Israel Girds Itself for Cyber Warfare

Image result for 'israel cyber warfare'The threat of cyber terrorism is not new, but it has become more sophisticated. What defines cyber 'terrorism' as opposed to warfare might also be legally disputed since there is no concrete definition of what is fair in the cyber world. In recent years,

Israel has been the target of hacking campaigns by various groups going by the moniker Anonymous, operating under campaigns like #OpIsrael or #OpGaza. It is not known if Israel's well-known enemies might be behind the latest threat.

The Institute for National Security Studies warned yesterday that a group called AnonGhost was planning an “Electronic Holocaust” on April 7th in cyber-attacks against the Jewish State. "It’s very hard to prove, but we do see some kind with terrorist organizations as you mentioned as well as state sponsors of terror behind these events."

#OpGaza - named for the Twitter hashtag promoting the campaign – was a spontaneous campaign by hackers to retaliate against Operation Protective Edge. But #OpIsrael was planned in advance, with an unknown number of hackers taking part.

Even if terrorist organizations or governments are involved, their successes have been miniscule thus far.
The real danger of hacking secure networks or interfaces belonging to any government ministries is minimized by government efforts to defend against such attacks. When asked if the decentralized nature of Israeli bureaucracy – where some ministries have their own networks not attached to those of other ministries – Cohen says that this was an issue in the past that has been ameliorated.

At this point, the threat is mostly to Israeli civilians, mainly soft targets who might be attached to larger companies. “Last week, the Israeli government announced the establishment of new cyber security authority that is supposed to protect the civilian side of the Internet. Until then, it is less protected. “

When asked if the major threats included attacks against credit-card institutions, Cohen confirmed that was the main concern, but it is was not at all clear if attacks would be successful.

“The last two attacks purported to have stolen credit card information and released it on the Internet. But it was recycled information. It was already publicly accessible.”

Cohen asserts that the main benefit of cyber warfare with Israel that hackers can reasonably hope for is using psychological warfare, though its effects might feel devastating for those who experience or see the vandalism and hacking often associated with these attacks. Israel however is assumed to have a tremendous defensive and even offensive capability in cyber warfare. Cohen cites the joint American-Israeli operation that infected Iranian nuclear systems with the Stuxnet virus.

In terms of Israel’s offensive capabilities otherwise, Cohen says that if a country is known to have a strong defense against these attacks, it is assumed to have a reciprocally good offense. But the power of Israel’s counter-offensive power on the web might lie in the hands of its civilians, not its government. 

Israeli hackers humiliated several anonymous hackers whose IP addresses made them traceable, letting hackers use applications like Skype to hack computer cameras. The Israeli hackers subsequently took photos of the #OpGaza hackers, broadcasting them across the web.

Given the nascent nature of cyber warfare, Cohen says there is no definition of a “war crime” in cyberspace, though it has been debated.

Israel National News:  

 

« Iran has Built a Cyber Army Faster than Imagined.
China Admits to Having Cyber Warfare Units »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

ITsMine

ITsMine

ITsMine’s Beyond DLP™? solution is a leading Data Loss Prevention (DLP) solution used by organizations to protect against internal and external threats automatically.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.