The Double-Edged Sword of Cyber Warfare

Recently the Israeli army formally recognized cyber weapons as a fourth dimension of warfare, alongside land, air and sea, the defense minister sang the praises of digital weapons, saying that they can attack and conquer enemy assets without leaving a trace.

 “Cyberspace enables the attack of another nation state in offensive action, even reaching victory without leaving any fingerprints, even if it is suspected,” Defense Minister Moshe Ya’alon said at the fifth annual Cyber Security Conference at Tel Aviv University, according to a conference statement. “We are already there; we are not talking about some distant future. We have experienced this in Israel’s day-to-day actions against its enemies.”

The reference to offensive action was somewhat rare and it came just two weeks after Israel was fingered as a suspect in a cyberattack against participants in the nuclear negotiations with Iran.

On June 10 the Russian cybersecurity firm Kaspersky Lab ZAO asserted that it had been hacked and that the spyware smuggled into its own system had also been used to target three luxury European hotels, each of which hosted officials taking part in the international nuke talks.

The viruses, the Wall Street Journal reported, enabled the attackers to operate microphones in the hotels and compress and steal video feeds.

While the new virus bore no overt links to Israel, the Journal wrote, it was so complex and borrowed so heavily from Duqu, a program believed to be Israeli, that it “could not have been created by anyone without access to the original Duqu source code,” Kaspersky asserted in its report. Former heads of Unit 8200, Israel’s NSA equivalent, and the Shin Bet shrugged at the accusation. Carmi Gillon, a former head of the Shin Bet security service, speaking at a panel on cyber and military affairs, described a Russian attempt to spy on Israel’s Moscow embassy in the 1950s. He said the KGB at the time dug a nearly mile-long tunnel under the building in order to insert listening devices. “The policy is the same policy, the targets are the same targets, only the tools have changed,” he said.

Others suggested that the old code had been made public and could have been copied and pasted by anyone.
Brig. Gen. (res) Pinchas Buchris, a former head of Unit 8200, said that, “cyber capability will change the world.” He and Brig. Gen. (res) Yair Cohen, another former 8200 commander, touched on the offensive benefits of cyberwarfare. Cohen said Israel should strive to replicate with cyberweapons its opening salvo of the Six Day War, in which the IAF destroyed 180 enemy jets in three hours.

Buchris suggested, for instance, that while Hezbollah’s “stupid” or unguided rockets were immune to cyberattacks, its guided missiles could be targeted with cyberweapons. “Yes, you can deal with that,” he said. In general, though, Cohen said that cyberwarfare “favors the weak and not the strong.” And Buchris likened the situation to a balloon. He said cyber protectors are forced to try to guard the balloon with their hands while the attackers need only to strike “with a pin.”

Gillon suggested that today a terror organization could take over a jet plane and “achieve something like 9-11″ without fielding any flesh and blood attackers. In terms of 21st century military threats, he said that cyber “is second only to nuclear weapons.”
Ya’alon noted that criminal cyber activity is so prevalent today that it surpasses drug-related crimes internationally, but said that Israel has invested in protection and development to the point of being “a superpower.”

Ein News

 

« FBI Alert: CryptoWall Ransomware Damage $18 Million
The Dangers Of Internet-of-Things In Healthcare »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

Networks Unlimited

Networks Unlimited

Networks Unlimited is a leading value-added distributor in Africa, providing technology solutions with a focus on security, networking, enterprise systems management and cloud technologies.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Tausight

Tausight

Tausight is an AI-Powered patient data security startup with a mission of reducing healthcare cyber incidents using a more proactive, risk management philosophy.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Bluerydge

Bluerydge

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals.

Tech Data

Tech Data

Tech Data, a TD Synnex company, is a leading global distributor and solutions aggregator for the IT ecosystem.