Israel- US and Cyber Cooperation
The
geostrategic location of Israel has remained a focal point for global powers
across epochs. From the Roman Empire's recognition of its strategic
significance as a crossroads between continents, to the Ottoman Empire's
control over trade routes, Israel has served as a linchpin in shaping regional
dynamics. The emergence of Pax-Britannica further underscored Israel's
geostrategic importance, as British hegemony relied on maritime dominance and
control over key territories. With the ascent of Pax-Americana, Israel's
significance has only intensified, as it aligns with American interests in
maintaining dominance in West Asia.
Central
to Israel's role in the global arena is its alliance with the United States,
which extends beyond mere diplomatic ties. The security cooperation between the
two nations has been integral, with the United States consistently backing
Israel in technological advancement, industrial development, and intelligence
sharing. This robust partnership has not only bolstered Israel's military
capabilities but has also cemented its position as a formidable ally in the
tumultuous landscape of West Asia. Moreover, the convergence of interests
between Israel and the United States underscores the entanglement of
geo-political and economic imperatives in shaping global hegemony.
Cyber
Cooperation
The inception of the Joint Binational Industrial Research and Development (BIRD) Cyber programme represents a novel collaborative endeavor spearheaded by the BIRD consortium. Commencing in June 2022, this initiative emerged from an accord between the U.S. Department of Homeland Security (DHC) and its specialized arm, the Science and Technology Directorate (S & T), subsequent to the formalization of an agreement with the Israel National Cyber Directorate (INCD). The primary objective underlying the BIRD Cyber Call for Proposals pertains to the facilitation of cooperative ventures geared towards the demonstration and pilot deployment of pioneering technologies. Emphatically, these technologies encompass advanced data fusion and analytics resilience centers tailored for the exigencies of small and medium-sized enterprises and corporate entities. Additionally, the initiative aims to foster the development of risk assessment solutions tailored for the operational milieu of small-to-medium-sized airports or seaports, alongside the formulation of robust architectural frameworks conducive to safeguarding core operational processes.
The current absence of targeted U.S. policies addressing companies that derive benefit from engagement in Chinese influence operations underscores a significant gap in regulatory oversight. Effective dismantling of the "disinformation-for-hire"[i] industry necessitates a multifaceted approach involving sanctions, legislative initiatives aimed at enhancing transparency on social media platforms, and rigorous enforcement measures by the Federal Trade Commission to curb deceptive business practices. Comparatively, the U.S. cybersecurity market demonstrates substantial prominence in contrast to its Asian counterparts, owing largely to its advanced investment and strategic emphasis. This strategic emphasis is rooted in the United States' historical pursuit of dominance and control within the realms of intelligence, science, and technology. Notably, this trajectory can be traced back to the Cold War era, wherein the United States, in its rivalry with the USSR, fostered collaborative alliances to drive innovation in science and technology.
According to the Mordor Intelligence Report of 2024, the projected size of the U.S. cybersecurity market stands at an estimated USD 85.79 billion in 2024, with expectations of reaching USD 126.57 billion by 2029. This growth trajectory reflects a compound annual growth rate (CAGR) of 8.09% during the forecast period (2024-2029), underscoring the sustained expansion and significance of the U.S. cybersecurity sector. [ii]
In the realm of cybersecurity, Israel emerges as a
significant player, particularly within the West Asian context. Israel's
strategic importance lies in its provision of cyber assistance to bolster the
national security endeavors of neighboring countries such as Jordan and the
United Arab Emirates (UAE). Notably, Israeli cyber companies have made
substantial investments in Saudi Arabia, facilitated by the United States'
strategic imperative to foster greater cooperation among its allies,
particularly during periods of contingency. Despite internal political
pressures and historical tensions between Jewish and Arab nations, the United
States has actively promoted collaboration between Israel and its Arab
counterparts, recognizing the strategic benefits of such alliances. This
approach, however, has encountered resistance, fueled by concerns over
perceived Israeli influence and opposition from Iran, which seeks to leverage
anti-Israel sentiment within the Muslim world.
Recent statistical projections underscore the economic significance of Israel's involvement in the cybersecurity market. Revenue within this sector is anticipated to reach US$0.96 billion by 2024, with security services constituting a dominant market segment projected to reach US$0.52 billion in the same year. An annual growth rate (CAGR 2024-2028) of 11.99% is forecasted, indicating a trajectory towards a market volume of US$1.51 billion by 2028. These figures underscore the dynamic and expanding role of Israel within the global cybersecurity landscape. [iii]
Hamas and Cyber-space
Turkey's current leadership, in alignment with its diplomatic orientation, has demonstrated a supportive stance towards the establishment and maintenance of cyberspace infrastructure for Hamas, analogous to the provisions extended by Iran and Qatar. This support encompasses financial, armament, and intelligence assistance to Hamas, even in circumstances where Qatari financial backing may be absent, and space within Turkey's national territorial jurisdiction is provided for the leadership of Hamas during periods of offensive operations initiated by Israel and its allies. Furthermore, Turkey extends both financial and technical support to Hamas, facilitating the development of offensive cyber capabilities and informational assets.[iv]
Israel constitutes a primary target for cyber espionage operations conducted by Hamas. Initially employing a "spray and pray" strategy,[v] the group disseminated impersonal emails containing malicious attachments to a broad array of targets, banking on the probability of successful infiltration among a subset of recipients. Transitioning from 2015 to 2018, Hamas refined its tactics to encompass the targeting of various smart devices and electronic platforms, including professional and marketing websites, with the clandestine installation of mobile remote access trojans on designated devices. Notably, the group also engaged in the implantation of spyware onto smartphones under the guise of legitimate applications such as Red Alert, purportedly a rocket siren application tailored for Israeli users.[vi]
Internally and within the political sphere, Hamas employs cyber espionage campaigns executed by its organizational and sub-organizational entities to uphold its dominance and exert control over its constituents, including members of the political and business elite within Palestine. Among the duties undertaken by the Internal Security Forces (ISF) is counterintelligence, a critical domain for an organization fraught with internal political rivalries, underscoring the paramount importance of maintaining internal cohesion and safeguarding against potential threats to its authority.
“Hacktivists”
The forthcoming United States election raises significant concerns for US cybersecurity. Nations such as Russia, China, and Iran are poised to exploit the proliferation of easily accessible generative artificial intelligence programs to disseminate advanced misinformation aimed at influencing American citizens toward divergent political narratives. This year, as multiple countries worldwide prepare for national elections, the utilization of AI capable of crafting compelling narratives tailored to voter patterns presents a formidable challenge.[vii] Faketivists originating from both Western and Southern factions exert substantial influence in conflicts such as the Ukraine-Russia War and the Hamas-Israel War. Examples include the manipulation of digital imagery for psychological impact, leveraging cyber psychology to manipulate perceptions,[viii] and the proliferation of fake accounts to promote specific agendas during warfare, illustrating a prevalent phenomenon in contemporary conflicts.
"Hacktivism"[ix] encompasses activities employing hacking methods to disrupt without inflicting significant harm, such as data theft, website defacement, redirects, and Denial-of-Service attacks. Telegram, previously exploited by hacktivists, took action by banning the primary channel of the Anonymous Sudan hacktivist group. This action was likely prompted by their utilization of bots rather than their involvement in diverse cyber-aggressive tactics. In 2022, Telegram, a popular messaging platform, became a tool often exploited by hacktivists.[x] The countries most affected by pro-Russian hacktivist assaults were Ukraine, Poland, and Sweden. Throughout the year, Europe bore the brunt of hacktivist activity, with February 2023 witnessing a peak, particularly in Nordic countries, as per the Hacker News report 2023.[xi] However, as the year progressed, the focus of hacktivist operations shifted to West Asia and beyond, encompassing a global scale by the year's end.[xii]
[i] Department of Defence, Federal Government of United States, “US and Israel Strategic dialogue on Technology: White House Fact Sheet” Washington DC, USA, 2022
[ii] Mordor Intelligence Report, “RUS Cybersecurity Market Size & Share Analysis - Growth Trends & Forecasts(2024-2029)” 2024
URL:
https://www.mordorintelligence.com/industry-reports/united-states-cybersecurity-market
[iii] Israel Cyber Security, Report 2024, Statista.Com
URL:https://www.statista.com/outlook/tmo/cybersecurity/israel#:~:text=Revenue%20in%20the%20Cybersecurity%20market,US%241.51bn%20by%202028.
[iv] David Shamah, “Qatari Tech Helps Hamas in Tunnels, Rockets: Expert,” Times of Israel, July 31, 2014,
[v] “Operation Arid Viper: Bypassing the Iron Dome,” Trend Micro, February 16, 2015,
[vi] Yossi Melman, “Hamas Attempted to Plant Spyware in ‘Red Alert’ Rocket Siren App,” Jerusalem Post, August 14, 2018,
[vii] Mesquita, Canes-Wrone† , A. B. Hall† , K. Lum, Martin† , and Y. R. Velez, “Preparing for Generative AI in the 2024 Election: Recommendations and Best Practices Based on Academic Research” the University of Chicago, Harris School of Public Policy, 2024, pp.1-14
[viii] R. Maalem Lahcen, B. Caulkins, R. Mohapatra & K. Manish, “Review and insight on the behavioral aspects of cybersecurity” Springer Open, 2020
[ix] Samuel, Alexandra Whitney, Hacktivism and the Future of Political Participation, Harvard University, 2004
URL: https://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivism-entire.pdf
[x] Telegram: a New Place for Hacker, socRadar, 22, March 2022
URL: https://socradar.io/telegram-a-new-place-for-hackers/
[xi] A new age of Hacktivism, 22 Feb, 2024
URL:
https://thehackernews.com/2024/02/a-new-age-of-hacktivism.html
[xii] “Cybersecurity Mesh Global Market
Report 2024” Research and Markets, January 2024
URL:
https://www.researchandmarkets.com/reports/5819921/cybersecurity-mesh-global-market-report#relc2-5764876
Comments
Post a Comment