web analytics
August 30, 2014 / 4 Elul, 5774
At a Glance
Blogs
Sponsored Post
Jerusalem Mayor Nir Barkat (L) visits the JewishPress.com booth at The Event. And the Winners of the JewishPress.com Raffle Are…

Congratulations to all the winners of the JewishPress.com raffle at The Event



Home » Blogs » IDF Blog »

The Future of CyberWarfare

The main tools of cyber defense are not the switches, routers, or operating systems, but rather the cyber defenders themselves.
Lotem-C4i leads the IDF's cyber battlefront, deflecting threats to Israel's security.

Lotem-C4i leads the IDF's cyber battlefront, deflecting threats to Israel's security.
Photo Credit: IDF Spokesperson's Office

Tuesday, April 8, at the INSS (Institute for national security studies) in Tel Aviv, the head of the IDF Telecommunications Branch, Maj. Gen. Uzi Moshkovitz, spoke about the current and future states of cyber warfare and cyber defense. What follows is the speech he gave.

Everything is cyber

“When we look at data centers and information systems, they are basically entirely located in the cyber dimension. Everything can be attacked potentially. Everything is cyber.”

“Everything in this cyber dimension is new, dynamic and volatile. I’m going to talk about the defensive side.”

The human advantage

“The most important thing to us is human capital. Everything within the cyber domain relies upon the strength of our personnel. Therefore, we must restructure our education system. The main tools of cyber defense are not the switches, routers, or operating systems, but rather the cyber defenders themselves.”

Cyber warfare vs. air warfare

“Cyber warfare vs. air warfare – this is an inevitable comparison. Let’s look at history of air warfare between 1917 to 1939, right up to the beginning of World War II. During the last two years of WWI, air warfare was pretty much nonexistent. Twenty years later we had the Luftwaffe, the RAF (German and British air forces), which were highly influential factors.”

Moreover, this was almost a hundred ago, when the pace of technological advancement was not as rapid as what we are witnessing today. We can only imagine where the cyber dimension is heading in the coming decades.”

The rise of cyber warfare

“Why is the cyber domain so attractive? It influences everything – intelligence organizations are on a quest for the enemy’s secrets. During the last 35 years, all of our secrets and the enemy’s secrets have been stored inside computers. This makes the use of the cyber attacks obvious.

If we look upon psychological warfare and social media – this is about controlling people by controlling the internet. If we look at the Arab Spring, which erupted 3 years ago, it was solely initiated and propagated through social media. This is how people are controlled nowadays.”

The easy development of cyber warfare

“Let’s say you’re a nation and you develop ballistic capabilities or even intercontinental ballistic missiles. You have to have a very good engineering infrastructure and lots of money. If you’re lucky enough to have resources, it will take you a few years to have this capability.”

“On the hand, look at the cyber domain – if a nation wants to go from number 7 or 8 to number 2 or 3, it’s much easier. They will have almost no dependence on physical matters – they only need the the human capital. The cyber force buildup is very very cheap.

To attack a computer or a computer network that’s a mile away from you or 15,000 miles away from you – it’s basically the same. In the cyber domain, the physical distance between hostile parties has basically no importance, though this is a bit simplistic.”

“Our understanding is rapidly changing. Basic computers now control our water, our energy resources, and our transportation systems. The grid has now much wider and deeper significance than it had a few years ago. Say a stock exchange site goes down once a month – what does it do for the site’s credibility?”

The real threat of cyber warfare: unpredictability

“Yesterday we had an attack [OpIsrael] that we were aware of and able to defend against. This is not what we fear. We fear the attacks we don’t know about. We fear the enemies that have stabilized themselves within our networks of which we are unaware. Now, a party can be under attack and be totally unaware–this is different from classic warfare. Who attacked Georgia and Estonia a couple of years ago? We still do not know.”

About the Author:


If you don't see your comment after publishing it, refresh the page.

Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost.

If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked.

No Responses to “The Future of CyberWarfare”

Comments are closed.

SocialTwist Tell-a-Friend

Current Top Story
ISIS in Quneitra
Updates from Kuneitra, Syria [video]
Latest Blogs Stories
The Palestinian Authority backed by EU funds, has sent Bedouin into the E-1 area of Maaleh Adumim to claim it is part of their fictional history.

The new “Begin Plan” is an impending nightmare, it rewards the Bedouins for brazen land-grabbing.

its a deal

There is absolutely nothing for Israel’s security in this American document.

A Jewish wedding.

Is it because of corrupt values and lack of meeting opportunities that we have a shidduch crisis?

Islamic Law

Israel is fighting the war that none of the Western world has the ability or courage to fight.

Finish the job! Sayyem et a missima!סיים את המסימה!

Life after 50? You better believe it! Tips on how to prepare and enjoy life after retirement.

While I am no fan of the two-state solution, I think I have a solution for the Gaza strip. Let me make it perfectly clear that in no way do I believe a Palestinian people, nation or Arab State ever existed in the history of the world and certainly was not occupied by Israel. If […]

Hamas targeted the Erez Crossing when it knew that Gazans and Israeli Arabs would be there, out in the open…

Does it really take Jewish innovation to come up with this idea?

If you don’t know who’s behind The terror in your mind The answer’s not hard to find, Blame the Jews

If feminism is mentioned at all, it is usually to condemn it as an anti Torah ideal.

“…people making jokes about turning this into a shelter rave, taking #bombshelterselfies…”

Marriage is not just about emotional fidelity but about financial fidelity as well.

So you want to blame Israel? First answer these 5 simple questions, and see if you even have a leg to stand on…

Hamas’s online Jihadi supporters and groupies are desperately trying to differentiate between their support for Hamas and supporting ISIS.

We all got degrees. We got married. We had families. We worked. We and were Koveih Itim

More Articles from IDF Spokesperson's Office
Blurred faces, for security reasons, lead the IDF's secret defense against anti-Israel cyber warfare.

One missile explosion on Tel Aviv could cause a local disaster. One successful Hamas hack of IDF secrets could cause a national disaster.

Lt. Eitan

During Operation Protective Edge, IDF soldiers were faced with deadly risks in the Gaza Strip. Sixty four soldiers were killed and many more were wounded in combat. This is the story of one IDF commander who put his life in danger to rescue a soldier kidnapped by Hamas. Lt. Eitan, 23, joined the elite unit […]

Sgt. O’s commander: “We do not fight indiscriminately. We are an army not a terrorist organization.”

The discovery of a Hamas “urban warfare” manual by IDF forces reveals Hamas’ callous use of Gazans

IDF video of 1st day in Gaza, Operation Protective Edge

Hamas dramatically upgraded its weapons stockpile, placing millions of Israeli civilians at risk.

Terrorists involved in the rockets launched at Israel last week were targeted Friday by the IAF.

Printed from: http://www.jewishpress.com/blogs/idf-blog-blogs/the-future-of-cyberwarfare/2014/04/08/

Scan this QR code to visit this page online: