Israel Is 15 Years Ahead in Cyber Warfare

The IDF's ongoing battle against cyber warfare has transformed the face of the Israeli military, but there is still much room for improvement, according to a senior IDF official.

The IDF's ongoing battle against cyber warfare has transformed the face of the Israeli military, but there is still much room for improvement, according to a senior IDF official.

Speaking on condition of anonymity, the senior officer said cyber attacks against Israel - while still ongoing - were down overall in 2015 compared to previous years.

Relating to recent revelations that both British and American intelligence agencies had spied on Israeli officials, and even hacked Israeli military software, the source insisted that Israel's secret codes "have not been decoded.. The IDF's code has not been decoded, and this is a great achievement," he said.

That said, he added that there is still plenty of room for improvement as far as the IDF's intelligence-gathering capabilities are concerned.

By way of example he cited the "worrying" fact that, during Israel's 2014 war with Gazan terrorists, "Hamas with other organizations succeeded in firing, despite all (Israel's) air- and cyber-superiority, more than 5,000 rockets and missiles towards Israel."

In confronting the range of rapidly evolving challenges facing Israel, its armed forces have to evolve just as rapidly, he added - sometimes in ways contrary to what one might expect. "The IDF of the modern age is a totally different army," he said.

Spy agencies and other hostile organizations focus a great deal of their efforts on hacking and penetrating governments' online resources, meaning internet-based resources are always vulnerable. One way of avoiding such problems altogether was by going offline, he continued, claiming Russia's security services were considering doing precisely that: conducting classified correspondence with good old-fashioned pen and paper - at least much as is operationally possible.

"Cyber warfare has become a legitimate tool," he added, pointing to a recent suspected Russian cyber attack on Turkey following the downing of a Russian fighter jet late last year.

"For around 20 hours this entire, large country (Turkey) was without internet," he said. "Not far from there, the power plants in Ukraine were shut down and Kiev airport was closed - all due to cyber activities."

While praising the "revolutionary" advances within the IDF, including the founding of a separate cyber arm of the military - on par with conventional land, sea and air forces - the official warned that the IDF was not immune to such attacks. However, the Israeli military does boast some of the most advanced cyber capabilities in the world.

"We are ahead of the rest of the world in digital capabilities by at least 15 years. We're integrated operational Internet capabilities which enable any commander to do anything in any place," the officer explained.

Only four other world militaries have similar capabilities: the United States, Britain, Germany - and Iran.

Ein News: 

« Cybersecurity To Go On The Offensive
Hidden In Plain Site: Paedophiles Use Facebook Groups »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Skybox Security

Skybox Security

Skybox combines firewall and network device data with vulnerability and threat intelligence, putting security decisions in your unique network context.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Prodera Group

Prodera Group

Prodera Group is a specialist technology consulting partner trusted to help navigate the complex and dynamic lifecycle of change and transformation.

Aunalytics

Aunalytics

Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions.

Obrela Security Industries

Obrela Security Industries

Obrela provides security analytics and risk management services to identify, analyze, predict and prevent highly sophisticated security threats in real time.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

Secolve

Secolve

Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure.