Unit 8200 Was Established in 1952 Using Primitive Surplus American Military Equipment

Total Page:16

File Type:pdf, Size:1020Kb

Unit 8200 Was Established in 1952 Using Primitive Surplus American Military Equipment

UNIT 8200

Yehida Shmone-Ma-taeem) is an Israeli Intelligence Corps ;יחידה Unit 8200 (Hebrew: 8200 unit responsible for collecting signal intelligence and code decryption. It also appears in military publications as the Central Collection Unit of the Intelligence Corps.

Contents

 1 History  2 Structure  3 Alleged activities  4 Alumni  5 External links

 6 References

History

Unit 8200 was established in 1952 using primitive surplus American military equipment. Originally, it was called the 2nd Intelligence Service Unit and then the 515th Intelligence Service Unit. In 1954, the unit moved from Jaffa to its current base at the Glilot junction.[1]

Structure

Unit 8200 is the largest unit in the Israel Defense Forces, comprising several thousand soldiers.[2] It is comparable in its function to the United States' National Security Agency, except that it is not a separate civilian (i.e. Ministry of Defense) body. Unit 8200 is led by a Brigadier-General whose identity remains classified.

responsible for collecting ,(יחידת חצב :Subordinate to Unit 8200 is Unit Hatzav (Hebrew OSINT intelligence. The unit monitors and collects military intelligence-related information from television, radio, newspapers, and the internet. The translation of various items accounts for part of what is termed "basic intelligence," which is collected by the corps' units. According to media reports, the unit provides over half of the overall intelligence information for the Israeli Intelligence Community.[citation needed]

The IDF's most important signal intelligence-gathering installation is the Urim SIGINT Base, a part of Unit 8200. Urim is located in the Negev desert approximately 30 km from Beersheba.”[3]In March 2004, the Commission to investigate the intelligence network following the War in Iraq recommended turning the unit into a civilian National SIGINT Agency, as is in other Western countries, but this proposal was not implemented.

Alleged activities

Ronen Bergman revealed in a 2009 book that a Hezbollah bomb, disguised as a cell phone, exploded at Unit 8200's headquarters in February 1999. Two officers were injured.[4] In 2010, the New York Times cited "a former member of the United States intelligence community" alleging that this unit used a secret kill switch to deactivate Syrian air defenses during Operation Orchard.[5]

Unit 8200 has been suspected of being the originator of the Stuxnet computer worm that in 2010 infected industrial computers, including Iranian nuclear facilities.[6]

Alumni

Alumni of 8200 have gone on to found leading Israeli high-tech companies, among them Check Point, ICQ, Nice, AudioCodes and Gilat.[7]

External links

 Enter Unit 8200: Israel arms for cyberwar, UPI, 11 May 2011

References

1. ^ Unit 8200 history 2. ^ "IDF Record Book 2010". Bamahane (Issue 3052): p. 83. September 8, 2010. (Hebrew) 3. ^ Le Monde Diplomatique, 2010 September, "Israel’s Omniscient Ears: Israel’s Urim Base in the Negev Desert is among the most important and powerful intelligence gathering sites in the world. Yet, until now, its eavesdropping has gone entirely unmentioned," http://mondediplo.com/2010/09/04israelbase 4. ^ Book: Hezbollah got inside MI's inner sanctum Ynet, 13 Sept 2009 5. ^ Stuxnet Worm is remarkable for its lack of subtlety, by John Markoff, New York Times 27 September 2010 6. ^ Israel seen as prime cyberattack suspect United Press International, 28 October 2010 7. ^ The Unit - Forbes.com

Recommended publications