Comprehensive coverage

Chairman of the MOLMP Prof. Yitzhak Ben Israel: Israel must build a supercomputer with a power of 200 teraflops

The computer is intended for the purposes of developing defense systems against cyber-attacks on Israel within the framework of the national cyber project, which was recommended by the Ministry of Education and Culture to the government and which was presented as part of the Yuval Na'eman workshop for science, technology and security

Prof. Yitzhak Ben Israel and Prime Minister Benjamin Netanyahu at the Yuval Na'eman workshop for science, technology and security, June 8, 2011
Prof. Yitzhak Ben Israel and Prime Minister Benjamin Netanyahu at the Yuval Na'eman workshop for science, technology and security, June 8, 2011

Israel must prepare for the cyber battle in which enemies will try to bring down essential infrastructures to disrupt the life system in Israel, such as banks, traffic systems, which, being civil systems, are less protected than military systems from a cyber attack.
This is according to a conference held last Thursday by the Yuval Na'eman workshop for science, technology and security, which dealt with the topic of cyber warfare - challenges in the global, political and technological arena. One of the recommendations deals with the need to build a supercomputer with a power of 200 teraflops to allow Israel to run simulated attacks and practice and to fight in an emergency against hackers trying to paralyze infrastructure systems.

More recommendations of the committee:

  • The establishment of a national cyber headquarters, an executive body to handle state infrastructure and the civil sector, policy and regulation to encourage cyber.
  • 200 teraflops supercomputer - which will be the basis of the knowledge with which anyone can build a supercomputer for their needs.
  • Development infrastructure for cyber technology: simulator and certification laboratory
  • Recommendation 5 - Education, higher education and raising cyber awareness
  • Development of cyber emergency tools - attacker identification and restoration
  • National cyber defense envelope
  • Development of decentralized cyber defense
  • Development of technologies and blue solutions and
  • The establishment of a follow-up committee for the project, so that it will continue to take care of the development needs in the field even after the committee finishes its duties

 

Prof. Ben Israel explains: "I'm constantly being interviewed and asked if the Kirbantian world is serious, so what, there will be a few days without internet. It is perceived as someone breaking into a computer, corrupting a website and it is not a big disaster. But the problem is much more serious than sites that go down - hackers can cause damage to civilian infrastructure and paralyze the country."\
"The vision that is going to preserve Israel's position in the world as a center for the development of information technology and to give it a first-class capability in the cyberspace, in order to ensure its economic and national resilience as an open, democratic and knowledge-based society.

The main questions discussed by the committee are what are the necessary steps to encourage and develop the kirvanti field in Israel, and to bring about a leap forward that will secure the position of the State of Israel in the world arena; How to promote synergy between the security sector, industry and academia; What knowledge infrastructures are needed to address the needs in the field of supercomputing in the State of Israel; What changes in the series (organization, responsibility, policy and regulation) are necessary to enable optimal dealing with the challenges and threats in the cyber space?
"We established eight committees, four of which dealt with in-depth issues: computing, encryption and simulation, defense, one dealt with action (things that cannot be discussed), in addition, four more horizontal committees were convened to deal with economic benefits, the benefit and insights that the academy can provide, policy and legislation, as well as a subcommittee for the removal of defense on information systems. I chaired the committee by virtue of my position as the head of the MoLMOP."
The committee was based on the members of the Supreme Committee for Science and Technology, which includes the three largest R&D bodies, Prof. Manuel Trachtenberg, chairman of the TMT, head of the Ofir Shoham Research Institute (responsible for military R&D) and Avi Hasson, the chief scientist at the TMT , the government's economic advisor Prof. Eugene Kendall and to them we added other representatives such as the Ministry of Science, the commanders of the technological units and the head of the RAM (Information Security Authority).

Findings of the Monitoring and Control Defense Committee

  • Cyber ​​attacks constitute a potential for a substantial threat to the functional continuum in the country. The glass is half full There is a partial solution to the security infrastructure and critical infrastructure systems.
  • A major gap in the cyber protection of the civil space has been identified
  • There is no national headquarters body for determining cybernetic policy in Israel
  • There is currently no response at a sufficient level to targeted attacks on civilian space, a gap in awareness of the intensity of the threat
  • There is a lack of sufficient MOP activity on the topic of cyber defense. The State of Israel has the potential to be a leading player in the world in the field of cyber defense.
  • In this context, it must be said that there are less critical systems, but disrupting 3-4 of them would be critical, for example damaging the exchange rate can also be done by logging into the computer at the banks that determine the exchange rate.

Findings of the Computerization Committee on

  • There are no supercomputers in Israel and there is no critical mass of knowledge at an international level in high-performance computing, with an emphasis on the practical aspect
  • There are islands of knowledge in the field, but there is no synergy between them and they are scattered in a way that does not encourage cooperation
  • Even in places where there are high-performance computers in Israel, there are knowledge gaps
  • Some consumers are unaware of the possibilities they can advance in their sector given high-performance computers and a supportive environment.

Findings of the Code and Simulation Committee

  • The security cipher is critical to the robustness of security systems. It is important to maintain state action capabilities in the field
  • Israel has first class capabilities in the theoretical field and is weak in industrial application
  • There is a need for the simulation of the cyberspace in the security system and in the academy for development and training purposes.

The findings of the Academic Benefits Committee

  • It is necessary to strengthen media research in Israel in the cyber field
  • A knowledge and research center is needed in the field of supercomputing
  • There is a need to increase research collaborations between academia, defense and industry
  • It is necessary to strengthen teaching in the field for the benefit of training the workforce
  • It is important to increase cooperation in the field between the academy and the decision makers and policy makers.
  • The academy in Israel has needs in the areas of knowledge, consulting and professional training in advanced calculation
  • An upgrade of local computing capabilities is required, but there is probably no need for a computer as a central service provider.
  • It was found that there is a basis for the main idea, for this purpose liberalization and transparency in export permits and increased outsourcing is required.
  • The cyber industry in Israel can be directed to focus on the national needs in protecting the cyber space
  • There is a need for central management of the Kirbantian effort
  • Government projects can create new relative advantages for Israeli industry and the national strength of the State of Israel.
  • We believe that this can give a new direction to the field of high-tech in Israel.

The findings of the subcommittee - the regulation

  • The cyber defense response of 2002 is not appropriate in 2011
  • Insufficient response to state infrastructure (secure bodies)
  • There is a lack of a broad national perspective on the issue of cybernetic space in general and cybernetic safety in particular
  • There is a difficulty in realizing the responsibility of the Supreme Steering Committee for the protection of computerized systems.
  • Adjustment of the Israeli legal system to reality is needed.

36 תגובות

  1. The ideas here are excellent. But the example of disrupting the exchange rate published by the Bank of Israel is not a good example. Knowing the facts in this case, I can say that the reason why this example is not good is that since the Bank of Israel samples the bid side BID and the ask side ASK randomly (to the extent that a computer program is able to perform a "random" sample) a large number of times during the course of two hours before the publication of the daily representative gate which is published at 15:30 p.m., and the data is captured by simple Access software and the calculation is carried out using an even simpler Excel file, a file that can be easily isolated from cyberspace, and after Then the resulting number is checked by the economist responsible for it before it is published, after all any unusual number that was created as a result of a virus or a hacker, would be immediately invalidated and the Bank of Israel would immediately perform the calculation manually, if necessary, and publish the correct figure of the exchange rate.
    Regarding the possibility of attacking the computer systems of the banks' forex trading rooms, and disrupting the daily forex trading, that is another story... Because the systems are based on REUTERS's DEALING3000 and each of them is connected to its counterpart in the other banks and the current exchange rate in trading itself is determined through dealers who communicate with each other through chats. But even here it's not easy because it's a non-linear connection. It is possible to overthrow the system itself, but I would not underestimate the capabilities of the FIREWALL of information security in the Israeli banking system.

  2. 200 tflops must be a joke - as if I woke up in the nineties...
    80 graphics cards is all that is needed these days for such a computer...
    At a quick calculation it should cost about $200,000
    which is equivalent to the vacation budget of…

  3. I liked the following sentence
    The most recent definition has been proposed by Louis Kauffman, President of the American Society for Cybernetics, "Cybernetics is the study of systems and processes that interact with themselves and produce themselves from themselves

  4. Wikipedia says
    Cybernetics is a field of applied mathematics that deals with the study of communication processes, control systems and feedback principles between humans, organizations and machines.
    And roughly in English the word itself has a meaning
    The term cybernetics stems from the Greek kybernētēs (kybernētēs, steersman, governor, pilot, or rudder — the same root as government).

  5. Danish:
    The article was prepared by my father when he heard a lecture in which the lecturer ran the slides quickly and not all the details were understood.
    Therefore, you will not be able to get the full answer at this stage (my father will try to get a full answer from the source).
    In the meantime - I can point to part of the answer that appears in the article:
    "To allow Israel to run mock attacks and practice"

  6. As a person who works in the field, I did not understand the connection between supercomputers and the protection of the computer infrastructure in Israel. Generally in Israel there is not enough awareness of information security. (For example, usually Israeli websites are less secure than websites in America). I know how a supercomputer can help with hacking on rare occasions, but not how a state supercomputer will protect computers of state residents. Most of the information security work is finding security holes, not decryption.
    post Scriptum. There are not many supercomputers in Israel, but the lack is usually overcome by using clustering (several computers that work together as a supercomputer) or distributed algorithms (an algorithm running on several computers), thus saving a lot of money.
    clustering – http://en.wikipedia.org/wiki/Cluster_%28computing%29
    Distributed algorithms – http://en.wikipedia.org/wiki/Distributed_algorithms

  7. Come on, instead of debating whether "cyberanti" is in Hebrew or not, maybe start working on building the 200 teraflop? =)

  8. In my honest and unscientific opinion, anyone who responds to articles or weighty topics such as protecting the Israeli cyberspace from terrorist attacks and introduces a political tone that is useless, long-term and meaningful, turns himself into an inferior person both scientifically and in any respect, what is more, that a response should be respectable and factual, and I would even risk and claim An opinionated person who claims to be a graduate of the Technion brings in the subject of Fatah, the PLO and the settlements, knowingly making a mockery of himself and turning the serious website into a joke and a hoax. "H and settlements, how is this related to terrorist attacks on cyber and in the cyberspace, to God and to man, let alone solutions!!!

  9. For everyone's information, there are 5 countries in the world that can use cyberspace to paralyze the computers of other countries such as Iran and inject them with viruses that will slow down the attempts to carry out such and such atomic centrifuges and produce even more a clean or dirty atomic bomb. The cyberspace and not long ago the USA claimed that anyone who tries to commit computer terrorism against it may declare it a casus belli meaning a declaration of war, so the issue of cyber space is definitely a worthy and sometimes very painful issue for our countries, so there is more to be done

  10. True, there are enough sites that deal with this.

    And in any case, regardless of the cause of the threat, as long as it exists, a country that cares for its citizens must respond to it, whatever the reason, what's more, everyone sees the reason according to the political opinion they hold. The MLM has no influence on the policy regarding the settlements, and in all likelihood, allow me to guess that there will remain haters of Israel even after peace with the Palestinians and the return of all the settlements - Iran for example, so the cyber threat is not really related in any way to the settlements and must be evaluated against it.

  11. For an open mind
    If the State of Israel were to find out in depth scientifically the reasons for the constantly undermined security, it would find the settlements to be the main reason.
    The claim that science should not be mixed with politics, for aesthetic reasons, is ridiculous. Always, really always, the relations of the countries were based on their technological capabilities, that is, on their scientific capabilities. In times when there was no science like nowadays, nevertheless there were thinking and creative people who gave different countries extraordinary technological abilities in the military force.
    In modern times, Europe's expansion in the world is based on its technological capabilities based on its science, and Nazism was also based on technology and science, not to mention the atomic bomb.

  12. Father, your words calmed me down. Thanks.
    And in general, thank you for your excellent site.
    I always go in to wash my head in it and always find something interesting.
    Really thanks and good luck.

    Regarding all kinds of threats to bring down websites, there is really an example of another such implied threat up here.
    In connection with this, the following is a constructive proposal and precisely in connection with the news above:
    With an educated guess, it would be possible to assume that the number of "hackers" who read and enjoy your website is much greater than the number of people who lack the culture of speech and tolerance who will try to bring it down.
    If so, create a "safety shift" of "cyber volunteers" who will help you protect the site from all kinds of threats and other bullshit.
    I guess you will find volunteers. 🙂

  13. My comment was not political. It was factual as a response to someone making a political claim. I also agree with Yossi Preminger, that in any case the occupation is not within the area of ​​responsibility of the MoLMOP and I hope that we have closed the political part of the responses.

    There are worse factors that can't be visited at all - some ultra-Orthodox threatened that if I don't take down the article about the murder of the dog that 'entered the soul of a lawyer' they will take down the site. Apparently just because someone has internet doesn't make them enlightened.

  14. For 9 (Avi Blizovsky):
    In my understanding, reality shows that it is desirable to avoid mixing science and party politics.
    Personally, I would prefer that this site dedicated to science and its appendages not have such a mix-up, simply for reasons of aesthetics.
    Take into account that opening the door to party/political politics on this site will bring with it a lot of noise and noise from mini-trolls to the right and left and from every possible hole.
    Ask yourself if this is what you want...

    Final note: To the best of my recollection, during my time at the Technion, the only place where party politics was expressed (not the boring AST) was on the walls of the bathrooms. In my opinion, this is her rightful place in the scientific discourse.

  15. I agree that the occupation is more dangerous than viruses, but I'm pretty sure it's not in the domain of the MoLMOP and therefore I don't think it's useful to bring it up here.

  16. You don't mind defamation even if it's a lie.
    You should remember to back up your site well.

  17. L 4: You are insolent and a provocateur. This is a scientific article, why bring in politics?

    And by the way - from a Palestinian point of view, the entire State of Israel is one big settlement. If the Palestinians' problem was the settlements then they wouldn't be shooting at Beer Sheva and carrying out terrorist attacks in Tel Aviv... you should listen to what they say in Arabic (go learn) and stop interpreting only what you want to hear.

  18. I am ready to build the "flop 200" for a nominal amount,
    And as a bonus and to show solidarity with the struggle to maintain the security of the country,
    He will also have an arm to kill mosquitoes!

  19. The article above is a bit exaggerated (too many cyberspace books)
    The most real and tangible risk to the citizens of Israel is biological warfare.
    The reason for this is that another country could cause a deadly epidemic to break out in Israel in such a way that it would not be possible to trace the source of the attack. Therefore this is a tangible risk.
    A reasonable country will not attack Israel with chemical weapons or any other non-conventional weapon that requires missiles because then an Israeli counterattack will be launched against it which will probably use nuclear weapons.
    Biological weapons are cheap and relatively simple to make, which is why they are so dangerous and so readily available to carry out terrorist attacks.

    Everything written in the article above is true but does not really put the citizens at risk of significant mental harm.
    What really pushes the activity up are the economists and industry people - and rightly so.
    Israel should continue to operate economically under various types of aggression.
    Individually and immediately, Ben-Israel is simply trying to direct resources to the drying up academy and this despite the fact that the best minds are in the industry and did not stay to dry out in the academy.

  20. Israel's most effective defense system is to give people like you an orange card, and move you to Gaza.

  21. Is the title a direct quote from the professor?
    If so, I would like to know exactly what the connection is between supercomputers and hacking protection...
    I quickly went through the recommendations and they are interesting, but there is no reason to mix gender with non-gender.

  22. It's a shame that the country doesn't have a supercomputer... not even in the universities.

    At Ben Gurion University, for example, there was a computer with 10 cores (...) and it was called the "supercomputer" of the computer science department...

Leave a Reply

Email will not be published. Required fields are marked *

This site uses Akismat to prevent spam messages. Click here to learn how your response data is processed.