12 thoughts on “Barak Acknowledges Israeli Cyberwarfare Capability for First Time, Shin Bet “Flamed” Israeli Defense Official’s Computer – Tikun Olam תיקון עולם إصلاح العالم
Comments are published at the sole discretion of the owner.

  1. I’m not sure why this article tries to connect the Flame virus and hacking that might or might not have gone on inside the IDF.

    The Flame virus is designed to collect information from computers in external networks and pass that information over the Internet. Why would you think such a virus is necessary when Koren’s computer/office/phone was sitting in the IDF network? If this was the case no sophisticated virus is needed to collect information. And in fact it could be that the IDF as an employer can legally collect info from employee emails etc.

    There isn’t even a tenuous connection between Flame and the Ashkenazi/Barak standoff. Pure imagination…

    1. He was an employee of the defense ministry on loan from the IDF.

      There certainly is a link–from my source who is in close contact with his own sources within the Israeli intelligence community. And your sources are whom?

  2. Hi Richard, I have to agree with Rain’s comments if his computer claimed to be compromised was his work PC. Most IntraNets (verses the Internet) run by Government Organizations or Corporations have Employee Network usage monitoring software. In fact the spying on Employees has become a real privacy issue, but work for an Intelligence agency and it would be expected. When they Bug your house and Monitor your personal computer usage, then you can be sure they are after you.

  3. Israel has nothing to do with the Flame virus, and nothing in this post indicates otherwise.

    There have been numerous articles published where Israel has officially denied responsibility for the virus.

    Are all these Israeli officials lying?

    1. Is this tongue-in-cheek? Who infected the 98 Israel/Palestine Israeli computers then? The US? Iran?

    2. You, Bob Mann don’t know what you’re talking about (not the phrase I originally wrote here!). I don’t care who’s denied what about Flame. They don’t know what they’re talking about either. And unless you offer credible evidence, that is someone proving there is no connection by offering real evidence, I will not permit future comments on this subject by you. Remember, stating something is true is not the same as doing so using credible evidence. A government PR flack denying something is worth nothing unless that person offers tangible evidence.

      I’ve offered a credible source whose word has been proven true numerous times in this blog. His military, security & political background are his bona fides. What are yours? Zero, efes, zilch, that’s what.

      1. Well, I only go by what I read. How can Israeli government officials go on the record denying any connection to this virus if that is not true? Can they get away with blatantly lying like that? Maybe I am just too trusting of what I see in print. Obviously you know far more about this topic than I do – I have no inside sources – I can only go by what I read, as I mentioned. You quoted an Israeli official in an earlier post on the subject and used that quote to support the idea that Israel was involved. And now I will respect your dictum not to comment on this subject further – I just wanted to explain why I wrote what I did.

        1. You’ve been reading this blog how long and you trust the word of Israeli officials? Remember, a diplomat is a gentleman sent abroad to lie on behalf of his country. In Israel’s case they’re often not even gentlemen.

  4. The Flame Virus basically is a trojan that allows for remote system administration and monitoring. It’s nothing novel beside that it’s a more complex version of what has already come out. First, to prevent detection. And second, to ensure efficacy.

    My son, when he was seven, used to turn the office secretary’s screen output upside down using a remote administration tool popular to the “hacking” underground of the era. It was otherwise used as a real remote system administration utility, mostly for network and systems technicians.

    Turning on a peripheral without a webcam LED also turning on to indicate live recording is not severely complex. Recording all of the video output and diverting it – not complex. Logging keystrokes – ancient; not complex. Manifesting control over the target computer without the user knowing it: not complex or novel.

    Looks like the only ones fanning the flame here are the Israelis. But why? Look to the real reason they have created a false Iranian nuclear threat. The threat they see is strategic: Iran is a natural rising hegemon in the region and Israel’s supremacy is artificially upheld by the unwilling welfare of the common American taxpayer.

    1. I’m pretty well satisfied with multiple computer security experts around the world calling this the most capable computer cyberwar tool ever created. They’ve seen the code, know what it does & have seen actual hardware infected with it. That’s a whole lot more than you can say. So while you’re entitled to yr opinion, it’s not based on nearly the level of evidence their opinion is.

      1. It’s complicated insofar as its two pillars as described: “First, to prevent detection. And second, to ensure efficacy.”

        Agreed, no one ever will twist your wrist to accept one analysis over the other (and shouldn’t!)

        We’d like to know who your ‘top experts’ are, however. Or better yet, we’d like to know how their points contradict ours. Ours, to summarize, is that this virus is simply complicated as to two logistical delivery facets, but not novel in terms of type and function (whatsoever).

        We will see who is more right depending on the fallout of said virus, both of our points really moot as the virus has happened already without recall! 🙂

        Detected instances are not damaging and because the main function is surveillance, it will be hard to calculate any metrics as to the extent of intrusion consequences. But, we don’t have Kapersky consultants on staff (or forensic data experts). Since it doesn’t appear that you do either, we will all have to wait. Iran’s government can only hide the effects and Israel similarly can only make covert use of such stolen information for so long before making it obvious that the information was transferred.

        We will leave you with one caution, however: many experts would have similarly told you that Y2K required billions in USD spend to prevent not so long ago. The media has not been straightforward with the American people insofar as Israel and Iran are concerned. Please do excuse us if we refuse to take the bait again.

Leave a Reply

Your email address will not be published. Required fields are marked *