Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security (CENS)
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
Public Education
About Public Education
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
News Releases
Speeches
Video/Audio Channel
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National Security (CENS)Institute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      Public EducationAbout Public Education
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      News ReleasesSpeechesVideo/Audio Channel
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS
Connect
Search
  • RSIS
  • Publication
  • RSIS Publications
  • CO14192 | Building a Cyber Iron Dome: Israel’s Cyber Defensive Envelope
  • Annual Reviews
  • Books
  • Bulletins and Newsletters
  • RSIS Commentary Series
  • Counter Terrorist Trends and Analyses
  • Commemorative / Event Reports
  • Future Issues
  • IDSS Papers
  • Interreligious Relations
  • Monographs
  • NTS Insight
  • Policy Reports
  • Working Papers

CO14192 | Building a Cyber Iron Dome: Israel’s Cyber Defensive Envelope
Michael Raska

02 October 2014

download pdf

Synopsis

Israel is developing “a national cyber defensive envelope” – a multi-layered cyber defence strategy leveraging automated computerised systems and highly-trained personnel that provide intelligence, early warning, passive and active defence, and offensive capabilities across civil-military networks.

Commentary

ISRAEL’S SECURITY establishment is currently debating the political and military assessments and lessons of the war in the Gaza Strip in July-August 2014, known as ‘Operation Protective Edge’. There is a consensus on the widening spectrum and increasing sophistication of cyber threats. During the conflict, Israel faced large-scale cyber-attacks on its civilian communications infrastructure, including denial of service (DDoS) and Domain Network System (DNS) attacks from both state and non-state actors, traced to Qatar and Iran – Hamas’ main benefactors.

Cyber attackers also targeted the Israel Defence Forces (IDF) – its websites and communications networks. The Israeli Security Agency (Shin Bet) announced that these attacks against government and military networks had been contained, while in the civilian sector the attacker’s intent to cause maximum disruption was not achieved. Still, cyberattacks – as projected by Prime Minister Benjamin Netanyahu – are viewed as “one of the four main threats to Israel.”

Israel’s Evolving Cyber Defence Strategy

While Israel has not published official cyber defence strategy, an analysis of Israeli cyber debates and leading open forums such as the Annual Cyber Security International Conference organized by the Yuval Ne’eman Workshop for Science, Technology and Security at Tel Aviv University, yielded four underlying drivers: (1) leadership support for a national cyber defence vision; (2) continuous upgrading of IDF’s cyber defence capabilities such as in the Unit 8200; (3) Israel’s cutting-edge R&D programs for boosting civilian and dual-use cyber capabilities; and (4) the development of a unique comprehensive national “cyber eco-system.”

At the highest levels, Israel’s cyber defence policy has been led by the Prime Minister’s Bureau, which established a National Cyber Bureau (NCB) in August 2011. The NCB has brought a new interdisciplinary thrust into Israel’s cyber security, aiming to link civil-military expertise to tackle evolving cyber threats.

Paradoxically, the NCB has been opposed by Shin Bet, the internal security agency, which argued that action against hackers should be taken proactively in the early organisation and planning stages, rather than reactively. The Shin Bet claimed that the NCB is unable to carry out this task because it lacks intelligence-gathering capabilities, has no operational tradition of deterrence and no possibility of integration with similar security organisations worldwide.

After nearly two years of policy battles, Prime Minister Netanyahu announced on September 21 the establishment of a new government authority alongside the NCB with the responsibility for protecting Israel’s economy and civilian space from computer attacks; effectively rejecting recommendations of the Shin Bet security services.

Meanwhile in the military domain, the IDF has been consistently upgrading its cyber capabilities and network defences. Well-known units of the IDF that specialise in various aspects of computer network operations are frequently profiled in the media for their high levels of operational sophistication, technological advances, and training. These include the Intelligence Corps Unit 8200 tasked with signal intelligence (SIGINT) and code decryption; the Cyber Unit within 8200, established in 2009; the C4I Branch developing netcentric warfare concepts and technologies; and other intelligence units. In 2013, the IDF also established a new Cyber Branch tasked to integrate operational concepts based on strategic needs and cyber capabilities of the IDF.

The experiences, training, and expertise of many former IDF Unit 8200 members have over time diffused into Israel’s cutting-edge high-tech R&D sector, reinforced by the “start-up nation” culture. As of 2014, there are over 200 Israeli start-ups working on innovative cyber security solutions, resulting in US$3 billion in cyber exports, second only to the United States worldwide and constituting 5% of the global market, according to the National Cyber Bureau. Moreover, in 2013 Israeli start-ups raised US$165 million in investment funding, a figure which represents 11 percent of global capital invested in the field of cyber security. According to the NCB, 14.5 percent of all the firms worldwide attracting cyber-related investment are Israeli-owned.

In this context, Israel is creating a unique, symbiotic national “cyber eco-system.” Strategic cooperation among leading national sectors: the defence establishment, private enterprise, academia, and key government agencies such as the Chief Scientist and the Ministry of Defense’s Export Controls Agency shape national cyber security priorities, and more importantly, the implementation of cyber security innovation across civil-military domains.

Israel’s Cyber Iron Dome

During the Operation Protective Edge, the main defence system used by Israel against the rocket attacks was the Iron Dome system operated by the Israel Air Force. The system is composed of a locator-radar, which identifies the rocket’s source and tracks its trajectory, launcher with advanced interceptor missiles (Tamir), and a command and control centre which calculates the likely target. Iron Dome effectively creates a defensive envelope around a specific area, and is able to launch selective salvo intercepts against multiple incoming rockets with a success rate of 90%.

As of now, one of the influential schools of thought in the Israeli cyber debate is discussing the applicability of the operational concepts and lessons learned from the Iron Dome missile defence methodology in the cyber domain. For example, how to create effective cyber intelligence (enemy analysis & target creation), early warning and absorption readiness, strike effort, area suppression, active defence, command and control, passive detection, and ultimately, cyber deterrence.

Israel’s cyber innovation must therefore be linked to the changing strategic realities over the past decade, including the emergence of the varying cyber threats that have created yet another layer of asymmetric security predicaments, while mitigating the effectiveness of Israel’s traditional deterrence, early warning, and rapid military decision strategies. Amid these changes, Israel’s subconventional threat spectrum has blurred the traditional offence and defence lines and widened the scope and character of operational requirements, including the need to protect both the physical and cyberdomains concurrently.

About the Author

Michael Raska is a Research Fellow at the Institute of Defence and Strategic Studies, a constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University in Singapore.

Categories: RSIS Commentary Series / General / Cybersecurity, Biosecurity and Nuclear Safety / International Politics and Security / Central Asia / Middle East and North Africa (MENA)

Synopsis

Israel is developing “a national cyber defensive envelope” – a multi-layered cyber defence strategy leveraging automated computerised systems and highly-trained personnel that provide intelligence, early warning, passive and active defence, and offensive capabilities across civil-military networks.

Commentary

ISRAEL’S SECURITY establishment is currently debating the political and military assessments and lessons of the war in the Gaza Strip in July-August 2014, known as ‘Operation Protective Edge’. There is a consensus on the widening spectrum and increasing sophistication of cyber threats. During the conflict, Israel faced large-scale cyber-attacks on its civilian communications infrastructure, including denial of service (DDoS) and Domain Network System (DNS) attacks from both state and non-state actors, traced to Qatar and Iran – Hamas’ main benefactors.

Cyber attackers also targeted the Israel Defence Forces (IDF) – its websites and communications networks. The Israeli Security Agency (Shin Bet) announced that these attacks against government and military networks had been contained, while in the civilian sector the attacker’s intent to cause maximum disruption was not achieved. Still, cyberattacks – as projected by Prime Minister Benjamin Netanyahu – are viewed as “one of the four main threats to Israel.”

Israel’s Evolving Cyber Defence Strategy

While Israel has not published official cyber defence strategy, an analysis of Israeli cyber debates and leading open forums such as the Annual Cyber Security International Conference organized by the Yuval Ne’eman Workshop for Science, Technology and Security at Tel Aviv University, yielded four underlying drivers: (1) leadership support for a national cyber defence vision; (2) continuous upgrading of IDF’s cyber defence capabilities such as in the Unit 8200; (3) Israel’s cutting-edge R&D programs for boosting civilian and dual-use cyber capabilities; and (4) the development of a unique comprehensive national “cyber eco-system.”

At the highest levels, Israel’s cyber defence policy has been led by the Prime Minister’s Bureau, which established a National Cyber Bureau (NCB) in August 2011. The NCB has brought a new interdisciplinary thrust into Israel’s cyber security, aiming to link civil-military expertise to tackle evolving cyber threats.

Paradoxically, the NCB has been opposed by Shin Bet, the internal security agency, which argued that action against hackers should be taken proactively in the early organisation and planning stages, rather than reactively. The Shin Bet claimed that the NCB is unable to carry out this task because it lacks intelligence-gathering capabilities, has no operational tradition of deterrence and no possibility of integration with similar security organisations worldwide.

After nearly two years of policy battles, Prime Minister Netanyahu announced on September 21 the establishment of a new government authority alongside the NCB with the responsibility for protecting Israel’s economy and civilian space from computer attacks; effectively rejecting recommendations of the Shin Bet security services.

Meanwhile in the military domain, the IDF has been consistently upgrading its cyber capabilities and network defences. Well-known units of the IDF that specialise in various aspects of computer network operations are frequently profiled in the media for their high levels of operational sophistication, technological advances, and training. These include the Intelligence Corps Unit 8200 tasked with signal intelligence (SIGINT) and code decryption; the Cyber Unit within 8200, established in 2009; the C4I Branch developing netcentric warfare concepts and technologies; and other intelligence units. In 2013, the IDF also established a new Cyber Branch tasked to integrate operational concepts based on strategic needs and cyber capabilities of the IDF.

The experiences, training, and expertise of many former IDF Unit 8200 members have over time diffused into Israel’s cutting-edge high-tech R&D sector, reinforced by the “start-up nation” culture. As of 2014, there are over 200 Israeli start-ups working on innovative cyber security solutions, resulting in US$3 billion in cyber exports, second only to the United States worldwide and constituting 5% of the global market, according to the National Cyber Bureau. Moreover, in 2013 Israeli start-ups raised US$165 million in investment funding, a figure which represents 11 percent of global capital invested in the field of cyber security. According to the NCB, 14.5 percent of all the firms worldwide attracting cyber-related investment are Israeli-owned.

In this context, Israel is creating a unique, symbiotic national “cyber eco-system.” Strategic cooperation among leading national sectors: the defence establishment, private enterprise, academia, and key government agencies such as the Chief Scientist and the Ministry of Defense’s Export Controls Agency shape national cyber security priorities, and more importantly, the implementation of cyber security innovation across civil-military domains.

Israel’s Cyber Iron Dome

During the Operation Protective Edge, the main defence system used by Israel against the rocket attacks was the Iron Dome system operated by the Israel Air Force. The system is composed of a locator-radar, which identifies the rocket’s source and tracks its trajectory, launcher with advanced interceptor missiles (Tamir), and a command and control centre which calculates the likely target. Iron Dome effectively creates a defensive envelope around a specific area, and is able to launch selective salvo intercepts against multiple incoming rockets with a success rate of 90%.

As of now, one of the influential schools of thought in the Israeli cyber debate is discussing the applicability of the operational concepts and lessons learned from the Iron Dome missile defence methodology in the cyber domain. For example, how to create effective cyber intelligence (enemy analysis & target creation), early warning and absorption readiness, strike effort, area suppression, active defence, command and control, passive detection, and ultimately, cyber deterrence.

Israel’s cyber innovation must therefore be linked to the changing strategic realities over the past decade, including the emergence of the varying cyber threats that have created yet another layer of asymmetric security predicaments, while mitigating the effectiveness of Israel’s traditional deterrence, early warning, and rapid military decision strategies. Amid these changes, Israel’s subconventional threat spectrum has blurred the traditional offence and defence lines and widened the scope and character of operational requirements, including the need to protect both the physical and cyberdomains concurrently.

About the Author

Michael Raska is a Research Fellow at the Institute of Defence and Strategic Studies, a constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University in Singapore.

Categories: RSIS Commentary Series / General / Cybersecurity, Biosecurity and Nuclear Safety / International Politics and Security

Popular Links

About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

Connect with Us

rsis.ntu
rsis_ntu
rsisntu
rsisvideocast
school/rsis-ntu
rsis.sg
rsissg
RSIS
RSS
Subscribe to RSIS Publications
Subscribe to RSIS Events

Getting to RSIS

Nanyang Technological University
Block S4, Level B3,
50 Nanyang Avenue,
Singapore 639798

Click here for direction to RSIS

Get in Touch

    Copyright © S. Rajaratnam School of International Studies. All rights reserved.
    Privacy Statement / Terms of Use
    Help us improve

      Rate your experience with this website
      123456
      Not satisfiedVery satisfied
      What did you like?
      0/255 characters
      What can be improved?
      0/255 characters
      Your email
      Please enter a valid email.
      Thank you for your feedback.
      This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
      OK
      Latest Book
      more info