Unit 8200

Unit 8200
Unit 8200 installation on Mount Avital

Unit 8200 (Hebrew: יחידה 8200‎, Yehida Shmoneh-Matayim) is an Israeli Intelligence Corps unit responsible for collecting signal intelligence and code decryption. It also appears in military publications as the Central Collection Unit of the Intelligence Corps.

Contents

History

Unit 8200 was established in 1952 using primitive surplus American military equipment. Originally, it was called the 2nd Intelligence Service Unit and then the 515th Intelligence Service Unit. In 1954, the unit moved from Jaffa to its current base at the Glilot junction.[1]

Structure

Unit 8200 is the largest unit in the Israel Defense Forces, comprising several thousand soldiers.[2] It is comparable in its function to the United States' National Security Agency, except that it is not a separate civilian (i.e. Ministry of Defense) body. Unit 8200 is led by a Brigadier-General whose identity remains classified.

Subordinate to Unit 8200 is Unit Hatzav (Hebrew: יחידת חצב‎), responsible for collecting OSINT intelligence. The unit monitors and collects military intelligence-related information from television, radio, newspapers, and the internet. The translation of various items accounts for part of what is termed "basic intelligence," which is collected by the corps' units. According to media reports, the unit provides over half of the overall intelligence information for the Israeli Intelligence Community.[citation needed]

The IDF's most important signal intelligence-gathering installation is the Urim SIGINT Base, a part of Unit 8200. Urim is located in the Negev desert approximately 30 km from Beersheba.”[3]In March 2004, the Commission to investigate the intelligence network following the War in Iraq recommended turning the unit into a civilian National SIGINT Agency, as is in other Western countries, but this proposal was not implemented.

Alleged activities

Ronen Bergman revealed in a 2009 book that a Hezbollah bomb, disguised as a cell phone, exploded at Unit 8200's headquarters in February 1999. Two officers were injured.[4]

In 2010, the New York Times cited "a former member of the United States intelligence community" alleging that this unit used a secret kill switch to deactivate Syrian air defenses during Operation Orchard.[5]

Unit 8200 has been suspected of being the originator of the Stuxnet computer worm that in 2010 infected industrial computers, including Iranian nuclear facilities.[6]

Alumni

Alumni of 8200 have gone on to found leading Israeli high-tech companies, among them Check Point, ICQ, NICE, AudioCodes, Gilat, and EZchip.[7]

References

  1. ^ Unit 8200 history
  2. ^ "IDF Record Book 2010". Bamahane (Issue 3052): p. 83. September 8, 2010.  (Hebrew)
  3. ^ Le Monde Diplomatique, 2010 September, "Israel’s Omniscient Ears: Israel’s Urim Base in the Negev Desert is among the most important and powerful intelligence gathering sites in the world. Yet, until now, its eavesdropping has gone entirely unmentioned," http://mondediplo.com/2010/09/04israelbase
  4. ^ Book: Hezbollah got inside MI's inner sanctum Ynet, 13 Sept 2009
  5. ^ Stuxnet Worm is remarkable for its lack of subtlety, by John Markoff, New York Times 27 September 2010
  6. ^ Israel seen as prime cyberattack suspect United Press International, 28 October 2010
  7. ^ The Unit - Forbes.com

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Unit 8200 — Standort der Unit 8200 auf dem Mount Avital Unit 8200 (Einheit Acht Zweihundert) (יחידה 8200 oder shmone matayim in hebräisch) ist eine israelische Geheimdienst Einheit, welche für die Gewinnung von Signals Intelligence Informationen und für… …   Deutsch Wikipedia

  • Подразделение 8200 — יחידה 8200 Страна …   Википедия

  • Hatzav Unit — The Hatzav Unit ( he. Yehidat Hatzav, יחידת חצב) is a unit in the IDF Intelligence Corps Unit 8200, responsible for collecting OSINT intelligence. The unit monitors and collects military intelligence related information from television, radio,… …   Wikipedia

  • Unidad 8200 — Base de la Unidad 8200 en el Monte Avital La Unidad 8200 (léase como ocho doscientos, o יחידה 8200 (shmone matayim en hebreo)es una unidad perteneciente a los Cuerpos de Inteligencia de las Fuerzas de Defensa de Israel cuya misión es la captación …   Wikipedia Español

  • IE 8200 Class — Infobox EMU name = IE 8200 Class caption =Unit 8203 at Grand Canal Dock station imagesize=330px background = #00bb00 Manufacturer = Alsthom Family = Operator = Iarnrod Eireann Formation = 2 cars per trainset Built = 5 trainsets InService = 2000… …   Wikipedia

  • Graphics processing unit — GPU redirects here. For other uses, see GPU (disambiguation). GeForce 6600GT (NV43) GPU A graphics processing unit or GPU (also occasionally called visual processing unit or VPU) is a specialized circuit designed to rapidly manipulate and alter… …   Wikipedia

  • Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… …   Wikipedia

  • Military Intelligence Directorate (Israel) — Military Intelligence Directorate Directorate of Military Intelligence Hebrew: אגף המודיעין‎ Common name Aman Agency overview Legal personality Governmental: Government agency …   Wikipedia

  • Stuxnet — is a computer worm discovered in June 2010. It targets Siemens industrial software and equipment running Microsoft Windows.[1] While it is not the first time that hackers have targeted industrial systems,[2] it is the first discovered malware… …   Wikipedia

  • Israeli Intelligence Community — The Israeli Intelligence Community (Hebrew: קהילת המודיעין הישראלית) is the designation given to the complex of organizations responsible for intelligence collection, dissemination, and research for the State of Israel. The organizations included …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”