Israel Is 15 Years Ahead in Cyber Warfare

The IDF's ongoing battle against cyber warfare has transformed the face of the Israeli military, but there is still much room for improvement, according to a senior IDF official.

The IDF's ongoing battle against cyber warfare has transformed the face of the Israeli military, but there is still much room for improvement, according to a senior IDF official.

Speaking on condition of anonymity, the senior officer said cyber attacks against Israel - while still ongoing - were down overall in 2015 compared to previous years.

Relating to recent revelations that both British and American intelligence agencies had spied on Israeli officials, and even hacked Israeli military software, the source insisted that Israel's secret codes "have not been decoded.. The IDF's code has not been decoded, and this is a great achievement," he said.

That said, he added that there is still plenty of room for improvement as far as the IDF's intelligence-gathering capabilities are concerned.

By way of example he cited the "worrying" fact that, during Israel's 2014 war with Gazan terrorists, "Hamas with other organizations succeeded in firing, despite all (Israel's) air- and cyber-superiority, more than 5,000 rockets and missiles towards Israel."

In confronting the range of rapidly evolving challenges facing Israel, its armed forces have to evolve just as rapidly, he added - sometimes in ways contrary to what one might expect. "The IDF of the modern age is a totally different army," he said.

Spy agencies and other hostile organizations focus a great deal of their efforts on hacking and penetrating governments' online resources, meaning internet-based resources are always vulnerable. One way of avoiding such problems altogether was by going offline, he continued, claiming Russia's security services were considering doing precisely that: conducting classified correspondence with good old-fashioned pen and paper - at least much as is operationally possible.

"Cyber warfare has become a legitimate tool," he added, pointing to a recent suspected Russian cyber attack on Turkey following the downing of a Russian fighter jet late last year.

"For around 20 hours this entire, large country (Turkey) was without internet," he said. "Not far from there, the power plants in Ukraine were shut down and Kiev airport was closed - all due to cyber activities."

While praising the "revolutionary" advances within the IDF, including the founding of a separate cyber arm of the military - on par with conventional land, sea and air forces - the official warned that the IDF was not immune to such attacks. However, the Israeli military does boast some of the most advanced cyber capabilities in the world.

"We are ahead of the rest of the world in digital capabilities by at least 15 years. We're integrated operational Internet capabilities which enable any commander to do anything in any place," the officer explained.

Only four other world militaries have similar capabilities: the United States, Britain, Germany - and Iran.

Ein News: 

« Cybersecurity To Go On The Offensive
Hidden In Plain Site: Paedophiles Use Facebook Groups »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Lares Consulting

Lares Consulting

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing and coaching.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

Alcon Maddox

Alcon Maddox

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Serving clients across the Middle East & Europe

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

Sansec Technology

Sansec Technology

Sansec Technology is dedicated to the research and development of cryptographic products and solutions for cyber security.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.