. Space Industry and Business News .




.
CYBER WARS
After Iran strike, Israel gets cyber unit
by Staff Writers
Tel Aviv, Israel (UPI) Aug 16, 2011

disclaimer: image is for illustration purposes only

Israel's military has set up a cyberdefense division, primarily against the Iranian threat, thus boosting the country's cyberwar capabilities after it allegedly attacked Tehran's nuclear program in 2010 with the Stuxnet virus and changed the face of warfare.

The Jerusalem Post reports that the new unit in the C4I Directorate -- command, control, communications, computers and intelligence -- is headed by an army colonel who formerly commanded Matzov, the Hebrew acronym for the Center for Encryption and Information Security.

That's the unit previously responsible for protecting military networks and strategic state concerns such as water and electricity from cyberattack.

The addition of the cyberdefense division followed the announcement by Israeli Prime Minister Binyamin Netanyahu in July of the creation of a National Cybernetic Task Force, believed to comprise at least 80 people, to defend Israel's vital infrastructure from Internet-based strikes.

The division is expected to work closely with Israel's expanding high-tech sector, one of the most advanced in the world, and its defense industry to develop systems to shield the economy and government from cyberattacks.

Little is known about the new unit, or indeed about Israel's expanding cyberwar capabilities but it is widely believed that Israel has become the leading practitioner of cyberwarfare.

This stems from the ground-breaking use of the highly sophisticated Stuxnet computer virus against Iran, a strike widely attributed to Israel. The attack was detected in the Islamic Republic's uranium enrichment facility at Natanz, 160 miles south of Tehran, in June 2010.

The virus reportedly attacked highly secure computers and manipulated the arrays of centrifuges, which do the enriching, to self-destruct.

It was a stunning blow to Iran's contentious nuclear program, which Israel and the United States allege is intended to produce nuclear weapons. Tehran denies that.

Frank Rieger, a key member of the hacker group known as the Chaos Computer Club, calls the Stuxnet weapon "a digital bunker-buster."

International cyber specialists reportedly tracked the virus through a maze of false Internet sites to Israel's foreign intelligence service, the Mossad.

German newsmagazine Der Spiegel said Israeli sources familiar with the Stuxnet operation insist it was "a blue-and-white operation … a purely Israeli operation," referring to Israel's national colors.

The sources say that a secret unit of Israel's Military Intelligence -- most likely the highly classified Unit 8200 which traditionally has been responsible for signals intelligence -- was responsible for programming much of the Stuxnet code.

Mossad did the rest and first unleashed the computer-killing virus June 22, 2009, against Iran, the report said. That was the first of three attacks that led to the sabotaged centrifuges at Natanz.

Iran has made a major effort to develop a cyberattack capability to retaliate for the extensive damage reportedly caused at Natanz, which apparently set back the nuclear program by several months.

It's difficult to determine what progress the Iranians have made but in March, Gen. Ali Fazli, commander of the Revolutionary Guards Corps' paramilitary Basij organization, claimed it had launched attacks on Web sites of "the enemies."

Yuval Diskin, the former head of Israel's General Security Service, known as Shin Bet, said before he stepped down in April that the Israelis have detected what appeared to be several attempts to attack key infrastructure centers in the Jewish state.

"All over the world, including in Israel, there are cyberattacks," Diskin said. "We can't say for certain the attacks were against critical infrastructure but there are fingerprints and tracks that indicate maybe there were attempts and they were treated.

"Israel needs to grow in this field since this is something that's happening today already -- and it's not waiting for tomorrow. This is a threat that's already knocking on our door."

As far as can be determined, this battle in cyberspace has been going on since 2004.

That's when Israel revealed that the cryptologists with Unit 8200 had cracked an Iranian communications code that allowed the Israelis to read message traffic concerning Iran's secret nuclear program.

It's highly unusual for the Israelis -- or anyone else, for that matter -- to admit being able to decipher an adversary's codes. But a recent analysis noted that "perhaps the Iranians stopped using the code in question, or perhaps the Israelis just wanted to scare the Iranians."




Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries








. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
'Hacktivists' target San Francisco subway website
San Francisco (AFP) Aug 14, 2011
The international group of hackers known as Anonymous began a cyber attack on the San Francisco subway's online presence Sunday, in retaliation for the agency's bid to shut down cellphone service to limit a protest over a fatal shooting. As of late Sunday the main website for the Bay Area Rapid Transit (BART) was still functioning, but the San Francisco Chronicle and other media reported the ... read more


CYBER WARS
First quantitative measure of radiation leaked from Fukushima reactor

Shooting light a curve

Catalyst that makes hydrogen gas breaks speed record

Coffee stain helps smarter inks

CYBER WARS
Space Command retires workhorse satellite

Raytheon Develops Miniature Antenna To Extend Millimeter Wave Friendly ID Technology

China launches another experimental satellite

USAF Approves Production of NGC Deployable Digital Wireless System for Remote Warfighters

CYBER WARS
NASA selects Virgin Galactic for Suborbital Flights

Arabsat-5C is welcomed in French Guiana for Arianespace's next Ariane 5 launch

SES-2 Satellite Launch Preparations Kick off in Kourou

Arianespace blasts another pair of satellites into orbit

CYBER WARS
S. Koreans file class action suit against Apple

Raytheon Wins Navy GPS Positioning, Navigation and Timing Service Contract

Technology Plays Important Role to Improve the Wine Industry

S. Korea to fine Apple over tracking feature

CYBER WARS
Embraer plans to build executive jets in China

Cathay Pacific first-half net profit falls 59%

Model will help monitor airport security

Making airport runways safer

CYBER WARS
Taking inspiration from spilled milk

Bilayer graphene: Another step toward graphene electronics

Strain and spin may enable ultra-low-energy computing

New tool may yield smaller and faster optoelectronics

CYBER WARS
Smoke from Virginia Lateral West Fire

Critical Milestone Reached for 2012 Landsat Mission

China to launch civil survey satellite late this year

NPP Satellite Completes Comprehensive Testing

CYBER WARS
Mercury-loving bugs speed help for toxic spills

Heavy metal in and around the lakes

In polluted Nigerian region, a disaster long in the making

China paper warns against demos after plant shuts


Memory Foam Mattress Review
Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News
.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2011 - Space Media Network. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement