Abstract
This chapter presents the developments of cybersecurity and cyber-warfare in the IDF.
Cyber-warfare may be strategically advantageous if it proves less deadly and less destructive than kinetic alternatives. Logically, cyber-warfare suits the Israeli grand strategy well: either as a force multiplier or as a precision strike, it continues the quality-over-quantity principle. We utilise foreign, unconfirmed claims to discuss Operation Orchard and Stuxnet, focusing on damage assessment, effectiveness, attribution, and deterrence. Reliance on cyberattacks in high-risk operations with strategic consequences attests to the maturity of cyber-warfare capabilities. However, military capacity is just one element of national cybersecurity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Both authors were this program’s TAU researchers from 2010 to 2012, working with Dr. Gabi Siboni of the INSS.
- 2.
USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to direct the operations and defense of specified Department of Defense information networks; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
References
Abrams E (2013) Tested by Zion: the Bush administration and the Israeli-Palestinian conflict. Cambridge University Press, Cambridge
Baram G (2013) The effect of cyberwar technologies on force buildup: the Israeli case. Mil Strateg Aff 5(1):23–43
Barzashka I (2013) Are cyber-weapons effective? RUSI J 158(2):48–56. doi:10.1080/03071847.2013.787735
Ben-Israel I, Tabansky L (2011) An interdisciplinary look at security challenges in the information age. Mil Strateg Aff 3(3):21–37
Ben-David A (2010) On the offensive. Aviat Week Space Technol 172(13):56–56
Denning DE (2012) Stuxnet: what has changed? Futur Internet 4(3):672–687
Dipert RR (2013) Other-than-internet (OTI) cyberwarfare: challenges for ethics, law, and policy. J Mil Ethics 12(1):34–53
Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40
Fulghum DA, Wall R, Butler A (2007) Israel shows electronic prowess. Aviat Week Space Technol 168:25
IDF admits to using cyber space to attack enemies (2012, 06/03/2012) The Jerusalem post
Katz Y (2012) IDF admits to using cyber space to attack enemies. The Jerusalem Post, 06/03/2012. Retrieved from http://www.jpost.com/Defense/IDF-admits-to-using-cyber-space-to-attack-enemies
Katz Y, Hendel Y (2012) Israel vs. Iran: the shadow war. Potomac, Washington, DC
Klimburg A (2011) Mobilising cyber power. Survival 53(1):41–60. doi:10.1080/00396338.2011.555595
Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. Secur Priv IEEE 9(3):49–51
Liff AP (2012) Cyberwar: a new absolute weapon? The proliferation of cyberwarfare capabilities and interstate war. J Strateg Stud 35(3):401–428
Lindsay JR (2013) Stuxnet and the limits of cyber warfare. Secur Stud 22(3):365–404. doi:10.1080/09636412.2013.816122
Rid T (2011) Cyber war will not take place. J Strateg Stud 35:1–28
Rid T (2013) Cyber war will not take place. Hurst, London
Sanger DE (2012) Confront and conceal: Obama’s secret wars and surprising use of American power. Crown, New York
Singer PW, Friedman A (2014) Cybersecurity and cyberwar: what everyone needs to know. Oxford University Press, New York/Oxford
The 2nd Annual Cyber Security International Conference Proceedings (2012) The Yuval Ne’eman workshop for science, technology and security: annual cyber security international conference Tel Aviv
Zetter K (2014) Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Crown, New York
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 The Author(s)
About this chapter
Cite this chapter
Tabansky, L., Ben Israel, I. (2015). Striking with Bits? The IDF and Cyber-Warfare. In: Cybersecurity in Israel. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-18986-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-18986-4_9
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18985-7
Online ISBN: 978-3-319-18986-4
eBook Packages: Computer ScienceComputer Science (R0)