Israel Girds Itself for Cyber Warfare

Image result for 'israel cyber warfare'The threat of cyber terrorism is not new, but it has become more sophisticated. What defines cyber 'terrorism' as opposed to warfare might also be legally disputed since there is no concrete definition of what is fair in the cyber world. In recent years,

Israel has been the target of hacking campaigns by various groups going by the moniker Anonymous, operating under campaigns like #OpIsrael or #OpGaza. It is not known if Israel's well-known enemies might be behind the latest threat.

The Institute for National Security Studies warned yesterday that a group called AnonGhost was planning an “Electronic Holocaust” on April 7th in cyber-attacks against the Jewish State. "It’s very hard to prove, but we do see some kind with terrorist organizations as you mentioned as well as state sponsors of terror behind these events."

#OpGaza - named for the Twitter hashtag promoting the campaign – was a spontaneous campaign by hackers to retaliate against Operation Protective Edge. But #OpIsrael was planned in advance, with an unknown number of hackers taking part.

Even if terrorist organizations or governments are involved, their successes have been miniscule thus far.
The real danger of hacking secure networks or interfaces belonging to any government ministries is minimized by government efforts to defend against such attacks. When asked if the decentralized nature of Israeli bureaucracy – where some ministries have their own networks not attached to those of other ministries – Cohen says that this was an issue in the past that has been ameliorated.

At this point, the threat is mostly to Israeli civilians, mainly soft targets who might be attached to larger companies. “Last week, the Israeli government announced the establishment of new cyber security authority that is supposed to protect the civilian side of the Internet. Until then, it is less protected. “

When asked if the major threats included attacks against credit-card institutions, Cohen confirmed that was the main concern, but it is was not at all clear if attacks would be successful.

“The last two attacks purported to have stolen credit card information and released it on the Internet. But it was recycled information. It was already publicly accessible.”

Cohen asserts that the main benefit of cyber warfare with Israel that hackers can reasonably hope for is using psychological warfare, though its effects might feel devastating for those who experience or see the vandalism and hacking often associated with these attacks. Israel however is assumed to have a tremendous defensive and even offensive capability in cyber warfare. Cohen cites the joint American-Israeli operation that infected Iranian nuclear systems with the Stuxnet virus.

In terms of Israel’s offensive capabilities otherwise, Cohen says that if a country is known to have a strong defense against these attacks, it is assumed to have a reciprocally good offense. But the power of Israel’s counter-offensive power on the web might lie in the hands of its civilians, not its government. 

Israeli hackers humiliated several anonymous hackers whose IP addresses made them traceable, letting hackers use applications like Skype to hack computer cameras. The Israeli hackers subsequently took photos of the #OpGaza hackers, broadcasting them across the web.

Given the nascent nature of cyber warfare, Cohen says there is no definition of a “war crime” in cyberspace, though it has been debated.

Israel National News:  

 

« Iran has Built a Cyber Army Faster than Imagined.
China Admits to Having Cyber Warfare Units »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

SEEK

SEEK

SEEK create world-class technology solutions to address the needs of job seekers and hirers across multiple sectors including cybersecurity.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

National Cybersecurity Competence Centre (NC3) - Czech Republic

National Cybersecurity Competence Centre (NC3) - Czech Republic

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

Planisys

Planisys

Planisys is a cybersecurity leader specializing in cutting-edge DNS security and email security solutions.

Codacy

Codacy

Codacy is a developer-first, API-driven platform that provides a curated collection of best-in-class code analysis, security, coverage, and engineering performance tools.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.