Cyber Command: A War That Started Long Ago

Israeli-Military-To-Unify-Cyber-Capabilities-For-Defensive-Operations.jpgThe Israeli military has announced Friday its plans to consolidate all of its cyber warfare capabilities under a unified Cyber Command 

The Israel defense forces (IDF) decision to officially establish a cyber command is a symbolic act. According to foreign sources Israel has been active in cyber wars for years.

It’s almost the perfect paradox. While countries develop very deadly weapons – some non-conventional – some of these countries also develop silent agents – deception tools that at the end of the day may result in leaving the triggers un-squeezed.

According to recent press reports, some years ago Israel has managed to slow down the Iranian race to the bomb, by using a “worm” type computer virus that caused havoc in the Iranian centrifuge facilities that are working to produce the needed uranium for a nuclear weapon.

Israel has not reacted to the stories that claimed who was behind that cyber attack, but the Iranians had to confirm that the “worm” was very effective in slowing down their nuclear programme. This story is a very rare indication to the “parallel war” fought in the dark and far from any defined war zone.

In recent years the, the Lebanese claimed that they found artificial rocks on mountains overlooking some of the most strategic areas in the country. They showed photographs of equipment that were concealed in the “rocks” and these could not leave any doubt about its origin. Israel again did not react but the writing was on the mountain. Before that, the Lebanese claimed that the Israelis penetrated their cellular infrastructure as part of a vast espionage effort.
Other publications leaked to Wikileaks, claimed that the attack on the nuclear facility in Syria in 2007, was performed by Israel and that the Israeli air force fighter jets penetrated the Syrian airspace after Israel managed to take control of the country’s early warning system. The nuances are important – not blinding the Syrian radar but taking control over it, in a way that it did not have any chance of detecting the Israeli fighters.

All these are of course leaked reports and “wild” stories of journalists but if only some are true,  the trend is crystal clear – in order to win a war or to perform a “surgical” attack it’s not enough to have fighter jets with precision bombs . There is a need to manipulate the enemy, deceive it , cause confusion and then attack and get out without meeting any resistance.
The next paragraph is very general on purpose, and is based on adding some known facts together – Israel is a high tech superpower. The IDF and the Mossad have special units that develop tools for cyber wars. These units are trying to be at least one step ahead of anyone else that is considered and may be considered a potential enemy.

It can be assumed that like in other areas, the Israeli need resulted in quantum jumps ahead. It happened with unmanned air vehicles (UAVs) that were needed for wars. It makes sense that the need to supply the right tools for Cyber war for the armed forces and secret services, also resulted in positioning Israel at least one generation ahead of its adversaries .
Israel destroyed the Iraqi nuclear reactor in 1981. According to press reports, it destroyed convoys of arms on their way to the Gaza strip while they travelled in the desert of Sudan. According to press reports, it managed to intercept shipments of arms to the Hezbollah in Lebanon and bring the ships that carried it to a ready “traps”.
There is no doubt – cyber wars are fought in the Middle East on a daily basis and they are becoming more complex, more sophisticated and more focused.

Part of the “trick” in such military cyber war, is to let the enemy think that nothing happens. Unlike in many cases of electronic warfare, when the enemy gets indications that something wrong happens , in the cyber war,  the target is to keep the radar and other early warning sensors’ operators calm until the attack is over. The surprise is complete and swift.
While Israel is continuing to purchase and manufacture the most advanced weapon systems, experts in the new type of warfare are looking for the next hole in the shield. This is a war between minds, between “wild” concepts that are based on long experience but also on the fact that the most advanced national facilities of every country rely on computers. The “fire walls” are there but the new warriors look for the smallest crack and to believe recent report they find them.
Can cyber attacks win a war? Can these attacks become a substitute to real weapon systems? Talking with the experts you get a somewhat contradicting picture – while some say that this is the shape of wars to come, others say that this is only a complementary asset.

But one thing is obvious – the higher the importance of the designated target, the bigger the effort put into the “cyber weapons”. The dilemma about cyber wars has a great resemblance to the one concerning UAVs. Should an air force invest in more manned platforms or instead channel the limited budgets to additional more sophisticated UAV’s?  The two dilemmas will be in the air for years to come because there is no general, not to mention a politician that can or actually wants to make the decision. But the dilemmas are self solved. The UAVs will take over many tasks of manned aircraft in an increasing pace. It’s enough to see the growing number of unmanned combat air vehicles (UCAVS) programmes to understand the trend. The same thing is applicable to cyber war systems. These will become more complex and more sophisticated. Will they replace fighter jets, missiles and tanks?

Judging by the alleged use of cyber wars in the Middle East in recent years, the answer is positive. It will be a slow process but is will happen as this is the ultimate war tool. To attack the enemy, destroy him without him getting any warning or understanding what hit him. The “weapons” of this new type of war are being developed in secret facilities and by teams of geniuses that will probably never hold an assault rifle but will in spite win many wars.
iHLS:  http://bit.ly/1KGJApx

 

« Legality of Target Acquisition: The U.S. Needs a Drone Board
Online Anonymity Box Distances Your IP Address »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

SecWest

SecWest

SecWest is the organizer of CanSecWest, PACSEC, originator of PWN2OWN, security auditing, and virtual engagement/training.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

ResilientX

ResilientX

ResilientX is an All-In-One Security Testing Platform designed to help MSPs and SMBs to perform their security testing and assessments without having to outsource IT.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.