Encrypted broadcast system links IDF brass to intel

'Castle of the Lake' intelligence command and control system being developed to deliver military decision-makers information from every possible source.

April 12, 2013 02:33
2 minute read.
IDF soldiers engaged in cyber security

IDF soldiers engaged in cyber security 370. (photo credit: yadlashiryon.com)


Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analysis from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For $5 a month you will receive access to the following:

  • A user experience almost completely free of ads
  • Access to our Premium Section
  • Content from the award-winning Jerusalem Report and our monthly magazine to learn Hebrew - Ivrit
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief


In a hypothetical yet plausible situation, a very senior IDF commander is sitting at home, when he is alerted of a developing threat over the border.

As he makes his way to IDF headquarters in Tel Aviv to meet with army brass, the commander pulls out a handheld military communications device, which sends and receives highly encrypted broadcasts. Before the commander’s vehicle reaches its destination, he receives video feed of the threat, and studies the updated list of targets that need to be struck to eliminate the danger.

By the time he arrives at the meeting, he is fully briefed on the development.

This scenario is made possible thanks to a developing intelligence command and control system called the Castle of the Lake (Tirat Ha’agam in Hebrew), which links information input from every possible source – the air force, navy, ground troops, and intelligence services – processes the data, and presents it to military decision- makers in a simple and clear manner.

Created in 2005, the Castle of the Lake was most recently used during Operation Pillar of Defense in November, when the IDF General Staff had access to live video feeds of rocket launches from the Gaza Strip into Israel. It is the product of the IDF’s C4I (command, control, communications, computers and intelligence) Branch, and the two men who have been key to developing it, both of whom can only be identified as “Maj. A.,” are proud of its advanced capabilities.

“Since 2005, many new features have been installed every year,” Maj. A., of C4I’s Technological Teleprocessing Unit said.

The second Maj. A., from C4I’s weapons division, added, “This system delivers information for the General Staff and regional commands. It’s programmed for three situations: War, emergencies and continuous security. We get the information, embed it, and connect it to a system that presents it simply.”

Simplicity of presentation is key, he said, adding, “People are people. They get tired, or aren’t familiar with the latest technology. We have to keep all of this in mind.

“This allows the users to take decisions based on quality information, issue an order, and then ensure that the order is carried out correctly,” he said.

Citing the rise of terrorist and asymmetrical threats around Israel, Maj. A. said the IDF needs “a modern information system to support it.”

The Ness TSG telecom company is a key partner in creating the system, and works with Maj. A. from the Technological Teleprocessing Unit.

“This isn’t a tactical war room, it’s a strategic asset that brings a very large amount of information to those making decisions,” he said. “It creates one language between all branches of military.”

Asked how secure the system is from hacking attacks, he replied, “We understand that if we don’t invest significantly in securing system, it loses its right to exist. Every version is well defended.”

The system can be accessed via army computers in headquarters, or anywhere via specialized handheld devices.

“We understand that the the decision-maker has to be able to function wherever he is,” Maj. A. from the weapons division said.

Join Jerusalem Post Premium Plus now for just $5 and upgrade your experience with an ads-free website and exclusive content. Click here>>

Related Content

idf hebron
August 22, 2014
Palestinians throw Molotov cocktail at IDF checkpoint in Hebron