web analytics
February 1, 2015 / 12 Shevat, 5775
 
At a Glance
Blogs
Sponsored Post


Home » Blogs » IDF Blog »

The Future of CyberWarfare

The main tools of cyber defense are not the switches, routers, or operating systems, but rather the cyber defenders themselves.
Lotem-C4i leads the IDF's cyber battlefront, deflecting threats to Israel's security.

Lotem-C4i leads the IDF's cyber battlefront, deflecting threats to Israel's security.
Photo Credit: IDF Spokesperson's Office

Tuesday, April 8, at the INSS (Institute for national security studies) in Tel Aviv, the head of the IDF Telecommunications Branch, Maj. Gen. Uzi Moshkovitz, spoke about the current and future states of cyber warfare and cyber defense. What follows is the speech he gave.

Everything is cyber

“When we look at data centers and information systems, they are basically entirely located in the cyber dimension. Everything can be attacked potentially. Everything is cyber.”

“Everything in this cyber dimension is new, dynamic and volatile. I’m going to talk about the defensive side.”

The human advantage

“The most important thing to us is human capital. Everything within the cyber domain relies upon the strength of our personnel. Therefore, we must restructure our education system. The main tools of cyber defense are not the switches, routers, or operating systems, but rather the cyber defenders themselves.”

Cyber warfare vs. air warfare

“Cyber warfare vs. air warfare – this is an inevitable comparison. Let’s look at history of air warfare between 1917 to 1939, right up to the beginning of World War II. During the last two years of WWI, air warfare was pretty much nonexistent. Twenty years later we had the Luftwaffe, the RAF (German and British air forces), which were highly influential factors.”

Moreover, this was almost a hundred ago, when the pace of technological advancement was not as rapid as what we are witnessing today. We can only imagine where the cyber dimension is heading in the coming decades.”

The rise of cyber warfare

“Why is the cyber domain so attractive? It influences everything – intelligence organizations are on a quest for the enemy’s secrets. During the last 35 years, all of our secrets and the enemy’s secrets have been stored inside computers. This makes the use of the cyber attacks obvious.

If we look upon psychological warfare and social media – this is about controlling people by controlling the internet. If we look at the Arab Spring, which erupted 3 years ago, it was solely initiated and propagated through social media. This is how people are controlled nowadays.”

The easy development of cyber warfare

“Let’s say you’re a nation and you develop ballistic capabilities or even intercontinental ballistic missiles. You have to have a very good engineering infrastructure and lots of money. If you’re lucky enough to have resources, it will take you a few years to have this capability.”

“On the hand, look at the cyber domain – if a nation wants to go from number 7 or 8 to number 2 or 3, it’s much easier. They will have almost no dependence on physical matters – they only need the the human capital. The cyber force buildup is very very cheap.

To attack a computer or a computer network that’s a mile away from you or 15,000 miles away from you – it’s basically the same. In the cyber domain, the physical distance between hostile parties has basically no importance, though this is a bit simplistic.”

“Our understanding is rapidly changing. Basic computers now control our water, our energy resources, and our transportation systems. The grid has now much wider and deeper significance than it had a few years ago. Say a stock exchange site goes down once a month – what does it do for the site’s credibility?”

The real threat of cyber warfare: unpredictability

“Yesterday we had an attack [OpIsrael] that we were aware of and able to defend against. This is not what we fear. We fear the attacks we don’t know about. We fear the enemies that have stabilized themselves within our networks of which we are unaware. Now, a party can be under attack and be totally unaware–this is different from classic warfare. Who attacked Georgia and Estonia a couple of years ago? We still do not know.”

About the Author:


If you don't see your comment after publishing it, refresh the page.

Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost.

If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked.

No Responses to “The Future of CyberWarfare”

Comments are closed.

SocialTwist Tell-a-Friend

Current Top Story
Jeremy Bird, working for Israeli campaign outfit V15, shown at Ted Talk, May 20, 2014.
Likud Charges Opponents with Illicit Funding Through US-backed V15
Latest Blogs Stories
Ultra Orthodox Jewish youths studying religious texts at a Yeshiva in Jerusalem

In the Hareidi world, Torah study is worshipped to the exclusion of all else. Nothing else matters

IDF vehicles attacked by Hezbollah with anti-tank missiles at northern border.

Chances are, like in the South, terrorists are building a sophisticated network of tunnels in North.

Hezbollah shooting at Har Dov

9:31pm The Mt. Hermon ski resort on the Golan Heights will be open for business tomorrow morning — having receiving permission from the IDF. 8:03pm Channel 2 reports that Hezbollah terror cell was located 5 kilometers from Israel, and not within Israel as originally thought.Soldiers in 2nd vehicle were saved after they jumped out of […]

Jordana Brown: Ready, willing, and able!

I need a job, my friends. A real life, full-time, pay-the-bills, up at 7, home-after-nightfall JOB!

Ha’aretz claiming Glick is “far from a household name to non-English speaking Israelis” is erroneous

Distinguishing between manipulating and influencing people + 3 steps towards positive communication

Despite “excuses” about not wanting to influence Israel’s election Netanyahu’s views should be heard

Israeli leaders deny reality: Nothing we can do will make the Arabs accept a viable Jewish state

How do we make sure the Holocaust is relevant to new generations?

In 2006, Amona kids saw their teachers and rabbis being thrown from windows as if they were garbage

No money should go to terrorists or their families; anyone involved in terror must pay the price

Responsible Jewish outreach encourages BTs to retain and to enhance their relationship with parents

Israelis will vote for Likud because of Caroline Glick, but she’ll just be Right window dressing.

What are the dynamics of running a family business and what are its impact on family relationships?

The Hareidi paper HaMevaser wanted to have their cake and eat it too: use the photo; lose the women

Producer Chuck Wang explains how you can learn from mistakes and move on towards success.

More Articles from IDF Spokesperson's Office
Elite soldiers train to kill terrorist kidnappers and rescue hostages.

Terrorists hide with hostages in a building. How can soldiers rescue the victims and kill the captors?

Aharon Karov and his wife Tzvia on their wedding day. hours before he returned to the Gaza front and was critically wounded.

Aharon and Tzvia Karov prove that faith and belief in a better future is what keeps Israel alive.

“I cried not because I had to undergo surgery, but because I had to leave the army.”

“I knew that being there would allow me to protect other soldiers.”

One missile explosion on Tel Aviv could cause a local disaster. One successful Hamas hack of IDF secrets could cause a national disaster.

During Operation Protective Edge, IDF soldiers were faced with deadly risks in the Gaza Strip. Sixty four soldiers were killed and many more were wounded in combat. This is the story of one IDF commander who put his life in danger to rescue a soldier kidnapped by Hamas. Lt. Eitan, 23, joined the elite unit […]

Sgt. O’s commander: “We do not fight indiscriminately. We are an army not a terrorist organization.”

The discovery of a Hamas “urban warfare” manual by IDF forces reveals Hamas’ callous use of Gazans

Printed from: http://www.jewishpress.com/blogs/idf-blog-blogs/the-future-of-cyberwarfare/2014/04/08/

Scan this QR code to visit this page online: