Monday, November 23, 2015

Israel's IDF Unit 8200 - From Israel to Silicon Valley - GCHQ Puts Recruits Through Israeli-Like "Spook First" Program - UK's Cyber Security Strategy Closely Linked to Israel's Cyber Security - UK-Israel Technology Partnership - It's Not the University That Is Important, It's What IDF Unit Served In - Spies Like Pollard Are Obsolete - By Way of Deception: Cyber Warfare - "Israel's Enemies Are Our Enemies"

This information appeared 
at DavidDuke.com

Zionist extremist named head of British cyber security — Who needs Zio spies like Pollard?

November 23, 2015

This passionate Zionist former British ambassador to Israel will be the new head of cyber security in UK. Zionist extremists don't need spies like Jonathan Pollard anymore — now Israelis ARE the government.

Look who's in charge of UK government cyber security


By Stuart Littlewood

A chilling remark from a House of Lords debate just caught my eye.

Column GC355 in Hansard, the verbatim report of proceedings of the UK parliament, dated 4 November 2015, said:
Lord Mendelsohn: We welcome the appointment of the former British ambassador to Israel, Matthew Gould, who will have a key role in cyber security inside the Cabinet Office – a very useful and important position.
Sure enough, the UK government's website confirms that Gould is now director of cyber security and information assurance at the Cabinet Office. "He and his team are focused on keeping Britain safe from cyber attack, through delivering the UK's Cyber Security Strategy."

"Passionate Zionist"

They must think we have very short memories. As Britain's first Jewish ambassador to Israel, Gould described himself as a "passionate" Zionist and while in Tel Aviv he was instrumental in setting up the UK-Israel Tech Hub. In the words of MATIMOP (the Israeli Industry Centre for Research and Development), the hub was established
to promote partnerships in technology and innovation between Israel and the UK, and is the first initiative of its kind for the British government and for an embassy in Israel. The hub's creation followed an agreement between prime ministers David Cameron and Binyamin Netanyahu to build a UK-Israel partnership in technology.
Three years ago Cameron appointed venture capitalist Saul Klein as the UK Tech Envoy to Israel with the task of promoting the partnership, leading UK technology missions to Israel, bringing Israeli start-ups to Britain, and hosting technology events in both countries.

MATIMOP quotes Britain's National Health Service as an example of successful UK-Israel technology collaboration. The NHS
has now formed strong collaborations with Israeli life sciences companies conducting clinical trials in the UK. The cooperation was made as part of the burgeoning partnership between Israel and Britain's life sciences industries initiated by the UK-Israel Tech Hub.
Driven by the Israel lobby

Four years ago Craig Murray, a former UK ambassador to Uzbekistan, argued that British policy was being driven in an underhanded fashion by the Israel lobby. He linked Gould with the Fox-Werritty scandal and raised questions about meetings between disgraced former Defence Secretary Liam Fox and Fox's friend/adviser, Adam Werritty (who was backed financially by Israel lobbyists but had no security clearance and therefore no authorised role) and Gould.

Murray wrote to Gould asking when he first met Werritty, how many times he had met him, and how many communications of every kind had passed between them. He was told these questions would be answered in Cabinet Secretary O'Donnell's investigation. "But Gus O'Donnell's report answered none of these questions," wrote Murray. "It only mentioned two meetings at which Fox, Gould and Werritty were all three present…"

This prompted Murray to dig further. "There were at least six Fox-Werritty-Gould meetings, not the two given by O'Donnell… Matthew Gould was the only British Ambassador who Fox and Werrity met together. They met him six times. Why?"

Murray, with many useful sources from his days as an ambassador, claimed to have serious evidence connecting Gould with a secret plan to attack Iran, but the Foreign Office and the Cabinet Secretary blocked questions. Murray published his story, "Matthew Gould and the plot to attack Iran", here.

In it he pointed out that
Matthew Gould does not see his race or religion as irrelevant. He has chosen to give numerous interviews to both British and Israeli media on the subject of being a Jewish ambassador, and has been at pains to be photographed by the Israeli media participating in Jewish religious festivals. Israeli newspaper Haaretz described him as "Not just an ambassador who is Jewish, but a Jewish ambassador". That rather peculiar phrase appears directly to indicate that the potential conflict of interest for a British ambassador in Israel has indeed arisen.
He went on to say that Gould stood suspected of long term participation with Fox and Werritty "in a scheme to forward war with Iran, in cooperation with Israel". The stonewalling by O'Donnell and the Foreign and Commonwealth Office led Murray to conclude that "something very important is being hidden right at the heart of government".

Labour Member of Parliament Paul Flynn remarked that no previous ambassadors to Israel had been Jewish so as to avoid conflict of interest and accusations of going native. He immediately came under intense flak. Flynn too asked about meetings between Werritty and Gould, as some reports suggested that Gould, Werritty and Fox discussed a potential military strike on Iran with Mossad. "I do not normally fall for conspiracy theories," said Flynn, “but the ambassador has proclaimed himself to be a Zionist and he has previously served in Iran."

Fox had earlier made the idiotic claim: "Israel's enemies are our enemies" and "in the battle for the values that we stand for… Israel's enemies are our enemies and this is a battle in which we all stand together". The Jewish Chronicle hailed him as "a champion of Israel within the government". Furthermore, Fox continually rattled the sabre against Iran which, of course, was no threat to Britain but is regarded by Israel as a bitter enemy. Iraq too was Israel's enemy, not ours. Yet Fox, according to the theyworkforyou.com, voted "very strongly" for the Iraq war. He was also an enthusiastic supporter of the war in Afghanistan.

Gatekeepers or fifth columnists?

Given that Fox so eagerly waved the flag of a foreign military power and was a man with dangerous beliefs and demonstrably weak judgement, how could those who appointed him not see that he was unemployable as a minister of the British Crown – unless they were similarly tainted?

When the Werritty relationship came to light Fox jumped before being flung from the battlements. But the good people of North Somerset, in their wisdom, re-elected him at the general election last May. He's already on the road to political rehabilitation among the Conservative high command.

Gould's new job as head of the Office of Cyber Security and Information Assurance (OCSIA) involves giving strategic direction to cyber security and information assurance for the UK. This includes internet crime, working with private sector partners on exchanging information, and engaging with international partners in improving the security of cyber space and information security. Does it seem right for such a person to be in charge of crucial security matters at the heart of our government? What was in fellow Zionist David Cameron's mind when he appointed him?

Well, here's a possible clue. In March of this year Francis Maude, the previous Cabinet Office minister responsible for cyber security, announced three UK-Israel academic collaboration ventures with cyber research funding, the partnerships being University of Bristol/Bar Ilan University, University College London/Bar Ilan University and University of Kent/University of Haifa. They'll be working together on six specific areas of research:
identity management
governance: regulating cyber security
privacy assurance and perceptions
mobile and cloud security
human aspects of security or usable security
cryptography.
This builds on existing UK-Israel cooperation. Both parties signed a Memorandum of Understanding on digital cooperation in March 2014.

Still sitting comfortably? Only this week the Cameron government was lecturing us on threats to national security and announcing plans to trawl through our personal emails and web browsers in order to "keep us safe". The question is, who trawls Gould's private emails?
__________


This news appeared 
at Crunch Network

From The Israeli Army Unit 8200 To Silicon Valley 

March 20, 2015
by Idan Tendler

Editor's note: Idan Tendler is the CEO and co-founder of Fortscale, a provider of big data analytics-driven security solutions for Fortune 1000 companies. Before founding Fortscale, Tendler was a lead agent of the 8200, the cyberwarfare division of the Israeli Defense Forces.

How does Israel, a small country with roughly 8 million people, produce more tech startups and receive more venture capital per capita than any nation in the world? Why does a country with few natural resources have more companies listed on the NASDAQ than Europe, Japan, Korea, India and China combined?

To understand Israel's innovation success, look no further than the Israeli Defense Forces and the country's mandatory policy of service for young adults. For me and thousands of Israeli entrepreneurs like me, our startup journey began in the technology units of the Israeli Defense Forces. One unit in particular has become a prolific technology incubator, particularly in the field of cybersecurity: IDF Unit 8200.

The 8200 is a special unit, and in many ways, it's run like a high-tech startup. It begins with finding the best talent. IDF scouts comb the nation's high schools to identify high-potential candidates at an early age. They target students with superior analytical capabilities, who can make quick decisions and work well in a team environment. Only the best and brightest are routed to this elite cybersecurity group.

Instead of relying on outside research and development, the 8200's technologists work directly with their "customers" (the intelligence officers). All of the unit's technology systems, from analytics to data mining, intercept, and intelligence management, are designed and built in-house. Technologists sit side by side with their users on a daily basis to ensure that their "products" meet the intelligence officers' specific requirements.

The result is that 8200 alumni have developed critical startup skills and experience even before they start their first company. That’s why it's not a surprise that technology companies, such as CheckPoint, Imperva, Nice, Gilat, Waze, Trusteer, and Wix all have their roots in this IDF unit.


One of the earliest and most meaningful sessions during my 8200 training was held on a rainy day back in 1999. Unlike some of my high school friends who were already combat trainees stationed in the cold Negev Desert, Unit 8200 training was held in cozy heated classrooms. We were a bunch of 18-year-old kids who, in a couple of months, would be leading complex intelligence technological operations in Israel's equivalent of the NSA.

In this intense course, we learned how to produce intelligence, leverage the most advanced SIGINT (signal intelligence), utilize sophisticated data-mining techniques, and conceive highly advanced technologies. On that particular rainy day, our instructors ran us through a simulation exercise. They provided us with hundreds of short, fictional pieces of intelligence. Each one, on its own, appeared inconsequential. Very quickly, however, one of my classmates, a future intelligence officer, began to piece together the puzzle presented to us.

He yelled: "A war is about to break out!"

An intense debate erupted among the trainees about the true meaning of the seemingly unrelated information we had been provided.

Our instructors had used the simulation to stimulate a heated discussion and, perhaps more importantly, a leadership test case. While we were passionately arguing whether a war was about to take place in our fictional state, our instructors dramatically stopped the simulation and ended the discussion. They told us that the simulation was based on real-life events, and indeed, a war had broken out. My classmate had been right.

It was an important, poignant lesson for my classmates and me. We learned that succeeding in intelligence work required more than just discipline and professionalism. Success required out-of-the-box thinking, the courage to contradict conventional wisdom, and an ability to stave off hubris. A good intelligence officer needed to understand when to bypass hierarchies and be willing to take risks and make mistakes.

Today, as a CEO and entrepreneur, it's fascinating to look back at my time spent in the IDF's 8200. It was a formative learning experience that helps guide me in my job leading a fast-growing startup. As young adults with no university or professional experience, we ran complex technological projects and initiated startups on a regular basis. We invented best practices in data mining and investigative techniques. We learned to question authority and traditional ways of thinking in order to continuously improve outcomes.

Our teams worked almost 24/7 without fear of the challenges we faced. And we did it for hardly any pay. It was in the 8200 where I learned that the passion to invent starts with leadership and values. It begins with the belief that you have a sense of accountability and are doing something important that can change the world.

Years later, I brought together a group of 8200 veterans to found Fortscale. We apply philosophies, advanced machine learning, and data-mining concepts learned from our military service to identify malicious user activity and develop security analytics solutions.

But our 8200 experience taught us many lessons more valuable than cybersecurity techniques and tools. We learned that success at our startup requires a willingness to constantly take risks in challenging situations, even when we are facing nation-state cyber-adversaries. Success requires a persistent desire to improve and learn from failures.
________


This news appeared 
at Entrepreneur

5 Growing Cyber-Security Epicenters Around the World


The recent hack of Ashley Madison reminds us just how vulnerable society is to cyber attacks. Big companies such as Target, Home Depot, Michaels, P.F. Chang's and JP Morgan fell victim to data breaches in 2014, and the attacks have continued this year.

Cyber attacks not only compromise the personal information and sensitive data of consumers, but pose tremendous threats to businesses, governments and militaries. The global balance of power and billions of lives are dependent on keeping computer infrastructure safe.

To combat attacks, interest in cyber security companies is heating up and heavy investment is following. Cyber-security companies are hiring by the droves, with some creating hundreds or thousands of jobs every year alone.

"This year we are hiring hundreds of employees for development and deep technology positions," says Dorit Dor, vice president of product at Check Point, a prominent IT security firm.

Related: Ashley Madison CEO Is Stepping Down

To support this exploding industry, several cyber-security ecosystems have developed around the globe, consisting of companies, venture capitalists, talent and expertise concentrated in small areas. These are the top places in the world for cyber security:

1. Silicon Valley

Silicon Valley is home to the vast majority of leading cyber-security companies. There is a great deal of venture capital being poured into anti-virus, anti-spamming and anti-hacking software in the area.

Data protection is an exploding area as well, where threats are mounting not only from external hackers, but also internally. For example, according to McAfee founder John McAfee, the recent Ashley Madison data breach was caused by a lone female employee of the site, he wrote in a recent International Business Times op-ed.

Data theft from internal threats is yet another area Silicon Valley firms are protecting clients against.

Silicon Valley's overall authority and dominance in the tech industry makes it a natural place for cyber-security startups to spring up. Corporations, military and government are turning to the area for protection from hackers and terrorists. In April, the Department of Defense announced partnership initiatives with Silicon Valley companies to prevent data breaches. Companies such as Cylance, Ionic Security and Symantec are headquartered in Silicon Valley.

Startups in Silicon Valley continue to launch, innovate, merge and change along with the demands of the tech industry, and there's no doubt that founders in the area see cyber security as a huge opportunity.

2. Israel

The combination of Israel's booming startup scene, severe security threats and large talent flow from military-intelligence units has led to the state becoming a global cyber-security superpower. In the last several years, a cyber-security synergy has formed between startups, multinational tech giants, academia, the military and government.

"There is a governmental focus on making Israel a cyber leader, and the prime minister is very involved. I'm optimistic that Israel can become one of the top two cyber-security hubs in the world," says Nadav Zafrir, founder of team8, an unconventional VC firm in Tel Aviv that invests in innovative cyber-security companies.

Zafrir, a former commander of Israel's famed intelligence corps, Unit 8200, told me that the conscripted Israeli military experience has become a major generator of entrepreneurial skills, as people are trained fast, learn how to cope with failure and how to innovate by achieving the impossible because lives depend on it.

There are more than 200 cyber-security companies in the small country, mostly in Tel Aviv and also Jerusalem, with more than $3 billion in annual cyber exports. Leaders include Check Point, CyberArk, Imperva and illusive networks.

Please go to to Entrepreneur to read the entire article.
________


This information appeared 
at the Independent

GCHQ's 'spook first' programme to train Britain's most talented tech entrepreneurs

Exclusive: Surveillance agency to set up training schools for top graduates, while budding entrepreneurs will be put through Israeli-style 'spook' courses

2 January 2015


Britain's surveillance agency GCHQ could become an incubator lab for the country's most talented tech entrepreneurs under a government plan for a new "spook first" training programme for graduates.

The idea is not just for those who want to spend a lifetime becoming spies. Whitehall officials are now examining whether recruitment to the secretive listening agency could be opened up to graduates who would ultimately like to set up their own companies or work in the commercial IT sector.

The scheme is being loosely modelled on the highly successful Teach First programme, where graduates agree to work in challenging schools for at least two years after leaving university with the prospect of a top-level commercial job at the end of it should they decide to leave the profession.

The Government is also examining whether any of GCHQ's intellectual property could potentially have civilian and commercial applications – particularly in the realm of cyber security.

The initiative comes after ministers examined the success of Israel in nurturing tech entrepreneurs who have worked in the Israel Defence Forces' Unit 8200 – its equivalent of GCHQ. Several alumni of Unit 8200 have gone on to found leading Israeli IT companies, among them the cyber-security company Palo Alto Networks, which is now worth around $10bn (£6.4bn), and the instant-messaging company ICQ, which was sold in 2010 to Digital Sky Technologies for nearly $200m.

Cabinet Office minister Francis Maude

The Cabinet Office minister Francis Maude recently visited Israel, where he met alumni of Unit 8200 who have gone on to run their own tech businesses. "I have long admired the Israeli 'start up' nation which is home to more hi-tech start-ups per capita than any other country," he told delegates at an international summit in London on his return.

While the Israelis have the advantages of national service to select the most promising cyber experts, Whitehall officials and the leaders of GCHQ believe there are elements of the scheme that could be successfully adapted.

In particular they believe a variation on the Teach First model could be used – encouraging the most promising graduates to spend time working for GCHQ before moving into the private sector.

"We have loads of talented people working for GCHQ – and there is no shortage of academic excellence," said a Cabinet Office source.

"The question is can we create a secure space where business can work with GCHQ and build an eco-system between the two.

"It is not a million miles from Teach First and we have thought about that link.

"The idea is to say to graduates you do not have to sign up to GCHQ for your whole career and there are options for you in the private sector.

"There is more thinking to be done and a debate to be had about how it might work but we want to capitalise on the expertise in GCHQ in terms of IT commercialisation."

A source in GCHQ added that they were also "interested" in the Israeli model alongside other partnerships with industry and academia to address the technical skills deficit in the UK.

They added that the fact that the UK does not have National Service made it difficult to mirror the Israeli model exactly, but there could "nevertheless be aspects of their approach that we can learn from". Brig Gen Hanan Gefen, a former commander of Unit 8200 and current consultant to hi-tech companies, recently told the technology magazine Wired that many areas of Israeli tech would have been fundamentally weaker were it not for technologies that came from 8200.

"Take Nice, Comverse and Check Point for example, three of the largest hi-tech companies, which were all directly influenced by 8200 technology," Mr Gefen said.

"Check Point was founded by Unit alumni. Comverse's main product, the Logger, is based on the Unit's technology. Look at Metacafe (one of the world's largest video sites). Eyal Herzog, one of the founders, is also an 8200 alumnus and he accumulated a huge amount of relevant experience in the Unit."
________


Further reading:

Gareth Williams case far from solved - Cryptographic whiz - Scotland Yard ignoring evidence - "Mediterranean-looking" suspects = Israelis - Yigal Farkash - Cisco acquires Rupert Murdoch-owned NDS - Investigating Israel's use of malware (Stuxnet, Flame) - British media covers up for Mossad crime

Alfreda Frances Bikowsky, "The CIA's Prime Cheerleader for Torture" - "Global Jihad Unit" Is a Fraudulent Construct - Israel Defense Forces' Unit 8200 (IDF Signals Intelligence) - Some of the World's Most Powerful Malware Attacks - Israel's Primary Intelligence Agencies (Aman, Mossad, Shin Bet) - Opacity of Israel's National Security Apparatus Impairs Accountability - The Secrecy Monolith - We Must Hold the Nation's Servants Accountable for Their Actions

A Make or Break for America - Unbridled Arrogance - The Genie Is Out of the Bottle - You Cannot Bury the Truth - The Same Root of Evil - Nuclear Blackmail - Extremely Disproportionate Influence - Horrible and Bitter Wine - Compartmentalization: A Composite Work of Evil




Unit 8200, Israel's Central Intelligence Corps: The Secret Revealed
 

Does Israel's 'Unit 8200' Go Too Far 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Looking into our circumstances...