web analytics
March 3, 2015 / 12 Adar , 5775
At a Glance
Blogs
Sponsored Post


Home » Blogs » IDF Blog »

The Future of CyberWarfare

The main tools of cyber defense are not the switches, routers, or operating systems, but rather the cyber defenders themselves.
Lotem-C4i leads the IDF's cyber battlefront, deflecting threats to Israel's security.

Lotem-C4i leads the IDF's cyber battlefront, deflecting threats to Israel's security.
Photo Credit: IDF Spokesperson's Office

Tuesday, April 8, at the INSS (Institute for national security studies) in Tel Aviv, the head of the IDF Telecommunications Branch, Maj. Gen. Uzi Moshkovitz, spoke about the current and future states of cyber warfare and cyber defense. What follows is the speech he gave.

Everything is cyber

“When we look at data centers and information systems, they are basically entirely located in the cyber dimension. Everything can be attacked potentially. Everything is cyber.”

“Everything in this cyber dimension is new, dynamic and volatile. I’m going to talk about the defensive side.”

The human advantage

“The most important thing to us is human capital. Everything within the cyber domain relies upon the strength of our personnel. Therefore, we must restructure our education system. The main tools of cyber defense are not the switches, routers, or operating systems, but rather the cyber defenders themselves.”

Cyber warfare vs. air warfare

“Cyber warfare vs. air warfare – this is an inevitable comparison. Let’s look at history of air warfare between 1917 to 1939, right up to the beginning of World War II. During the last two years of WWI, air warfare was pretty much nonexistent. Twenty years later we had the Luftwaffe, the RAF (German and British air forces), which were highly influential factors.”

Moreover, this was almost a hundred ago, when the pace of technological advancement was not as rapid as what we are witnessing today. We can only imagine where the cyber dimension is heading in the coming decades.”

The rise of cyber warfare

“Why is the cyber domain so attractive? It influences everything – intelligence organizations are on a quest for the enemy’s secrets. During the last 35 years, all of our secrets and the enemy’s secrets have been stored inside computers. This makes the use of the cyber attacks obvious.

If we look upon psychological warfare and social media – this is about controlling people by controlling the internet. If we look at the Arab Spring, which erupted 3 years ago, it was solely initiated and propagated through social media. This is how people are controlled nowadays.”

The easy development of cyber warfare

“Let’s say you’re a nation and you develop ballistic capabilities or even intercontinental ballistic missiles. You have to have a very good engineering infrastructure and lots of money. If you’re lucky enough to have resources, it will take you a few years to have this capability.”

“On the hand, look at the cyber domain – if a nation wants to go from number 7 or 8 to number 2 or 3, it’s much easier. They will have almost no dependence on physical matters – they only need the the human capital. The cyber force buildup is very very cheap.

To attack a computer or a computer network that’s a mile away from you or 15,000 miles away from you – it’s basically the same. In the cyber domain, the physical distance between hostile parties has basically no importance, though this is a bit simplistic.”

“Our understanding is rapidly changing. Basic computers now control our water, our energy resources, and our transportation systems. The grid has now much wider and deeper significance than it had a few years ago. Say a stock exchange site goes down once a month – what does it do for the site’s credibility?”

The real threat of cyber warfare: unpredictability

“Yesterday we had an attack [OpIsrael] that we were aware of and able to defend against. This is not what we fear. We fear the attacks we don’t know about. We fear the enemies that have stabilized themselves within our networks of which we are unaware. Now, a party can be under attack and be totally unaware–this is different from classic warfare. Who attacked Georgia and Estonia a couple of years ago? We still do not know.”

About the Author:


If you don't see your comment after publishing it, refresh the page.

Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost.

If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked.

No Responses to “The Future of CyberWarfare”

Comments are closed.

Current Top Story
President Barack Obama and Iran do not speak the same language..
Any Deal Is a Bad Deal
Latest Blogs Stories
Jeffrey Goldberg

Goldberg chose to believe two impossible things before I had breakfast this morning.

bibi's speech

The State Department claims Bibi revealing details of the bad Iranian deal to Americans would be a “betrayal”.

Jordana and the Flag!

“Please stop shushing me” They kept shushing! Shushing seems to be how Leftists do Israeli politics!

peace in our time iran

Labor-Livni post-Zionist party’s campaign based on their claim they know how to keep the US happy

Mentioning genocide in the same breath as Susan Rice crosses a redline about Obama’s foreign policy

What are the ramifications of giving up your US citizenship? Would it effect your visiting the US?

Chasidim believe that Metzitza B’Peh (MbP) is an essential part of the circumcision ritual.

AMERICAN INTERFERENCE in ISRAELI ELECTIONS is IMMORAL and 1000% CHUTZPADIK!

Extremism from Jews is considered a “danger;” Arab extremism and anti-Jewish terror is “legitimate”

It was in fact Israel, not Palestinians or journalists, who began spreading the older photos, in order to generate credibility for the “slander” angle.

Next week we celebrate Purim, more relevant and illuminating in light of current events than ever

“They all attack each other” is how David described campaign tactics. “Welcome to politics, my son,”

Most Israelis think kowtowing to US demands to get on Obama’s “good side” won’t work and isn’t right

Big questions this week: Does materialism make people happy? Can one be happy with what they have?

A Rosh Yeshiva guessed 60% of bochurim in Israel’s yeshiva system belong there only 3-4 yrs post HS

More Articles from IDF Spokesperson's Office
Elite soldiers train to kill terrorist kidnappers and rescue hostages.

Terrorists hide with hostages in a building. How can soldiers rescue the victims and kill the captors?

Aharon Karov and his wife Tzvia on their wedding day. hours before he returned to the Gaza front and was critically wounded.

Aharon and Tzvia Karov prove that faith and belief in a better future is what keeps Israel alive.

“I cried not because I had to undergo surgery, but because I had to leave the army.”

“I knew that being there would allow me to protect other soldiers.”

One missile explosion on Tel Aviv could cause a local disaster. One successful Hamas hack of IDF secrets could cause a national disaster.

During Operation Protective Edge, IDF soldiers were faced with deadly risks in the Gaza Strip. Sixty four soldiers were killed and many more were wounded in combat. This is the story of one IDF commander who put his life in danger to rescue a soldier kidnapped by Hamas. Lt. Eitan, 23, joined the elite unit […]

Sgt. O’s commander: “We do not fight indiscriminately. We are an army not a terrorist organization.”

The discovery of a Hamas “urban warfare” manual by IDF forces reveals Hamas’ callous use of Gazans

Printed from: http://www.jewishpress.com/blogs/idf-blog-blogs/the-future-of-cyberwarfare/2014/04/08/

Scan this QR code to visit this page online: