Shin Bet: Critical infrastructure targeted by cyber-warfare

"There are fingerprints and tracks that maybe there were attempts, and they were treated," Shin Bet chief Diskin says.

May 5, 2011 03:58
1 minute read.
Stuxnet Virus

Stuxnet 311. (photo credit: Courtesy)


Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analyses from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For $5 a month you will receive access to the following:

  • A user uxperience almost completely free of ads
  • Access to our Premium Section and our monthly magazine to learn Hebrew, Ivrit
  • Content from the award-winning Jerusalem Repor
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief

UPGRADE YOUR JPOST EXPERIENCE FOR 5$ PER MONTH Show me later Don't show it again

Israel has detected what appears to have been attempts to use cyber-warfare to attack critical state infrastructure, outgoing Shin Bet (Israel Security Agency) chief Yuval Diskin said on Wednesday.

Speaking to military reporters ahead of his scheduled retirement later this month, Diskin said that the Shin Bet, which is responsible for defending state infrastructure – including the water system and electrical grid from cyber attacks – has detected “fingerprints” and “tracks” of attempted attacks.

Be the first to know - Join our Facebook page.

“All over the world, including in Israel, there are cyber attacks,” Diskin said. “We can’t say for certain the attacks were against critical infrastructure, but there are fingerprints and tracks that maybe there were attempts, and they were treated.”

The Shin Bet, Diskin said, recently completed a major review of its technological and cyber capabilities, and has outlined a multi-year plan that will be implemented in the coming months by his successor Yoram Cohen, his former deputy.

“Israel needs to grow in this field since this is something that is happening today already – and is not waiting for tomorrow,” he said. “This is a threat that is already knocking on our door.”

The IDF recently organized its cyber capabilities by establishing a special division under the Military Intelligence’s signal intelligence unit 8200, which is responsible for cyber-warfare.

It has also reinforced its defensive capabilities, aimed at protecting military communication networks, which sits under the C4I (command, control, communications, computers, and intelligence) Directorate.

Israel’s cyber capabilities are presumed to be some of the most advanced in the world, and 8200 is suspected of developing the Stuxnet worm, which attacked Iran’s Natanz uranium enrichment facility last year, reportedly causing extensive damage.

Related Content

idf hebron
August 22, 2014
Palestinians throw Molotov cocktail at IDF checkpoint in Hebron