 
Exclusive: in anticipation of the CyberTech 2017 Conference, Israel 
Defense paid a rare visit to the cyber warfare facilities of the Israel 
Security Agency (ISA) and spoke with the "certified hackers" of the 
State of Israel 
At
 the height of the 'knife terrorism' surge Israel faced during the first
 half of 2016, many ISA operatives were committed to the operational 
activity. This time, the ISA personnel did not consist exclusively of 
hardened field agents armed with handguns, but also included numerous 
youngsters who operated out of high-tech style open-space offices in 
central Israel. Their theaters of operations were, in this case, the 
social media. Working around the clock, the cyber specialists of ISA 
searched for groups forming and organizing to initiate and execute 
terrorist attacks.
In fact, these specialists practically "lived" inside those
 social media. In some cases, the information they collected led to 
preventive arrests made by IDF and ISA warfighters – those who do 
operate in the field. In cases where the danger of a terrorist attack 
was regarded as less imminent, warnings were issued over the telephone: 
ISA operatives contacted the parents of youngsters from the Judea and 
Samaria region, and made it clear that if their child were to execute a 
terrorist attack, the whole family would pay dearly.
"There were times we actually heard the parents slapping 
their children on the other side of the line, even before the call was 
over. The parents immediately pledged to assume responsibility for their
 children's actions," they say at the SigInt-Cyber Branch of ISA. "We 
estimate that many terrorist attacks were prevented in this way."
We paid a rare journalistic visit to the cyber warfare 
units of ISA in anticipation of the CyberTech 2017 Conference, to be 
held between January 30 and February 1 at the Tel-Aviv Convention 
Center.
The visit provided numerous surprises, as the people of ISA
 spoke with us very openly about cyber warfare and because the physical 
environment of the ISA cyber warfare operations is nothing like the 
standard image that comes to mind in the context of a secret security 
agency – there are no dark cellars or dull rooms branching out of grey 
corridors. On the contrary, some of the cyber warfare specialists work 
in open-space offices located at Israel's bustling high-tech centers 
(naturally, you will not be able to find any signs on the doors 
indicating their true organizational affiliation). Others operate from 
the ISA HQ building, where the work spaces are brightly-lit and the 
walls are covered with colorful wallpaper. The rest areas have slush and
 espresso machines along with Playstation and X-Box consoles – as if 
these were the offices of Apple or Google.
We spoke about the entire cyber warfare setup of ISA, most 
of which stands at the cutting edge of cyber technology and includes 
proactive cybersecurity methods. This setup identified and foiled a 
massive cyberattack against Israel about two years ago, which remained 
unknown to the public, but we'll get to that.

The Third Revolution
Generally, the cyber warfare setup of ISA is facing a major
 revolution in 2017 under the leadership of ISA Chief Nadav Argaman. Yet
 in order to fully understand this significant organizational revision, 
we must go back to the first revolution. This revolution took place more
 than 20 years ago, in the 1990's, at the height of the suicide attack 
offensive against Israeli urban centers alongside the Oslo agreements.
In the context of that first revolution, the ISA Chief at 
the time, Ami Ayalon, had the organization step up to a new era of 
information technology, and the outcome was new methods of operation, 
capable of 'fishing' terrorists out of a sea of digital information. In 
the early 2000s, The ISA Security Division even established the National
 Information Security Authority, which assumed responsibility for 
defending the critical infrastructures of the State of Israel against 
cyberattacks.
The second revolution took place at the outset of the 
present decade, when new cyber warfare and SigInt divisions were 
established by ISA, which operated alongside two primary staff branches –
 the SigInt-Cyber branch and the Information Technology (IT) 
branch. SigInt (Signals Intelligence – collection of digital 
information) and cyber warfare became an inseparable part of every 
operation, and with regard to the defensive aspect – ISA shifted from 
focusing on passive cybersecurity methods to offensive cybersecurity. In
 the context of the third revolution, which is about to take place, 
one SigInt and Cyber branch will be established and the SigInt-Cyber and
 Technology divisions of the various branches will be subordinated to 
it.
"In 2010, four new divisions were established practically 
overnight. Now we are taking them and merging them into a 
single SigInt-Cyber and and technology branch, thereby establishing a 
single organ that would function as a powerful fist," they say at ISA.
In fact, it may be concluded that you are 
establishing a first-of-its-kind cyber warfare arm, combining defensive 
and offensive capabilities. Although the IDF had discussed the 
establishment of such an arm but have not actually established it (in 
December 2016, the IDF General Staff decided to retain the separation 
between defensive and offensive cyber warfare operations – A.R.)?
"We are not doing anything parallel to the processes 
initiated by IDF or other armed forces. In our case, it is a fist that 
is suitable to the present era, where everything is intermixed, the 
physical reality on the ground and the cybernetic world. In such a 
reality, even a field coordinator in the territories requires a 
technological linkage. It is not enough to be a good warfighter or a 
sophisticated field agent operator. The Internet is breaking down all 
the walls.
"Fifteen years ago, only 4% of all ISA personnel served in 
the cyber warfare and SigInt units. Today they account for not less than
 25% of our manpower," the people at ISA presented this amazing bit of 
data to illustrate the revolution – and that percentage is expected to 
grow further.
"Israel's databases are the most substantial in the Middle 
East, and one of the biggest and most complex in the world, owing to our
 technological advantage, and they require on-going protection," they 
say at ISA.
"Unlike past periods, the elements that affect the 
situation the most are not countries but the Internet and telecom giants
 from Silicon Valley, California. Every minor change that takes place in
 Palo Alto rocks the entire cybernetic world."
As far as you are concerned, how significant is the approach of offensive cybersecurity?
"It is highly significant. Information security was the 
first issue with which we had to cope years ago. This led to information
 system security, and in 2012 we realized that even that was not 
sufficiently effective, and unless we address cyberspace as a whole – we
 will fail.
"As far as we are concerned, just like in the physical 
world they do not deal with terrorist attacks by Hamas only by 
positioning security guards at shopping mall entrances, but actively 
pursue the terrorists wherever they may be, in the burrows and alleys, 
and attack them even at the places where they plan their attacks – the 
same should take place in the context of the cyber warfare effort. The 
approach being applied today is definitely offensive, and involves even 
deception tactics."
To illustrate this different approach, the people at ISA 
revealed the following example, which is being publicized here for the 
first time: about three years ago, the cyber warfare specialists of ISA 
had identified a carefully planned offensive, executed by one of 
Israel's most sophisticated enemies in the region. In the context of 
that offensive, the enemy 'deployed' at several sensitive nodes of the 
Israeli communication layout. Apparently, the intention was to remain at
 those nodes in dormant mode and execute a carefully-timed attack when 
the time comes. The intention may have been to simultaneously dominate 
an extensive range of television and radio broadcasts.
According to the traditional cybersecurity methods, ISA 
could have driven the "attackers" away from the sensitive nodes or 
enhanced security for those nodes. Instead, they opted for a different 
course of action. The cyber warfare specialists on the Israeli side 
monitored the way the enemy attack evolved and studied the methods of 
operation and even the working hours of the attacking hackers. Then, 
they took advantage of a prolonged holiday on the other side in order to
 eliminate the attack and stage a counterattack. One of the ways to 
attack enemy hackers is to reveal their details in communities of other 
hackers on the web. "In the hacker world, there is nothing more 
humiliating than this," they say at ISA, without specifically referring 
to the details of the counterattack staged by ISA (after all, they are 
not at liberty to openly discuss all of the aspects of the cyber wars).
The cyberattack foiled was one of the most sophisticated 
attacks with which ISA had to deal in the last few years, unlike the 
case of December 2012, when the satellite broadcast of one of Israel's 
TV channels was replaced by a written message from Hamas. In that case, 
the enemy took advantage of the fact that the satellite signals were 
being broadcast at very low power settings, for economic considerations.
 When the hostile takeover was identified, the power setting was 
increased and the Hamas message promptly disappeared.
Can we say that a cyberattack that causes physical 
damage is more dangerous than a propaganda attack like the takeover of a
 communication broadcast? Is the connection between the physical world 
and the cybernetic world the main issue today?
"In our opinion, no. Everyone likes to talk about that at 
every professional discussion forum, but the estimate is that the risk 
of a propaganda attack is more serious. Such an attack can even bring 
about the collapse of a bank, which would have 
far-reaching consequences, or the collapse of the stock exchange, as was
 the case a few years ago pursuant to a false report planted into the 
editorial board of the AP news agency.
"In November 2016, in the USA, you could see up close how 
hackers create chaos in the election campaign. Admittedly, physical 
damage, like damage inflicted on electrical turbines for example, could 
have extremely serious consequences, but in this case the objective 
is like a fortified locality that is very difficult to reach. The damage
 of a propaganda attack, on the other hand, involves the 'softest' 
objective. You must cover multiple risks continuously."
The changes within ISA are not only organizational. The 
cybernetic revolution has also led to a renewed definition of the 
respective responsibilities and the boundaries between ISA and other 
organizations like the IDF Intelligence Directorate and the Cyber 
Authority, established as part of the National Cyber Bureau in 2016.
Opposite the IDF, the arrangement is fairly simple: ISA, as
 always, is responsible for preventing damage to national security, 
including espionage operations, while the IDF cyber operations are aimed
 primarily at military objectives.
With regard to the Cyber Authority – the Authority and ISA 
signed a treaty last June, which is reported here for the first time. 
ISA Chief Nadav Argaman and the Head of the National Cyber Bureau, Dr. 
Eviatar Matania, finalized the treaty that put an end to the conflict 
over authority and responsibilities that had taken place a few years 
previously. (Dr. Matania and Buki Carmeli, who heads the Cyber Authority
 of the National Cyber Bureau, will be among the primary speakers at the
 CyberTech 2017 Conference, alongside Prime Minister Benjamin Netanyahu 
and cyber technology leaders, at the national level and from the 
industry, from around the world).
According to the treaty, the Authority is responsible for 
the business continuity of the civilian sector in Israel and for 
protecting that sector against cyberattacks. The Authority has recently 
inaugurated the National CERT (Cyber Emergency Response Team) Center in 
Beersheba, headed by Dato Hasson – himself a former senior ISA officer. 
The Authority assumed responsibility for cybersecurity in two-thirds of 
the layouts regarded as vital national infrastructures, including energy
 and electricity, while ISA is still responsible for the remaining 
third, including communication infrastructures. The responsibility for 
thwarting cyberterrorism and espionage remains with the ISA.
Does the arrangement work well?
"The very fact that we did not have to open the agreement 
even once since it had been signed last June says everything," they say 
at ISA. "It is important to understand that the cybersecurity effort is 
not divided but combined. We conduct elliptical table discussions, 
attended by the Cyber Authority, the Mossad, IDF Intelligence 
Directorate and the Director of Security of the Defense Establishment 
(MALMAB). These are people who know each other very well from previous 
positions, among other things. It is not a battleground. On the 
contrary, the trick has to do with how you develop the cooperative 
alliances. No single agency can do it all on its own."

"Being a Certified Hacker"
With the dramatic increase in the number of cyber 
specialists within ISA, their average age is dropping, and the present 
figure is 34.
"The factor that leads to success or to failure are the 
people," at ISA they were proud to note that their cyber specialists won
 a major part of the annual prizes for distinction, awarded at ISA by 
the Prime Minister in late December 2016.
Are you successful in filling your ranks, despite the struggle over quality personnel opposite the civilian companies?
"Yes, we have 100% staffing, as we offer a state-of-the-art
 working environment, good pay and stability (even if the pay is a 
little lower than the standard of the civilian sector), and in 
particular something else, which is the dream of the young people: to be
 a legitimate, certified cyber specialist and to be involved in the most
 sophisticated operations, that are difficult to even imagine."
The work of the ISA cyber specialist – is it teamwork or solo work?
"Both. There is a lot of room for individualistic work, 
depending on the mission. In the SigInt sections, work is predominately 
teamwork. Generally, we create an environment where youngsters can 
flourish and feel like racehorses carrying as little weight as possible.
"Beyond the on-going missions, the environment produces 
non-stop technological startups. In the civilian sector, you are 
focusing on a single startup at most. In our case, every cyber warfare 
specialist can be involved in multiple startups simultaneously. They are
 practically serial start-uppers."
Do you have a problem with the fact that some of 
these people eventually develop civilian companies using similar 
knowledge, after they leave and join the civilian sector?
"Naturally, we see to it that the truly sensitive knowledge
 does not leak out, but we live in peace with the situation of our 
people using the rest of the knowledge. It is a part of reality that we 
also benefit from. Sometimes we receive a telephone call from Palo Alto,
 with amazing technological proposals from people who had grown up here 
and never forgot where they came from."