≡ Menu

IDF Cyber Warfare Unit 8200 Press-Ganged Felonious Hackers and Pedophiles for Service

OK, that headline was a bit extreme.  There’s only three known sex offenders in Unit 8200.  But there are quite a few hackers with dubious pedigrees who’ve been press-ganged into military service there according to the Telegraph:

Israel demonstrated its intent to conquer cyber warfare in the 1990s by presenting the country’s legions of hackers with a choice between prison and working for the state.

Thousands are said to have signed up since then and have been incorporated into the defence forces Unit 8200.  In the intelligence community it is regarded as a singularly Israeli act of bravura that has given the country an edge in a world that has been rapidly immersed in cross border technology attacks.

Hackers, who invariably learn their skills engaging in illegal activity as teenagers, offer key advantages to countries seeking to defend against cyber warfare, or go on the offensive against an enemy.
The Negev desert based Unit 8200 has evolved from the signal intelligence arm of the Israeli military into a respected leader in high technology warfare.

It’s being mighty charitable to call dragooning computer criminals into military service “an act of bravura.”  I’d call it closer to the strategy of the Berlin police department in the film, M, where it enlists rapists, pedophiles and stick-up artists to find the murderer of a young girl.  And the question is: do you want former criminals with borderline pasts and personalities leading you country’s efforts to keep it safe from the really bad guys?

Here’s an example of what some of that borderline personality brings to the table.  Haaretz reports that a soldier in the unit has been accused in court of sexual harrassment for video calls he made on his cell phone.  A girl went to her local police station complaining that she was receiving video calls from a number she didn’t recognize in which a man exposed himself and engaged in a sex act.  The suspect is a Haredi Jew from Bnai Brak.

The article continues (in Hebrew):

This isn’t the first time soldiers serving in Unit 8200 have been accused of such crimes.  Last December, a First Lieutenant in the unit was arrested on suspicion of engaging in acts of pedophilia through the internet…The officer explained that he was a babysitter for children during which time he exploited the situation to engage in such acts.

Last July, another officer in the unit was arrested after he assaulted two young women in the street.

Lest anyone think I’m claiming Unit 8200 is composed of the dregs of Israeli society, of course that isn’t entirely true.  Clearly, creating malware as complex and ambitious as Stuxnet, if it was created by the IDF, is not something written by a ‘script-kiddie.’  It’s very serious work composed by very serious programmers.  But I am trying to point out that Israel’s culture of going for broke in its pursuit of tactical objectives; and its willingness to break societal norms and lower the inhibitions to engage in such acts of sabotage, piracy and even violence, lead you inexorably to stories like the ones above.  Recruiting anti-social hackers for military service makes perfect sent for a country many consider anti-social (or even sociopathic) in international terms.

Returning to the computer worm, Stuxnet, reputed to be the handiwork of some of these fine lads, China is reporting a massive infestation of the pest, which is reputed to have caused great damage:

computer virus dubbed the world’s “first cyber superweapon” by experts and which may have been designed to attack Iran’s nuclear facilities has found a new target — China.

The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.

“Once Stuxnet successfully penetrates factory computers in China, those industries may collapse, which would damage China’s national security,” he added.

Another unnamed expert at Rising International said the attacks had so far infected more than six million individual accounts and nearly 1,000 corporate accounts around the country, the official Xinhua news agency reported.

Another Chinese source consulted in the article downplayed the seriousness of the threat.  This repeats a pattern seen in Iran in which government officials acknowledge serious damage to the country’s nuclear facilities from the worm only to be contradicted by other sources.  I’m inclined to credit the sources acknowledging damage as these are the types of countries which would be loathe to present a vulnerable face to the world.

{ 6 comments… add one }
  • medawar October 1, 2010, 3:40 AM

    Cyber warfare has exactly the same drawback as biological warfare, in that once you’ve released something infectious, you’ve absolutely no control over where it goes next, even if you can immunize your own people/computers against it. (One definition of a biological weapon is anything you have a vaccine for and the enemy doesn’t.)

    This can be a two-edged sword in another way:
    Iran’s ability to retaliate against Israel, if they were indeed responsible, is very limited. However, if this doing economic damage across a whole region (as I thought it might be DESIGNED to last time I commented about this) and that region includes China, the depth of mire that Israel is now in should not be under-estimated.

    Doubtless there will now be lots of posts about how the IDF could take China on and defeat them in a day or two, but that’s a fight where AIPAC wouldn’t be able to get the White House to give Israel a single round of rifle ammunition in aid. China owns practically all of America’s debt.

    Causing mayhem across India and Indonesia wasn’t exactly bright, either, and if the worm gets back to Russia and does harm there, then Israel will really know about it.

    Random economic damage on a global scale makes Israel a more pressing problem for the world than the Somali Pirates. I don’t think the great powers will take an awful lot of time out to listen to Israeli lobbyists before they respond, somehow.

  • dickerson3870 October 1, 2010, 6:46 PM


    …Jeffrey Carr, author of “Inside Cyber Warfare,” describes what he believes is the first example of Stuxnet’s destructive power: the loss of India’s INSAT-4B communications satellite which shut down in July. The satellite’s control systems use Siemens S7-400 PLC and SIMATIC WinCC software, both of which are targeted by Stuxnet…

    ENTIRE ARTICLE – http://warincontext.org/2010/10/01/israel-smart-enough-to-create-stuxnet-and-stupid-enough-to-use-it/

    • Medawar October 2, 2010, 3:19 AM

      I don’t much like your line in the warincontext comments that “Israel is an existential threat to all of us”. The current regime, maybe, but that regime is an artifact of a malfunctioning electoral system and not an expression of national will and support.

      The Israeli military is akin to the Revolutionary Guard, in that it sees itself as being almost entirely outside democratic oversight, too. All it needs is its own system of finance, outside the tax system, and the IDF will BE the Guard.

      • Richard Silverstein October 2, 2010, 3:38 PM

        Couldn’t agree more.

        • medawar October 3, 2010, 2:50 AM

          If Indonesian railways use Siemens PLCs in their signaling system, then I fear that Unit 8200 could have just run up a bigger body count for the year than the rest of the IDF put together.

          If it was meant to target a nuclear facility, that worm could have been so much more specific than it evidently is.

          It looks increasingly as if this worm was intended to do generalized economic damage (as I’ve said before, a PLC is a universal tool), and no effort was made to stop it doing such damage outside the target country.

          If the IDF is actually banking on divine intervention to save them from the consequences of doing evil to peaceable nations, that may prove to be their biggest miscalculation of all.

        • medawar October 3, 2010, 2:58 AM

          Given that Siemens makes trains and a whole lot of other railway hardware, it is by no means an esoteric possibility that Indonesian and other railway signaling and power-switching systems will utilize Siemens PLCs.

          Quite large parts of the UK’s Network Rail may do so, too, as well as Eurostar. Signaling errors at 160MPH in the middle of the Channel Tunnel, anyone?

          Railways are the part of the UK’s industrial infrastructure most likely to employ Siemens PLCs. Most factories use Rockwell, except for the giant Japanese car plants, which all specified Japanese-made PLCs to UK equipment builders.

Leave a Comment