Israel’s desert hackers fight the dotcom Jihad
Special report

Israel’s desert hackers fight the dotcom Jihad

We find out how computer boffins on the frontline are fighting to keep Israel and Europe safe from the threat of terror

ISIS messages online
ISIS messages online

Deep in the Negev desert, an army of hackers is hard at work. Many European security chiefs are counting on them to develop the tools to prevent further terror attacks in Europe. This mini city of glass and steel is a technology hub surrounded by sand. According to Uzi Zwebner, one of its founders, Gav-Yam Negev, or the Advanced Technologies Park in Beersheva to give it its full title, already houses 1,500 engineers and tech workers. But they’re not making fun smartphone games or designing handy apps.

Because Gav-Yam is a centre for cyber security. Hacking, and hacking prevention, is what this place is all about.

The IDF is in the process of transferring its elite tech units down to Beersheva too. This includes the famous vast Unit8 200, responsible for everything from tracking dubious Facebook posts to allegedly creating the kind of viruses that can dismantle a nuclear reactor.

Gav Yam campus Beersheva
Gav Yam campus Beersheva

Nearby, Ben-Gurion University is set to double in size upon the completion of a planned North Campus over the next two decades. Its president, professor Rivka Carmi says: “Cyber technology has now become one of the most sought after research fields, and Ben-Gurion has been declared a hub of cyber technology in Israel by the prime minister.”

With Europe on high alert for further terror attacks, many European powers are hoping Israeli knowhow can help them spot “lone wolf” jihadi militants. Currently the biggest challenge for Europe’s security services is so-called self-radicalised assailants – terrorists who have been radicalised almost entirely online.

“How do you capture some signs of someone who has no contact with any organisation, is just inspired and started expressing some kind of allegiance? I don’t know. It’s a challenge,” EU counter-terrorism coordinator Gilles de Kerchove admitted at a recent intelligence conference in Tel Aviv.

He said the internet companies have so far refused to monitor their own platforms’ content for material that could be seen as suspicious.

It’s part of a worldwide debate over how much privacy we need and want online – on the one hand, we’d all prefer to keep our banking transactions secret; on the other hand, we want the reassurance of knowing that somebody out there, the police or the security services, can find and stop terrorists before they carry out appalling crimes. Back in March, the debate over whether encryption was a good or a bad thing hit the headlines when the FBI hacked a locked iPhone, possibly with the help of Israeli firm Cellebrite.

Cyber security Professor Yuval Elovici
Cyber security Professor Yuval Elovici

“I’m not sure that the FBI had any complication in breaking into the iPhone. I don’t believe in it,” insists Professor Yuval Elovici, director of the Telekom Innovation Laboratories and of the Cybersecurity Research Centre at Ben-Gurion University. “Why did they have to come to a small company in Israel to help them to crack that iPhone? It doesn’t make sense.”

He believes that Islamic State is very sophisticated in its use of technology, presenting a huge challenge for all Western intelligence agencies.

“If somebody is chopping heads, then they’re supposed to be uneducated. This is not the case,” he explains. “[The] people of ISIS are very well educated, many of them have been recruited in western countries. They bring with them a lot of knowledge in technology.

“They are very well exposed to what it is happening in the west from a technological point of view. So there is no contradiction between the fact that they are cruel and the fact that they can employ all the latest technology to do something bad.”

Elovici’s teams of engineers are developing numerous techniques for hacking, including cracking a smart watch to intercept the data
between a computer and wireless printer.

He insists our privacy must not be at the expense of security. “My opinion is that we need to allow the agencies, the national security agencies, to access any information,” he says. “The reason that I am so extreme in my opinion, that I am very, very concerned that these organisations, terrorist organisations like ISIS, will go into acts like biological weapons, chemical weapons, and I am very, very concerned that in the future we may see such terrorist incidents.

“In order to be able to stop such incidents, that even one incident may have a huge impact on our daily life, we need to allow national security agencies access to any information that relates to ISIS.”

With the Gaza border only 25 miles away, turning Beersheva into a cybersecurity hotspot has not been easy – incoming rockets and Israeli bureaucracy have slowed progress. Nevertheless, the army of hackers in the Negev is set to grow to 10,000 in the next five years.

read more: