SlideShare a Scribd company logo
1 of 1
Download to read offline
Home       Blogs   The Axis


Why are Israel and America suddenly speaking so openly about cyber
warfare?
The IDF has for the first time officially admitted using cyber warfare, while American officials have also revealed for the first
time the level of cooperation with Israel in developing and deploying cyber weapons against Iran's nuclear program.
By Anshel Pfeffer | 16:58 04.06.12 |   1

   Tweet    0


The IDF Spokesman's website is not usually in the business of breaking stories, so Sunday's report on the Operations Department instructions
defining the roles of cyber warfare in the IDF's operational doctrine was unexpected and intriguing. According to the report,

Cyber space is to be handled similarly to other battlefields on ground, at sea, in the air and in space. The IDF has been engaged in cyber
activity consistently and relentlessly, gathering intelligence and defending its own cyber space. Additionally if necessary the cyber space will
be used to execute attacks and intelligence operations.

There are many, diverse, operational cyber warfare goals, including thwarting and disrupting enemy projects that attempt to limit
operational freedom of both the IDF and the State of Israel, as well as incorporating cyber warfare activity in completing objectives at all
fronts and in every kind of conflict. Moreover, it will be used to maintain Israel's quality and advantage over its enemies and prevent their
growth and military capabilities, while limiting their operation in this field.

Additional goals defined by the document published by the Operations Department include creation of operational conditions that will assist in
fulfilling IDF capabilities in combat as well as influence public opinion and raise awareness by advocating in the cyber space.

Overall cyber space will be used to improve the operational effectiveness of the IDF, both during war and peace time. This will be done through
clandestine activity, while maintaining confidentiality and expertise.

There are no actual operational details here, but the fact that the IDF has for the first time officially admitted that it is using cyberspace for
offensive purposes is significant.

Do you think cyber warfare will be more prevalent in the future? Visit Haaretz.com on Facebook and share your views?

It is unthinkable that such a report could have been issued (both on the Hebrew and English IDF websites) without authorization from the
highest military and perhaps also political levels.

In previous on-record briefings and interviews, officers and officials have been prepared only to acknowledge work being done to protect vital
computer and communications infrastructure and networks from cyber attacks, never to specify attempts to use those same weapons to disrupt
the enemies infrastructure and to collect intelligence.

The timing is especially interesting, as it comes just a week after Flame, the mega-computer worm spying on Iranian and other Middle Eastern
computer users was revealed. And it comes hot on the heels of the interview last week in which Strategic Affairs Minister Moshe Ya'alon, said
(regarding such cyber attacks) that "anyone who sees the Iranian threat as a significant threat – it's reasonable that he will take various steps,
including these, to harm it" and that "Israel is blessed as being a country rich with high-tech, these tools that we take pride in open up all kinds of
opportunities for us."

Ya'alon a few hours later attempted to scale down his remarks tweeting that "plenty of advanced Western countries, with apparent cyber-warfare
capabilities, view Iran and especially its nuclear program as real threat," but the message got through.

This uncharacteristic Israeli openness coincides with a similar development across the Atlantic, where American officials have also revealed for
the first time the level of cooperation with Israel in developing and deploying cyber weapons against Iran's nuclear program.

Few of the sources in the lengthy New York Times report are named, but for the first time we have reliable details on the way the computer virus
known as Stuxnet, was developed and used in a joint U.S.-Israeli operation to sabotage Iran's uranium enrichment project. The cooperation
between the American National Security Agency and the IDF's Military Intelligence Unit 8200, waging electronic war together on Iran, is
probably the closest the two nations have ever come together in the history of their strategic relations.

The timing of the report by David E. Sanger could be coincidental. After all it is an adapted extract from his book “Confront and Conceal:
Obama’s Secret Wars and Surprising Use of American Power,” which will bepublished tomorrow in the U.S.

But the confluence of all these events, the emergence of Flame - which has been lurking in Iranian computers, unconcealed, for a few years now
and may have been revealed intentionally to spook the Iranians, Ya'alon's unguarded comments, the IDF's report on its cyber warfare doctrine,
and now the detailed statements from senior U.S. officials to Sanger, can hardly be a coincidence. It raises a number of key questions:

First, were these revelations part of a coordinated decision between Washington and Jerusalem to momentarily lift the cloak of darkness over
their joint cyber efforts? Or are organizations and individuals in either country just trying to grab some of the credit for their own purposes?

Second, if the openness is intentional, who is all this information aimed at? Is their purpose to create more pressure on Iran, where researchers,
officers and ordinary citizens are afraid to use their computers and the leaders have to take into account that further attempts to hide nuclear
development are bound to fail? Or is this the Obama Administration trying to convince public opinion in the U.S and Israel and of course the
Netanyahu government that the intelligence and electronic war on Iran is sufficient, and that there is no need for military strikes? And are certain
elements in Israel's security and political establishment helping the Americans do this?

Third, is this just an aberration or are we going to see in the near future an acceptance by governments that cyber warfare is an accepted
extension of diplomacy by other means? And how will Iran and other countries targeted in this way respond?

More Related Content

What's hot

Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?Melissa Andrews
 
Geovon TECH621 Presentation
Geovon TECH621 PresentationGeovon TECH621 Presentation
Geovon TECH621 PresentationGeovon
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014Bill Hagestad II
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber WarfareBill Hagestad II
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumJonathan Meyer
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weaponFernando Alcoforado
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paperMarioEliseo3
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGLillian Ekwosi-Egbulem
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)MarioEliseo3
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesChikere Uchegbu
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Kate Neal
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Bill Hagestad II
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Kate Neal
 

What's hot (20)

ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
 
Geovon TECH621 Presentation
Geovon TECH621 PresentationGeovon TECH621 Presentation
Geovon TECH621 Presentation
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weapon
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
 
Exp r35
Exp r35Exp r35
Exp r35
 
Policy Briefing Presentation
Policy Briefing PresentationPolicy Briefing Presentation
Policy Briefing Presentation
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 

Similar to Haaretz

Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docxDenial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docxruthannemcmullen
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)pavithra M
 
INSS's Insight on Iran's cyber war skills
INSS's Insight on Iran's cyber war skillsINSS's Insight on Iran's cyber war skills
INSS's Insight on Iran's cyber war skillsHackRead
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Qusstion Read the passage and answer the questiots that follow A ran.pdf
Qusstion Read the passage and answer the questiots that follow A ran.pdfQusstion Read the passage and answer the questiots that follow A ran.pdf
Qusstion Read the passage and answer the questiots that follow A ran.pdffaisalbags
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question consimba35
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 

Similar to Haaretz (20)

Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docxDenial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)
 
INSS's Insight on Iran's cyber war skills
INSS's Insight on Iran's cyber war skillsINSS's Insight on Iran's cyber war skills
INSS's Insight on Iran's cyber war skills
 
375
375375
375
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
114-116
114-116114-116
114-116
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Qusstion Read the passage and answer the questiots that follow A ran.pdf
Qusstion Read the passage and answer the questiots that follow A ran.pdfQusstion Read the passage and answer the questiots that follow A ran.pdf
Qusstion Read the passage and answer the questiots that follow A ran.pdf
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 

Recently uploaded

Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Axel Bruns
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsPooja Nehwal
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 

Recently uploaded (20)

Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 

Haaretz

  • 1. Home Blogs The Axis Why are Israel and America suddenly speaking so openly about cyber warfare? The IDF has for the first time officially admitted using cyber warfare, while American officials have also revealed for the first time the level of cooperation with Israel in developing and deploying cyber weapons against Iran's nuclear program. By Anshel Pfeffer | 16:58 04.06.12 | 1 Tweet 0 The IDF Spokesman's website is not usually in the business of breaking stories, so Sunday's report on the Operations Department instructions defining the roles of cyber warfare in the IDF's operational doctrine was unexpected and intriguing. According to the report, Cyber space is to be handled similarly to other battlefields on ground, at sea, in the air and in space. The IDF has been engaged in cyber activity consistently and relentlessly, gathering intelligence and defending its own cyber space. Additionally if necessary the cyber space will be used to execute attacks and intelligence operations. There are many, diverse, operational cyber warfare goals, including thwarting and disrupting enemy projects that attempt to limit operational freedom of both the IDF and the State of Israel, as well as incorporating cyber warfare activity in completing objectives at all fronts and in every kind of conflict. Moreover, it will be used to maintain Israel's quality and advantage over its enemies and prevent their growth and military capabilities, while limiting their operation in this field. Additional goals defined by the document published by the Operations Department include creation of operational conditions that will assist in fulfilling IDF capabilities in combat as well as influence public opinion and raise awareness by advocating in the cyber space. Overall cyber space will be used to improve the operational effectiveness of the IDF, both during war and peace time. This will be done through clandestine activity, while maintaining confidentiality and expertise. There are no actual operational details here, but the fact that the IDF has for the first time officially admitted that it is using cyberspace for offensive purposes is significant. Do you think cyber warfare will be more prevalent in the future? Visit Haaretz.com on Facebook and share your views? It is unthinkable that such a report could have been issued (both on the Hebrew and English IDF websites) without authorization from the highest military and perhaps also political levels. In previous on-record briefings and interviews, officers and officials have been prepared only to acknowledge work being done to protect vital computer and communications infrastructure and networks from cyber attacks, never to specify attempts to use those same weapons to disrupt the enemies infrastructure and to collect intelligence. The timing is especially interesting, as it comes just a week after Flame, the mega-computer worm spying on Iranian and other Middle Eastern computer users was revealed. And it comes hot on the heels of the interview last week in which Strategic Affairs Minister Moshe Ya'alon, said (regarding such cyber attacks) that "anyone who sees the Iranian threat as a significant threat – it's reasonable that he will take various steps, including these, to harm it" and that "Israel is blessed as being a country rich with high-tech, these tools that we take pride in open up all kinds of opportunities for us." Ya'alon a few hours later attempted to scale down his remarks tweeting that "plenty of advanced Western countries, with apparent cyber-warfare capabilities, view Iran and especially its nuclear program as real threat," but the message got through. This uncharacteristic Israeli openness coincides with a similar development across the Atlantic, where American officials have also revealed for the first time the level of cooperation with Israel in developing and deploying cyber weapons against Iran's nuclear program. Few of the sources in the lengthy New York Times report are named, but for the first time we have reliable details on the way the computer virus known as Stuxnet, was developed and used in a joint U.S.-Israeli operation to sabotage Iran's uranium enrichment project. The cooperation between the American National Security Agency and the IDF's Military Intelligence Unit 8200, waging electronic war together on Iran, is probably the closest the two nations have ever come together in the history of their strategic relations. The timing of the report by David E. Sanger could be coincidental. After all it is an adapted extract from his book “Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power,” which will bepublished tomorrow in the U.S. But the confluence of all these events, the emergence of Flame - which has been lurking in Iranian computers, unconcealed, for a few years now and may have been revealed intentionally to spook the Iranians, Ya'alon's unguarded comments, the IDF's report on its cyber warfare doctrine, and now the detailed statements from senior U.S. officials to Sanger, can hardly be a coincidence. It raises a number of key questions: First, were these revelations part of a coordinated decision between Washington and Jerusalem to momentarily lift the cloak of darkness over their joint cyber efforts? Or are organizations and individuals in either country just trying to grab some of the credit for their own purposes? Second, if the openness is intentional, who is all this information aimed at? Is their purpose to create more pressure on Iran, where researchers, officers and ordinary citizens are afraid to use their computers and the leaders have to take into account that further attempts to hide nuclear development are bound to fail? Or is this the Obama Administration trying to convince public opinion in the U.S and Israel and of course the Netanyahu government that the intelligence and electronic war on Iran is sufficient, and that there is no need for military strikes? And are certain elements in Israel's security and political establishment helping the Americans do this? Third, is this just an aberration or are we going to see in the near future an acceptance by governments that cyber warfare is an accepted extension of diplomacy by other means? And how will Iran and other countries targeted in this way respond?