The Israeli triple helix in the cybersecurity scenario

Authors

DOI:

https://doi.org/10.26792/rbed.v9n2.2022.75284

Keywords:

Base Industrial de Defesa, Cibersegurança e Infraestruturas Críticas de Israel

Abstract

Conflicts involving Israel have been constant in the country’s history. The 20th centu-ry consolidated its borders with wars in which qualitative superiority was favorable to it, but which also generated a reality of endless hostilities that went beyond its strate-gic surroundings. The Israeli triple helix is made up of government, industry and aca-demia with a focus that prioritizes knowledge and innovation assets, including the area of cybernetics. In this sense, the results indicate that the triple helix has participated in the country’s cybersecurity effort, notably at the beginning of the century. From 2009 onwards, there was a significant increase in the number of cyber-attacks against critical Israeli infrastructure, the object of study of this work. The research method-ology is qualitative with an exploratory approach, using bibliographic reviews. Based on the CSIS and Hackmagedon database and antivirus reports, the results showed that Israel has been optimizing its resources in the defense of these infrastructures, technologically outperforming its adversaries. Triple Helix has helped in the devel-opment of these solutions in defense products and services for the State to face the challenging scenario, cooperating for responsive, resilient and dynamic systems. Such interaction in favor of national cybersecurity has been effective, insofar as the State has favorably exploited the synergy of efforts between its defense forces and the tech-nological innovation of the IDB and academia.Keywords: Triple Helix, Cybersecurity and Israel’s Critical Infrastructure.

Downloads

Download data is not yet available.

Author Biographies

Eliezer de Souza Batista Junior, Instituto Meira Mattos

Doutorando em Ciências Militares pelo Programa de Pós-Graduação em Ciências Militares da Escola de Comando e Estado-Maior do Exército. Também formado na área de Sistemas de Informações, análise de malware e Big Data.

Frederico Emanuel Sousa Nunes, Instituto Meira Mattos

Mestrando em Ciências Militares pelo Programa de Pós-Graduação em Ciências Militares da Escola de Comando e Estado-Maior do Exército

Rôber Yamashita, Asia e University

Doutor em Business Administration pela Asia e University (AeU).

References

ARGAMAN, Shahar; SIBONI, Gabi. Commercial and Industrial Cyber Espionage in Israel. In: Cyberspace and National Security - Selected Articles III. The Institute for National Security Studies (INSS). Tel Aviv: April, 2015.

AYYUB, Rami. Israel says it thwarted foreign cyber attack on defence industry. 2020. Disponível em: https://www.reuters.com/article/us-israel-cyber-attack-idUSKCN25825T. Acessado em 14 de junho de 2020.

BAEZNER, Marie; CORDEY, Sean. National Cybersecurity Strategies in Comparison – Challenges for Switzerland. Zurich, Center for Security Studies: 2019. Disponível em: https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2019-08-National%20Cybersecurity%20Strategies%20in%20Comparison.pdf. Acessado em 24 de julho de 2020.

BARAM, Gil. Israeli Defense in Age of Cyber war. Middle West Quarterly: Winter 2017. Disponível em: https://www.meforum.org/middle-east-quarterly/pdfs/6399.pdf. Acessado em 14 de junho de 2020.

BLUMENTHAL, Neil. O que é uma startup: Definição, características e seus tipos. 2020. Disponível em: https://www.the-itfactory.com/startup-knowledgebase/article/what-is-a-startup/. Acessado em 16 de julho de 2020.

CARR, Edward Hallett. The Twenty Years Crisis: 1919-1939. An Introduction to the Study of International Relations. Macmillan & Co. Ltd. London, and St. Martin's Press Inc. New York: 1981.

CLEARSKYSEC. Hamas Attack – Impersonating “Red Alert” App, Cellcom TV and New Websites. 2019. Disponível em: https://www.clearskysec.com/wp-content/uploads/2019/02/ClearSky-End_of_Year_Report-2018.pdf. Acessado em 14 de junho de 2020.

COHEN, M. S., FREILICH, C. D., & Siboni, G. (2015). Israel and Cyberspace: Unique Threat and Response. International Studies Perspectives, ekv023. doi:10.1093/isp/ekv023.

CPR. Check Point Research. Hamas Andoid Malware on IDF Soldiers – This i show it happened. 2020. Disponível em: https://research.checkpoint.com/2020/hamas-android-malware-on-idf-soldiers-this-is-how-it-happened/. Acessado em 14 de junho de 2020.

CROPSEY, Seth. Hamas Cyber Attack and Israel’s Armed Response. 2019. Disponível em: https://www.hudson.org/research/15016-hamas-cyber-attack-and-israel-s-armed-response. Acessado em 25 de julho de 2020.

CSIS. Center for Strategic & International Studies. Significant Cyber Incidents. 2021. Disponível em: <https://csis-website-prod.s3.amazonaws.com/s3fs-public/210430_Significant_Cyber_Events_List.pdf?B21zjJhsoO3qkgQNyGMmZN5IhAE80S_I>. Acessado em 20 de abril de 2021.

DUNNE, Paul; GARCÍA-ALONSO, María Del Carmen; LEVINE, Paul; SMITH, Ron. Determining the Defense Industrial Base. Defense and Peace Economics, 18:3, 199-221, 2007.

ESTADOS UNIDOS DA AMÉRICA (EUA). Departamento de Segurança Interna. Centro de Recursos em Infraestruturas Críticas. Disponível em: <http://training.fema.gov/EMIWeb/IS/is860a/CIRC/defense1.htm>. Acesso em 16 jun. 2020.

FAGLIN, Guy. A corrida da inovação-Tecnologias comerciais e militares em armas: o ponto de equilíbrio apropriado. x ed. Haifa-Israel: 2018.

GROSS, Judah Ari. After Facebook, Hamas turns to Instagram to lure IDF soldiers, army says. 2018 Disponível em: https://www.timesofisrael.com/after-facebook-hamas-turns-to-instagram-to-lure-idf-soldiers-army-says/. Acessado em 25 de julho de 2020.

HACKMAGEDDON. Cyber attacks timeline. 2021. Disponível em: https://www.hackmageddon.com/category/security/cyber-attacks-timeline/. Acessado em 20 de abril de 2021.

HASSANZADEH, Amin et al. A review of cybersecutity Incidents in the Water Sector. 2020. Disponível em: https://arxiv.org/pdf/2001.11144.pdf. Acessado em 24 de julho de 2020.

HEVER, Shir. Gaza: a testing ground for Israeli military technology. Middle East Eye, 2015. Disponível em: <https://www.middleeasteye.net/opinion/gaza-testing-ground-israeli-military-technology>. Acesso em 22 jul 2020.

HOUSE OF COMMONS. Development Assistance and the Occupied Palestinian Territories. Volume 1. Londres, 15 de janeiro de 2004. Disponível em: https://publications.parliament.uk/pa/cm200304/cmselect/cmintdev/230/230.pdf. Acessado em 14 de julho de 2020.

HUNTINGTON, Samuel P. O choque de civilizações e a recomposição da ordem mundial. Tradução de M. H. C. Côrtes. Rio de Janeiro: Biblioteca do Exército; Objetiva, 1998.

ISRAEL. Background for the Establishment of the Bureau. Jerusalém, Escritório do Primeiro Ministro: 2002.

ISRAEL. Israel National Cyber Directorate. 2011. Disponível em: https://www.gov.il/en/departments/units/israel_national_cyber_directorate_unit. Acessado em 14 de julho de 2020a.

ISRAEL. Ministério da Defesa. DDR&D - Directorate of Defense Research & Development. 1985. Disponível em: <https://english.mod.gov.il/About/Innovative_Strength/Pages/Directorate-_of_Defense_Research_Development.aspx>. Acesso em 25 jul. 2020b.

ISRAEL. Ministério da Defesa. Promoção das Exportações em Defesa. 2018. Disponível em: <https://english.mod.gov.il/About/Defense_Exports/Pages/default.aspx>. Acesso em 14 jul. 2020c.

ISRAEL. National Cyber Array.במהלך הלילה אירעו ניסיונות תקיפה של מספר ארגונים במגזר הבריאות. הפוגען יועד לגניבת מידע בכלל ובפרט להשיג את הקשות המקלדת של המשתמש, כך שנתוני גישה לאתרי אינטרנט ומערכות פנימיות מבוססות דפדפנים יודלפו לתוקף. טרם זוהה וקטור התקיפה הראשוני של הפוגען וכן תהליך ההתפשטות המדויק ברשת. 2017. Disponível em: https://www.gov.il/he/Departments/publications/reports/hospital_guidelines. Acessado em 14 de junho de 2020.

ISRAEL. The Jerusalem Post. Israeli defense exports pull in $7.2 billion in sales. 2020. Disponível em: https://www.jpost.com/israel-news/israeli-defense-exports-pull-in-72-billion-in-sales-632356. Acessado em 15 de novembro de 2021.

KALMAN, Matthew. Israel denies Anonymous cyber-attack to blame for websites failure. 2011. Disponível em: https://www.theguardian.com/world/2011/nov/07/israel-anonymous-cyber-attack-websites. Acessado em 14 de junho de 2020.

KARSPERSKY. O que é ransomware? 2020. Disponível em: https://www.kaspersky.com.br/resource-center/definitions/what-is-ransomware. Acessado em 24 de julho de 2020.

KATZESTEIN, Peter J. The Culture of National Security. Norms and Identity in World Politics. New York: Columbia University Press, p. 1-78: 1996.

KUEHL, Daniel T. From Cyberspace to Cyberpower: Defining the Problem em Cyberpower and National Security. Washington, D.C.: National Defense UP, 2009.

MARKOWNSKI, S; HALL, P; WYLIE, R. (Eds.). Defence Procurement and Industry Policy: A small country perspective. London; New York: Routledge, 2010.

MARTEU, E. Israel and the Jihad threat. Em: Survival – Global Politics and Strategy, vol: 60, pp 85-106. Routledge, Abingdon (Reino Unido): 2018

MEKOROT. General Information. 2020. Disponível em: https://www.mekorot.co.il/Eng/newsite/AboutUs/Pages/GeneralInformation.aspx. Acessado em 24 de julho de 2020.

MITIGATE CYBER. Chinese hackers steal israeli military documents. 2014. Disponível em: https://mitigatecyber.com/chinese-hackers-steal-israeli-military-documents/. Acessado em 21 de abril de 2021.

MORAN, Dominic. Israel: Defense Boom Seeks Wiggle Room. ISN Security Watch Zurich: 2008.

NYE, J. S. Cyber Power. Cambridge: Havard Kennedy School, 2010.

ONU. Israeli-Palestinian Interim Agreement on the West Bank and the Gaza Strip. Washington, D.C., 28 de setembro de 1995. Disponível em: https://peacemaker.un.org/sites/peacemaker.un.org/files/IL%20PS_950928_InterimAgreementWestBankGazaStrip%28OsloII%29.pdf. Acessado em 14 de julho de 2020.

PAGANINI, Pierluigi. Iranian Group OilRig is back and delivers digitally signed malware. 2017a. Disponível em: https://securityaffairs.co/wordpress/55145/apt/oilrig-apt-itan.html. Acessado em 29 de julho de 2020.

PAGANINI, Pierluigi. The massive attack against Israel alleged lauched by Iranian OilRig APT group. 2017b. Disponível em: https://securityaffairs.co/wordpress/58464/hacking/oilrig-apt-target-israel.html. Acessado em 29 de julho de 2020.

PINHEIRO, Álvaro. Israel, Hezbollah e o conflito assimétrico. Brasília: UNICEUB: 2006.

PRESS, Viva Sarah. NoCamels. Under Attack: Israeli Cyber Experts Warns Of Large-Scale Healthcare Hacks. 2018. Disponível em: https://nocamels.com/2018/07/israeli-cyber-experts-healthcare-hacks/. Acessado em 25 de julho de 2020.

PROJECT GREY GOOSE. Project Grey Goose Phase II Report: The evolving state of cyber warfare. Greylogic, março de 2009.

RACINE, J. B.; RAFFESTIN, C.; RUFFY, V. Escala e ação, contribuições para uma interpretação do mecanismo de escala na prática da Geografia. Revista Brasileira de Geografia, Rio de Janeiro, v. 45, n. 1, 1983.

RALPH, Talia. Syria’s Electronic Army attempted attack on Haifa’s water system. 2015. Disponível em: https://www.pri.org/stories/2013-05-25/syrias-electronic-army-attempted-attack-haifas-water-system. Acessado em 14 de junho de 2020.

REUTERS. Israel acusa palestino de hackear drones e dados de aeroporto. 2016. Disponível em: https://br.reuters.com/article/internetNews/idBRKCN0WP2II. Acessado em 14 de junho de 2020.

SADEH. Sharon. Israel’s Defense Industry in the 21st Century: Challenges and Opportunities. Strategic Assessment Quarterly, Volume 7, No. 3. Jaffee Center for Strategic Studies. Tel Aviv: December, 2004.

SECULERT. Mahdi – The cyber savior? 2012. Disponível em: https://web.archive.org/web/20121117052310/http:/blog.seculert.com/2012/07/mahdi-cyberwar-savior.html. Acessado em 15 de maio de 2020.

SEGAL, Adam. The Hacked World Order: how nations fight, trade, maneuver, and manipulate in the digital age. New York: Public Affairs, 2016.

STOCKOLM INTERNATIONAL PEACE RESEARCH INSTITUTE. SIPRI Military Expenditure Database. Disponível em: < https://www.sipri.org/databases/milex>. Acesso em 22 out. 21.

STORM, Darlene. No, Israel’s power grid wasn’t hacked, but ransomware hit Israel’s Electric Authority. 2016. Disponível em: https://www.computerworld.com/article/3026609/no-israels-power-grid-wasnt-hacked-but-ransomware-hit-israels-electric-authority.html. Acessado em 14 de junho de 2020.

THE INTERCEPT. ISUAV Video Descrambling. 2016. Disponível em: https://www.documentcloud.org/documents/2699846-Anarchist-Training-mod5-Redacted-Compat.html. Acessado em 26 de maio de 2021.

TIMES OF ISRAEL. Cyber attacks again hit Israel’s water system, shutting agricultural pumps. 2020b. Disponível em: https://www.timesofisrael.com/cyber-attacks-again-hit-israels-water-system-shutting-agricultural-pumps/. Acessado em 26 de maio de 2021.

TIMES OF ISRAEL. Israeli firm says Chinese cyber-espionage tool used to spy on governments. 2020a. Disponível em: https://www.timesofisrael.com/israeli-firm-says-chinese-cyber-espionage-tool-used-to-spy-on-governments/. Acessado em 26 de maio de 2021.

TIMES OF ISRAEL. The curious, potentially election-shaping case of Gantz and the Iran phone hack. 2019. Disponível em: https://www.timesofisrael.com/the-curious-potentially-election-shaping-case-of-gantz-and-the-iran-phone-hack/. Acessado em 26 de maio de 2021.

TOYNBEE, Arnold. A Humanidade e a Mãe-Terra: Uma História Narrativa do Mundo. Trad. Helena Maria Camacho Martins Pereira e Alzira Soares da Rocha. Revisão Técnica

de Lincoln de Abreu Penna. Rio de Janeiro: Zahar Editores, 1978.

TREND. Israeli fire service site attacked by ‘Gaza Hackers’. 2012. Disponível em: https://en.trend.az/world/israel/1979610.html. Acessado em 14 de junho de 2020.

WILLIAMSON, Mark L. The Cyber Military Revolution and the need for a new framework of war. Joint Forces Staff College: 2012. Disponível em: https://apps.dtic.mil/dtic/tr/fulltext/u2/a562392.pdf. Acessado em 14 de maio de 2021.

Published

2023-06-21

How to Cite

Batista Junior, E. de S., Nunes, F. E. S., & Yamashita, R. (2023). The Israeli triple helix in the cybersecurity scenario. Revista Brasileira De Estudos De Defesa, 9(2). https://doi.org/10.26792/rbed.v9n2.2022.75284

Issue

Section

Artigos