[Infowarrior] - Israel adds Cyber-Attack to IDF
Richard Forno
rforno at infowarrior.org
Fri Feb 12 12:39:05 UTC 2010
Israel adds Cyber-Attack to IDF
http://www.aviationweek.com/aw/generic/story_channel.jsp?channel=defense&id=news/dti/2010/02/01/DT_02_01_2010_p39-198440.xml
By David Eshel
Tel Aviv
There is no equivocation in how the Israeli military views cyber-
security. “Using computer networks for espionage is as important to
warfare today as the advent of air support was to warfare in the 20th
century,” says Maj. Gen. Amos Yadlin, chief of military intelligence.
Speaking recently at the Institute for National Security Studies
(INSS) here, Yadlin says the ability to collect information and launch
cyber-attacks gives small countries, terror groups and even
individuals the power to inflict serious damage unlimited by range on
a target—the kind of damage that was once the province of large
countries.
Noting that the U.S. and Britain are setting up cyber-warfare
commands, Yadlin says Israel has its own soldiers and officers working
on an “Internet warfare” team dedicated to cyber-security. The issue
is critical for many governments. In the U.S., Lockheed Martin
recently opened the NexGen Cyber Innovation and Technology Center to
address global cyber-security needs. The company has helped launch an
industry association focusing on providing government, business and
industry (including defense contractors) with integrated cyber-
security solutions (see p. 43).
In confronting cyber-attacks, military intelligence has become a
combat arm of the Israel Defense Forces (IDF). Computer networks are
being exploited by hacking into databases or carrying out sabotage
with malicious software (malware) that infiltrates and inflicts damage
in adversary computers.
To counter cyber-attack, Yadlin says Israel’s armed forces have the
means to provide adequate network security. “The cyber-warfare field
fits well with Israel’s defense doctrine.”
The ubiquity of the Internet and its ease of use make it vulnerable to
infiltration, exploitation and sabotage. IDF intelligence estimates
that several countries in the Middle East use Russian hackers and
scientists to operate on their behalf. Since the 2006 war against
Hezbollah, when cyber-warfare was part of the conflict, Israel has
attached growing importance to cyber-tactics.
Israel in fact is, along with the U.S., France and a couple of other
nations, a leader in cyber-war planning. Cyber-warfare teams are
integrated within Israel’s spy agencies, which have rich experience in
traditional sabotage techniques.
Israel’s high-tech industry is at the forefront of computer and
software development, particularly in the areas of security and
communications. Companies such as Comverse and Nice Systems are world
leaders in “legal eavesdropping” networks, while Checkpoint Software
is an innovator in network security. Many international high-tech
companies are locating research and development operations in Israel,
where local hires are often veterans of the IDF’s elite computer units.
In fact, most of Israel’s technical know-how originates from the army,
especially the computer and C4I (command, control, communications,
computers and intelligence) division of the intelligence branch.
Veterans of these specialized units have become the mainstay of top-
secret work at tech companies.
While it is clear Israel has successfully used cyber-tactics against
enemies, it is harder to know to what extent it has been hit by cyber-
attacks. Israel says little about its cyber-operations, but occasional
leaks point to a trend of active involvement by computer experts in
covert and sometimes overt operations.
In September 2007, for example, Israeli jets destroyed a suspected
nuclear facility under construction in a remote part of Syria. From
what journalists have discerned, Israel jammed Syrian radar and other
defenses, allowing sufficient time to launch the strike undetected.
During the attack, cyber-tactics appeared to involve remote air-to-
ground electronic attack and network penetration of Syria’s command-
and-control systems.
There is evidence that a sophisticated network attack and electronic
hacking capability have become indispensable components of the IDF
arsenal. Government-owned Elta Systems, an authority on communications
intelligence (comint), recently announced a line of “CellInt” support
systems, offering cross-border interception of cellular networks and
active monitoring of satellite links, including those operated by the
UAE’s Thuraya satellite communications network, used throughout
Southwest Asia. Elta’s cyber-warfare systems, activated from ground,
naval, airborne or unmanned platforms, intercept a target network,
track connections and calls between networks, and infiltrate deep into
an enemy’s communications loop.
The vanguard of Israel’s cyber-warfare efforts is focused on blocking
Iran’s nuclear ambitions. A U.S. expert said recently that malware
could be inserted, disrupting the controls of sensitive sites like
uranium enrichment plants. The appeal of cyber-attacks has increased,
Israeli intelligence sources say, due to the limited feasibility of
air strikes on the distant and heavily fortified Iranian nuclear
facilities, and by U.S. reluctance to open another war front in the
region. The newspaper Ha’aretz reports that Israeli intelligence has
tried to insert malware that can damage information systems within
Iran’s nuclear program. The systems are not connected to the Internet,
but to equipment sold to the Iranian government
This is the future of cyber-war. Modern societies are complex networks
of people, information systems and equipment. Enormous advantages will
be obtained by adversaries that quickly identify and neutralize
critical nodes within the systems.
Apart from the military, two other government bodies operate in the
field of cyber-warfare. Shin Bet, Israel’s internal security
authority, directs its focus on Palestinians and Israeli Arabs. The
agency has established a department for the protection of information
that is responsible for coordinating network security of government
and infrastructure of strategic importance, such as Israel’s electric
utility or the Mekorot water company. A special department in the
finance ministry also works to protect government cyber-systems from
being hacked.
While critical systems are not directly connected to the Internet,
they can be penetrated and attacked by indirect means, such as
stealthy “Trojan horses” planted in electronic devices like cell
phones, personal digital assistants and computers, through file-
sharing services or through the Internet without an owner’s knowledge,
turning personal communicators into active eavesdropping devices.
Cyber-attacks against Israeli networks have been encountered in recent
conflicts. When tensions with Hamas or the Palestinian Authority flare
up, Israeli web sites immediately suffer a barrage of virtual
assaults. During Operation Cast Lead in Gaza last year, cyber-attacks
were unusually severe, peaking with millions of junk mail deliveries
lasting for days.
Israel has made major investments in infrastructure as part of the
global war on terrorism and the related fight against money-laundering
and financial support of terrorist activities. Agencies are targeting
individuals and groups of known terrorist supporters in an attempt to
extract intelligence from e-mails, chat rooms, instant messaging and
Internet phone calls. But there are more layers of information to be
mined below such direct intercepts, empowering services with the
capability to spot, track and isolate suspicious objectives through
mass interception methods. Employing mass interception requires
sophisticated analysis tools and processing reams of information,
enabling services to trace network activities and extract clues by
analyzing volumes of communications.
Though considered vulnerable to hostile intercepts, wireless cellular
networks offer Western intelligence agencies dramatic advantages,
since they have become common in Third World countries and in areas
not covered by U.S. and European lawful interception acts. Exploited
by modern communications intelligence, wireless connections—including
WiFi, microwave links, local area networks, cellular systems and WiMax
broadband mobile links, and even satellite networks—are easily
intercepted, providing covert access to a wealth of information
without subscribers’ or operators’ knowledge.
Hence, the demand for comint equipment. Physical networks considered
relatively safe from eavesdropping have become vulnerable to stealthy
probes, with bugging devices capable of capturing traffic over
broadband channels and gathering intelligence by searching for
suspicious words, phrases and names.
Critical government systems are run on intranets, networks that
operate independently from the Internet and often carry sensitive and
classified information. A nation’s most secret networks are
increasingly “air-gapped,” meaning they do not link to other systems.
But many government webs still have points at which they interface
with the Internet, and thus can be infected with malware. So even
though intranets are relatively controlled environments, one mistake
in procedure, however slight, can compromise an entire network.
Eternal vigilance, it has been said, is the price of freedom, and, it
appears, of cyber-security.
More information about the Infowarrior
mailing list