The Double-Edged Sword of Cyber Warfare

Recently the Israeli army formally recognized cyber weapons as a fourth dimension of warfare, alongside land, air and sea, the defense minister sang the praises of digital weapons, saying that they can attack and conquer enemy assets without leaving a trace.

 “Cyberspace enables the attack of another nation state in offensive action, even reaching victory without leaving any fingerprints, even if it is suspected,” Defense Minister Moshe Ya’alon said at the fifth annual Cyber Security Conference at Tel Aviv University, according to a conference statement. “We are already there; we are not talking about some distant future. We have experienced this in Israel’s day-to-day actions against its enemies.”

The reference to offensive action was somewhat rare and it came just two weeks after Israel was fingered as a suspect in a cyberattack against participants in the nuclear negotiations with Iran.

On June 10 the Russian cybersecurity firm Kaspersky Lab ZAO asserted that it had been hacked and that the spyware smuggled into its own system had also been used to target three luxury European hotels, each of which hosted officials taking part in the international nuke talks.

The viruses, the Wall Street Journal reported, enabled the attackers to operate microphones in the hotels and compress and steal video feeds.

While the new virus bore no overt links to Israel, the Journal wrote, it was so complex and borrowed so heavily from Duqu, a program believed to be Israeli, that it “could not have been created by anyone without access to the original Duqu source code,” Kaspersky asserted in its report. Former heads of Unit 8200, Israel’s NSA equivalent, and the Shin Bet shrugged at the accusation. Carmi Gillon, a former head of the Shin Bet security service, speaking at a panel on cyber and military affairs, described a Russian attempt to spy on Israel’s Moscow embassy in the 1950s. He said the KGB at the time dug a nearly mile-long tunnel under the building in order to insert listening devices. “The policy is the same policy, the targets are the same targets, only the tools have changed,” he said.

Others suggested that the old code had been made public and could have been copied and pasted by anyone.
Brig. Gen. (res) Pinchas Buchris, a former head of Unit 8200, said that, “cyber capability will change the world.” He and Brig. Gen. (res) Yair Cohen, another former 8200 commander, touched on the offensive benefits of cyberwarfare. Cohen said Israel should strive to replicate with cyberweapons its opening salvo of the Six Day War, in which the IAF destroyed 180 enemy jets in three hours.

Buchris suggested, for instance, that while Hezbollah’s “stupid” or unguided rockets were immune to cyberattacks, its guided missiles could be targeted with cyberweapons. “Yes, you can deal with that,” he said. In general, though, Cohen said that cyberwarfare “favors the weak and not the strong.” And Buchris likened the situation to a balloon. He said cyber protectors are forced to try to guard the balloon with their hands while the attackers need only to strike “with a pin.”

Gillon suggested that today a terror organization could take over a jet plane and “achieve something like 9-11″ without fielding any flesh and blood attackers. In terms of 21st century military threats, he said that cyber “is second only to nuclear weapons.”
Ya’alon noted that criminal cyber activity is so prevalent today that it surpasses drug-related crimes internationally, but said that Israel has invested in protection and development to the point of being “a superpower.”

Ein News

 

« FBI Alert: CryptoWall Ransomware Damage $18 Million
The Dangers Of Internet-of-Things In Healthcare »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

General Dynamics Information Technology (GDIT)

General Dynamics Information Technology (GDIT)

General Dynamics IT delivers cyber security services to defend critical information and infrastructure.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.

Unified Infotech

Unified Infotech

Unified Infotech is a trusted partner for IT and software solutions dedicated to empowering businesses.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.