[Salon] If the Iranians are cyberterrorists, so are Israelis - Opinion - Haaretz.com



Speaking of Trump and DeSantis, and the “cognitive warfare" they wage against Palestinians and their supporters in the form of BDS as one example, it should be noted: "Someone who uses diplomatic or legal means, or even calls for a boycott against Israel, is not a terrorist. He is a diplomat or a legal scholar or a BDS activist, who actually refrains from terrorist activities.”

Given how enthusiastic Republicans/Conservatives are today for people to “rat out” their fellow citizens for “aiding and abetting abortion," how long would it be before a Trump or DeSantis (with Koch support, as they did at the state level) would “outlaw” speech critical of Israel like Mississippi once had for its “Civil Rights” activists?  


Maybe DeSantis should form a “Political Police Squad,” under his control? Never-mind; been there, done that:
DeSantis, widely considered a future GOP contender for president, has dismissed those demands as unnecessary in Florida, which he has said is a voting model for the country. Nevertheless, he has pushed for new voting measures that he said will prevent election fraud. (It passed into law.) . . .
"This is Gov. DeSantis' political police squad. That's what this is," he said. "You shouldn't have partisan election officials directing an agency like this.

Almost like confirming this: "Calls for an investigation ultimately landed in the lap of the Florida Department of Law Enforcement, which again found no evidence of wrongdoing.
"Pushaw seemed to confirm that the later episode could have fallen under the jurisdiction of DeSantis' new elections force, had it existed."
Pushaw is DeSantis’s Cognitive Warfare expert, against our own citizens:
"In her filing with the Justice Department, dated June 6, she wrote that her activities “included perception management, public relations, and preparation and dissemination of informational materials to an international audience, including U.S. persons and entities.”

We know where he stands on indiscriminate surveillance of US citizens, because of his past votes in favor of that: 

"A roll call posted after the vote shows that breaks down to 191 Republicans and 65 Democrats.

"The vote came to a head after years of debate over the US' surveillance and intelligence-gathering capability, largely brought to light after the Edward Snowden disclosures in 2013."

  1. (One of the 191 Republicans supporting Stasi style government surveillance)
  2. Ron DeSantis (FL-6th)

Gosh, he’s the perfect Republican candidate, Chief Executive Officer of a Police State of his own design. Even more than the “perfect country song” is “perfect:" 


If the Iranians are cyberterrorists, so are Israelis - Opinion - Haaretz.com

Defense Minister Benny Gantz owns the copyright to a new term: cyberterrorism. In a speech last Wednesday at Cyber Week, an annual international cybersecurity conference held at Tel Aviv University, he said “Iran is leading cyberterrorism.” He also added a threat, as though the frequent threats by Israel’s leaders, the IDF chief of staff and the head of the Mossad are insufficient: “Iran operates proxies in the cyber dimension as well. The new proxies are terrorists with a keyboard, who will be punished like other fighters in terrorist organizations.”



There is seemingly no limit to Israel’s desire to use the word “terror,” which took root in the Reign of Terror masterminded during the French Revolution by Maximilian Robespierre. With time the word took on the meaning of using violence, mainly against civilians, in order to create a climate of fear to achieve a political, military or personal goal. That's terms like “acts of terror” and “terror attacks” entered the lexicon.

Since Israelis in general and the political and military leadership in particular are in love with the word because it reinforces paranoia and victimhood, absurd derivatives have been added to ordinary terrorism: “diplomatic terrorism” and “legal terrorism.” They aim to deny the Palestinians the right to fight the occupation with diplomatic tools – to pressure or influence states to change their attitude toward Israel – or legal tools – to sue members of the Israeli military in the International Criminal Court. But these Palestinian efforts are not terrorism. They are its exact opposite. Someone who uses diplomatic or legal means, or even calls for a boycott against Israel, is not a terrorist. He is a diplomat or a legal scholar or a BDS activist, who actually refrains from terrorist activities.

Nor is the use of digital tools terrorism. It is a means, increasingly common in recent years, of achieving a large variety of goals. It helps criminals commit economic offenses such as monetary theft, fraud and sex crimes; it enables identity theft, impersonation and information theft. Cyber tools enable the dissemination of disinformation in an effort to distort reality and create “alternative truths.” They can influence public awareness in order to try to change election results, as Russian President Vladimir Putin tried to do in the 2016 elections in the United States, Britain, France and other Western democracies.

In the military and security context cyber must be discussed in terms of warfare rather than terrorism. Since World War I, war has been waged in three dimensions: on land, on sea and in the air. Less than 20 years ago the cybernetic dimension began to develop, and now another dimension has been added – artificial intelligence.

The potential damage to the enemy through cyberwarfare is tremendous. It can cause the deaths of hundreds of thousands of people. If hospital computer systems are paralyzed, people will die. Instead of firing a missile at a power station, they hack its computers. If a nuclear power plant is shut down, it may emit radioactive fallout. If computers operating dams are interfered with, there will be flooding. If water companies’ computers are disabled, water sources can be poisoned, as the deputy commander of the IDF Military Intelligence Unit 8200 revealed last week during Cyber Week.

מתקן הגרעין בנתאנז
A uranium-enrichment facility in Natanz.Credit: HO - AFP

There is a reason why the U.S. president’s authority to order cyberwarfare against an enemy state is based on their authority to activate nuclear weapons. The damage from cyberwarfare can resemble that resulting from dropping a nuclear bomb, with one difference: Cyberwarfare leaves no traces. This is a war that is hidden from the eye, creating a gap for plausible deniability.

Israel and the United States (followed by China and Russia) were among the first countries in the world to understand that. Both were also the first to develop far-reaching technological capabilities. Israel’s Unit 8200 and the U.S.’s National Security Agency and the Cyber Command used cyberwarfare against Iran. This was in 2008-09, when the Stuxnet virus was introduced into the computers operating the centrifuges at the uranium enrichment facility in Natanz. The “poisoning” of the computers damaged one-third of Iran’s centrifuges. Since then Israel has improved its capabilities; computers in army bases, crucial civilian infrastructure and other facilities in Iran are being bombarded by cyberattacks attributed to the Mossad and Unit 8200. The movement of ships to the Bandar Abbas port was stopped, as was the operation of gas stations and train stations. Last week there was a report of serious damage to three steel manufacturing plants serving Iran’s Revolutionary Guards.

When Iran realized that Israel and the United States were waging cyberwarfare against it, Tehran began to respond. U.S. banks were hit, as were computers of the Saudi oil company Aramco. Not a day goes by that Iran doesn’t attack Israel, although with very little success.

If what Iran is doing is terrorism, Israel’s activities are also terrorism. That's why it is hypocrisy on Gantz’s part to accuse Iran of cyberterrorism. Such statements are nonsense, and we would do well not to demonize our rival. After all, a clandestine war between Iran and Israel has been ongoing for about 20 years using all available tools, including cyberwarfare.



This archive was generated by a fusion of Pipermail (Mailman edition) and MHonArc.