The Israeli military and security circles have added a new combat front next to the land, sea and air arenas, which is the electronic warfare front, which is draining intelligence and financially. The spider, and the countermeasures invented by Israel to protect itself from this front that strikes it in its soft side, and at the same time its power in the cyber world, the latest of which is the attack on the Iranian nuclear facility, Natanz.
- What is cyber wars?
Read also Cyber wars .. Fears in Tel Aviv about piracy of the data of hundreds of thousands of Israelis, including military personnel The world is in the grip of the Mossad … the dark secrets of Israeli technology companiesIran opens a “virtual embassy” in Jerusalem … and lifts the ban on its athletes confronting their Israeli counterparts
The Israeli security services define cyber wars as attacks of unknown origin, and at the same time devastating, they wage a “secret shadow war” behind the keyboard, and are classified as the most anti-weapons of the Israeli army, and they usually target infrastructure facilities in Israel, attacks that are capable of disrupting them and the collapse of its computers .
Israel has been involved in technological wars for nearly 16 years, and it does not hesitate to admit that cyberattacks are a battle of stubborn intelligence minds with its enemies from organizations and countries, and that is why the army and security are gathering information about potential attackers who are planning to break into Israeli operational networks.
- Where are the security risks to Israel from the Internet wars?
Cyber threats pose a threat to the Israeli infrastructure, including targeting government and security sites, targeting water and sanitation companies, and infiltrating thousands of computers, command and control centers in the Water Authority, banks and banks, as pirates do not exclude anything from their targeted attacks, including leaking information about Israelis.
The electronic warfare also included broadcasting videos showing Tel Aviv burning, and threats against Israel in the Hebrew language. There are dozens of prominent Israeli companies that have been attacked by pirates, including Shirbit, Amial, Intel, Elta and Fortnox. .
- How did Israel respond to hostile cyberattacks?
Israel has worked on two tracks to confront “cyber” attacks. The first is the defensive one. It believes that its army is a very attractive target for hostile attacks and cannot bear the loss. As part of the multi-year plan, Gideon, former Chief of Staff Gadi Eisenkot decided to create a cyber system to operate an electronic unit. To protect the civilian and military infrastructure from external attacks.
On the offensive path, Israel has carried out many cyber attacks, and some of them have disrupted infrastructure facilities in certain countries, without claiming responsibility for them, but their consequences and consequences were grave, and some of them were represented in the collapse of its computer equipment, disrupting the movement of ships for long days, and so it appeared. Israeli electronic warfare is coming to light, after it was usually in the dark.
- Why is Israel failing in its cyber counter efforts?
The experience of recent years proves that the Israeli attempts to repel cyber attacks have clearly failed, as evidenced by their continued targeting from time to time via the Internet, whether by individual pirates or countries, and today Israel faces daily attempts to demolish its defensive walls and infiltrate army systems, and therefore it is facing tens and hundreds Attacks are every year, because their perpetrators only need a computer and an Internet connection.
It has become clear that Israel cannot bear more frequent cyber attacks, and therefore it is defending itself against the attacks that have continued for years, with patrols, cameras, and fighters in the technical field, and if it does not have intelligence information, it is because the Internet is noisy, and it is difficult to limit its movement. In it, the mission of the electronic defense system is to create an environment that facilitates the location of control points, verification of their authenticity, and the removal of the threat.
Israel admits that failure to improve digital communication between its different wings and units increases the army’s vulnerability to hostile cyber attacks, and makes its work more complicated, as it cannot be 100% protected in the Internet world, as evidenced by the exposure of the Israeli economy and defense industries to
This is a modal window.
We are having an unexpected problem, check and try again shortly
Error code: MEDIA_ERR_UNKNOWN Session ID: 02-05-2021: 87f17668ebc3ebd7185c7ac7 Trigger object ID: vjs_video_3
- Is attacking “Natanz” part of Israel’s cyber strategy?
The Israeli attack on the Iranian nuclear facility Natanz was the latest thing that the Israeli technical intelligence system did through the cyber wars, by cutting off the electricity network that feeds centrifuges, and this attack came through the benefit of Israel from the huge information it obtained after the theft of the Iranian nuclear archive in 2018.
In 2020, Israel targeted the largest Iranian port at the Shahid Rajai station in Bandar Abbas with a cyber attack, from which 60% of Iranian trade passes through the Strait of Hormuz and includes the most important strategic naval base for Iran.
Where is the Palestinian resistance in the electronic war against Israel?
Hamas is waging an electronic war against Israel via the Internet, although its capabilities in this field are modest, but during the last decade it has invested a lot of financial capabilities and equipment to establish a technical system to collect intelligence on the Israeli army.
In the first Gaza war in 2008, the movement attacked a number of Israeli websites, including the websites of the Home Front Command and the military spokesman for the army, and in 2013 a group of hackers in the name of Izz al-Din al-Qassam fighters attacked the website of the American Express Company in Israel, and during the 2014 Gaza war it recorded An increase in attempts to attack websites, for civilian and military objectives, in Israel.
And in 2017, it was revealed that dozens of Israeli soldiers and officers’ cell phones had been hacked by Hamas “hackers”, who had broken into groups on Facebook, some of which were closed, dealing with military issues, and talking about military training and recruitment of soldiers.
In 2018, the army revealed that Hamas launched an organized electronic attack through forged accounts on social networks, with the aim of controlling the soldiers’ phones, and attempted to attack them via WhatsApp, and it succeeded in this attack relatively by obtaining cameras and mobile phones.
In the same year, the Information Security Network “Clersky” revealed that Hamas tried to plant spyware in the mobile devices of the Israelis by downloading them through fake accounts on Facebook and Twitter, so that the attacking device succeeded in tracking the device that was attacked and controlling it remotely.
- What are the most important Israeli confessions about the danger of cyber wars?
Senior leaders of the security and military systems in Israel have been warning against this combat front that was not on the list of threats years ago. Tamir Pardo, the former head of the Mossad, confirmed that “cyber wars have made the threat of chaos the most effective weapon for future victories; the enemies of Israel They will not need aircraft or missiles, only that they can possess technological capabilities and cyber capabilities to attack them, in order to cause paralysis in all areas of their work. “
A high-ranking Israeli security source also warned against “the anti-Israeli forces possessing these technical capabilities, because it gives them the possibility to“ demonize ”Israel, and this is the nightmare, because Israel now feels that the F-16s and tank columns will not cause damage as well. It can play covert hostile cyber attacks. ” Advertising
Meir Hayoun, head of the Violence and Crime Prevention Organization in Israel, said, “Some of the challenges that face us are that the hackers and pirates penetrated elements are distinguished by advanced intelligence, and do not leave traces behind them to be tracked, so we are exerting vigorous efforts to collect information about them. We are fighting a war in the cyber field that does not stop, and we are facing Internal and external challenges in the field of infiltrations from hostile parties.