CyberSpark Billed as New Cybersecurity Capital for Israel
February 24, 2016
Beersheba, a city in Israel with a population of about 200,000 has become the site of several connected academic and technological influences, led by government and industry, which may position it to be the cyber capital of the country. The article Israel’s Cyber Sector Blooms in the Desert article from Security Week covers Beersheba’s industrial park, CyberSpark. A project leader for the Israeli National Cyber Bureau is quoted explaining how this area is primed to become a leader in cyber security. The report describes CyberSpark’s projected growth,
“Two more complexes comprising 27 buildings are to be added, and the municipality expects the population to grow by 100,000 in the next 10 years. About 30,000 soldiers, including 7,000 career officers, will move in the coming years to bases and a technology campus to be built on 100 hectares (250 acres) near CyberSpark and around Beersheba. As a lure from the bustle of cosmopolitan Tel Aviv, the government plans a bonus of $18,000 for single officers and $50,000 for families who spend at least five years in Beersheba.”
More often than not, we hear about cybercriminals taking the initiative while law enforcement, intelligence and others attempt to catch up. While the article frames CyberSpark as a case of proactive collaboration with necessary partners for the sake of forwarding the cyber security industry and protecting citizens, we are not sure it can be called proactive. Let’s not forget, as the article mentions, Israel may be the most heavily targeted country in the world with reports suggesting as many as a thousand web attacks per minute.
Megan Feil, February 24, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
No Evidence That Terrorists Are Using Bitcoin
February 23, 2016
If you were concerned virtual currencies like Bitcoin are making things easier for Islamic State (aka IS, ISIS, ISIL, or Daesh), you can rest easy, at least for now. The International Business Times reports, “Isis: Bitcoin Not Used by Daesh.” That is the conclusion reached by a Europol investigation performed after last November’s attacks in Paris. Though some had suggested the terrorists were being funded with cyber money, investigators found no evidence of it.
On the other hand, the organization’s communication networks are thriving online through the Dark Web and a variety of apps. Writer Alistair Charlton tells us:
Better known by European law enforcement is how terrorists like IS use social media to communicate. The report says: “The internet and social media are used for communication and the acquisition of goods (weapons, fake IDs) and services, made relatively safe for terrorists with the availability of secure and inherently encrypted appliances, such as WhatsApp, Skype and Viber. In Facebook, VKA and Twitter they join closed and hidden groups that can be accessed by invitation only, and use coded language.”
se of Tor, the anonymising browser used to access the dark web where sites are hidden from search engines like Google, is also acknowledged by Europol. “The use of encryption and anonymising tools prevent conventional observation by security authorities. There is evidence of a level of technical knowledge available to religiously inspired terrorist groups, allowing them to make their use of the internet and social media invisible to intelligence and law enforcement agencies.”
Of course, like any valuable technology, anonymizing apps can be used for weal or woe; they benefit marginalized peoples trying to make their voices heard as much as they do terrorists. Besides, there is no going back to a disconnected world now. My question is whether terrorists have taken the suggestion, and are now working on a Bitcoin initiative. I suppose we will see, eventually.
Cynthia Murrell, February 23, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
The Business World Is Not Prepared for a Cyber Attack
January 12, 2016
Cyber threats have been a concerning topics since computers became functional and daily tools for people. The idea of a hacker brings up images of IT geeks sitting in a dark basement with their laptops and cracking top secret codes in a matter of keystrokes. Hacking has turned from a limited crime to a huge international problem comparable to the mafia. While hackers are interested in targeting individuals, the bolder thieves target big businesses. News of Bahrain shares that “Biz Not Prepared For Cyber Threat,” translated from headline speech that means the business world would not withstand a cyber attack.
KPMG International released the 2015 KPMG CEO Outlook Study that found businesses are aware of risks associated with cyber attacks, but only forty-nine percent have prepared for one. The study surveyed 1,200 CEOs and one out of five are concerned about cyber risks. The concern has led many CEOs to take action with security measures and safety plans.
“ ‘The most innovative companies have recognized that cyber security is a customer experience, not just a risk that needs to be managed or a line item in the budget. In Bahrain, some firms are finding ways to turn cyber preparedness into a competitive advantage with customers, and they are using this as a differentiator.’ ”
Many companies that are attacked thought they were prepared for any threats, but they underestimated hackers’ intelligence, sophistication, and persistence.
Some of the companies with good cyber security are advertising their technical achievements to prevent attacks. It is a desirable feature, especially as more information is housed on cloud storage and businesses need to be aware of potential threats.
Whitney Grace, January 12, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

