Tech & Cyber

Weapons of Combat: "Tirat Ha’Agam"
Improvements in the command and control system of the General Staff were made during Operation Protective Edge
IsraelDefense
25/8/2014
Behind the Scenes of Cyber Warfare
The Operations Department of the IDF C4I Directorate is responsible for operating all of the IDF's C4I resources at any time and under any weather conditions
Ami Rojkes Dombe
25/8/2014
IDF and ISA Thwarted Massive Cyber Attack
During Operation Protective Edge, pro-Palestinian hackers attempted a major cyber attack against Israel. IDF and Israeli security forces foiled the attack, but hackers remain determined to harm essential Israeli infrastructure
IsraelDefense
24/8/2014
The Units of Combat: The "Flyers" of the IDF C4I Directorate
The people operating the IDF C4I Directorate's airborne relays are regarded as the special operations unit of the military communication world. They accompany the IDF’s elite units, from the air, in every corner of the globe. A rare glimpse
Ami Rojkes Dombe
10/8/2014
From Weapon Systems to Managed Information Security Services
The technological developments in the field of cyber have compelled the defense industries to change – and fast. "We are competing in an arms race where the bad guys are winning", says Esti Peshin, Director of Cyber Programs at the ELTA division of IAI
Ami Rojkes Dombe
24/7/2014
Part of the Battle: Attempts to Bring Down Israel's Internet
ISA: There have been attempts to disable the Israeli Internet through DoS attacks. Extensive effort of defense
IsraelDefense
23/7/2014
The C2 System of the IDF GHQ "Pit"
The IDF use many C3 systems, but only one provides IDF GHQ with a status picture of the war. It is called "Tirat Ha’Agam". The Matzpen Unit is responsible for the development and maintenance of the system. Exclusive interview
Ami Rokjes Dombe
23/7/2014
The Power of Big Data in Energy
The energy domain has been hibernating for the past 20 years, but at Nation-E they say "It is now time to advance the most critical domain that has been left the most far behind" - using Big Data resources
Ofir Rosenzwieg
3/7/2014
Inter-Arm Tactical Communication
The IDF C4I Branch, in cooperation with various service branches, are developing communication capabilities that would enable tactical echelons in all various sectors to communicate with one another directly
Ami Rojkes Dombe
29/6/2014
Manipulating the Web Surfer’s Opinion
After Stuxnet, DDoS attacks, viruses and ransomware, it is the time of social malware. The objective: manipulating public opinion for the purpose of accomplishing political and economic goals
Ami Rojkes Dombe
26/6/2014
Next Page  [5-15]...[16-18]