Tehran's contentious nuclear
program.

In March 2010 the head of Israel's Military Intelligence, Maj. Gen. Amos
Yadlin, disclosed that the Jewish state had become a world leader in
cyberwarfare.

It was not clear why Yadlin, who headed one of the most secretive branches
of Israel's military, would lift the veil on such a sensitive issue.

But it was widely seen as a warning to Israel's foes that it had the means
to paralyze their infrastructure, such as electricity grids, water,
transportation and financial systems and military command networks.

On April 25 Gholam Reza Jalali, head of an Iranian military unit tasked with
countering sabotage, said the Islamic Republic had been hit by an "espionage
virus" he called "Stars."

He didn't say what facilities or computer systems the virus had targeted or
when it was detected. But it was the second known major computer worm to
have hit Iran in eight months.

In September 2010 Iran disclosed that a malicious computer virus called
Stuxnet had attacked high-value industrial sites.

It also appeared to be aimed at shutting down the Russian-built nuclear
plant at Bushehr on the northern coast of the Persian Gulf.

Tehran admitted that a number of centrifuges at its main uranium enrichment
center at Natanz, the core of its alleged nuclear military program, had been
affected.

Computer experts generally agreed the mysterious Stuxnet virus -- one of the
most sophisticated malware systems ever detected -- could only have been put
together by the intelligence service of a state or combination of states.

On April 16 Jalali, who heads an outfit called Passive Defense, blamed
Israel and the United States, the main opponents of Iran's nuclear program.

Diskin, who retires at the end of May, told Israeli military correspondents
the General Security Service, universally known as Shin Bet after its Hebrew
initials, had detected "fingerprints and tracks" of the attempted attacks on
Israeli targets.

He gave no clue of the intended targets but disclosed that Shin Bet has
formulated a multiyear plan to upgrade and expand its cyberwarfare
capabilities under his successor, Yoram Cohen, his former deputy.

"Israel needs to grow in this field since this is something that's already
happening today -- and it's not waiting for tomorrow," Diskin declared.
"This is a threat that's already knocking on our door."

Israel's Military Intelligence recently established a special division of
its super-secret signal intelligence and code-breaking group, Unit 8200, to
take responsibility for all cyberwar capabilities.

These are believed to be among the most advanced in the world. In 2008
Technolytics Institute, a private U.S. consultancy, rated Israel the
sixth-biggest "cyberwar threat" after China, Russia, Iran, France and
"extremist/terrorist groups."

The Jerusalem Post said May 5 that Unit 8200 was suspected of developing the
Stuxnet worm.

These developments have put the spotlight on Unit 8200, which in military
publications is known as the Central Collection Unit of the army's
Intelligence Corps.

For all the secrecy that shrouds it, Unit 8200 is one of the largest units
in the military, with several thousand personnel. It is commanded by a
brigadier general whose identity is classified.

The unit's functions are comparable to those of the U.S. National Security
Agency or Britain's Government Communications Headquarters.

Its main intelligence-gathering installation is the Urim base in the Negev
Desert.

Despite Diskin's disclosures, little is known about Israel's cyberwarfare
capabilities.

But Yadlin's comments a year ago shone some light on Israel's efforts.
Cyberwarfare, he allowed, "fits well with the state of Israel's defense
doctrine."

Two pillars of that doctrine are the pre-emptive strike and wherever
possible ensuring combat takes place in enemy territory rather than on
Israeli soil.

"Cyberspace grants small countries and individuals a power that was
heretofore the preserve of great states," Yadlin said.

"Fighting in the cyber dimension is as significant as the introduction of
fighting in the aerial dimension in the early 20th century."

        

 



[Non-text portions of this message have been removed]



------------------------------------

--------------------------
Want to discuss this topic?  Head on over to our discussion list, 
[email protected].
--------------------------
Brooks Isoldi, editor
[email protected]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [email protected]
  Unsubscribe:  [email protected]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to