Difference between revisions of "Unit 8200"

From Powerbase
Jump to: navigation, search
m (Tech sector alumni)
(cyber-attacks)
Line 2: Line 2:
  
 
In 2004 a Knesset committee recommended turning the unit into an autonomous entity separate from the Defense Ministry, along the lines of its US equivalent, the [[National Security Agency]].<ref>Amos Harel, [http://www.haaretz.com/hasen/spages/1090358.html Mystery surrounds suicide of officer from elite intel unit], Haaretz, 5 June 2009.</ref>
 
In 2004 a Knesset committee recommended turning the unit into an autonomous entity separate from the Defense Ministry, along the lines of its US equivalent, the [[National Security Agency]].<ref>Amos Harel, [http://www.haaretz.com/hasen/spages/1090358.html Mystery surrounds suicide of officer from elite intel unit], Haaretz, 5 June 2009.</ref>
 +
 +
==Cyber-attacks==
 +
UPI reported in June 2012 that the [[Unit 8200]] had been involved in the [[Stuxnet]] and [[Flame]] cyber-attacks:
 +
::Unit 8200 is widely seen to have been a key player in the Flame cyber attack on Iran, and some Arab states, in recent weeks.
 +
 +
::It was also deeply involved in the ground-breaking Stuxnet malware attack on Iran's uranium enrichment program, a vital element in the quest for nuclear weapons, in 2009-10 that U.S. officials say was jointly mounted by Israel and the United States.<ref>[http://www.upi.com/Business_News/Security-Industry/2012/06/04/Unit-8200-and-Israels-high-tech-whiz-kids/UPI-43661338833765/ Unit 8200 and Israel's high-tech whiz kids], upi.com, 4 June 2012.</ref>
 +
  
 
==Tech sector alumni==
 
==Tech sector alumni==

Revision as of 17:39, 5 June 2012

Unit 8200 is the signal intelligence and code deciphering arm of the Israel Defence Forces. It is the largest unit in the IDF and is headquartered at at Camp Glilot, north of Tel Aviv.[1]

In 2004 a Knesset committee recommended turning the unit into an autonomous entity separate from the Defense Ministry, along the lines of its US equivalent, the National Security Agency.[2]

Cyber-attacks

UPI reported in June 2012 that the Unit 8200 had been involved in the Stuxnet and Flame cyber-attacks:

Unit 8200 is widely seen to have been a key player in the Flame cyber attack on Iran, and some Arab states, in recent weeks.
It was also deeply involved in the ground-breaking Stuxnet malware attack on Iran's uranium enrichment program, a vital element in the quest for nuclear weapons, in 2009-10 that U.S. officials say was jointly mounted by Israel and the United States.[3]


Tech sector alumni

A Forbes article by Former Unit 8200 member Gil Kerbs, stated that "Israel's high-tech world is "flooded" with Unit alumni, as entrepreneurs and company founders or junior and senior executives.":

"Take Nice, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology," says [former Unit 8200 commander Hanan] Gefen. "Check Point was founded by Unit alumni. Comverse's main product, the Logger, is based on the Unit's technology. Look at Metacafe, one of the hottest companies today. Eyal Herzog, one of the founders, is also an 8200 alumnus and he accumulated a huge amount of relevant experience in the Unit."[4]

Author James Bamford and former CIA officer Philip Giraldi have suggested that the role of Unit 8200 veterans in the telecommunications industry is a threat to US national security.[5]

People

Commanders

External Resources

Notes

  1. Amos Harel, Mystery surrounds suicide of officer from elite intel unit, Haaretz, 5 June 2009.
  2. Amos Harel, Mystery surrounds suicide of officer from elite intel unit, Haaretz, 5 June 2009.
  3. Unit 8200 and Israel's high-tech whiz kids, upi.com, 4 June 2012.
  4. Gil Kerbs, The Unit, Forbes, 8 February 2007.
  5. Christopher Ketcham, Full-Spectrum Penetration: Israeli Spying in the United States, 12 March 2009.