oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2015 ( 8 )

2014 ( 7 )

2013 ( 13 )

2012 ( 28 )

Custom range...

Search Results: 1 - 10 of 132 matches for " Gabi Siboni "
All listed articles are free for downloading (OA Articles)
Page 1 /132
Display every page Item
Force Deployment Planning in the IDF General Staff
Gabi Siboni
Military and Strategic Affairs , 2011,
Abstract: IDF General Staff planning processes relate to two primary areas: force buildup and force deployment. The fundamentals of military doctrine of any army, and particularly the IDF, necessitate full synchronization between the two, and the element that underlies all planning processes is what is needed for force deployment. Upon the establishment of the IDF, these processes were assigned to a single framework: the General Staff Branch. However, more than sixty years later, planning in the General Staff today has been decentralized among various bodies in a way that complicates effective processes. Of the signi cant dif culties posed by this situation, three should be singled out. The rst is the weakness of planning for force deployment, which ostensibly is the responsibility of the IDF Operations Branch.The second dif culty concerns weak planning for force buildup, which must be based on force deployment needs. The third dif culty is the absence of synchronization in the planning processes. This article seeks to examine operational planning within the IDF command in three ways. The rst avenue of approach describes the evolution of operational planning and its implementation in the IDF over the years; the second analyzes the principles of operational planning and the limitations of the current situation in the IDF; and the third presents a possible model that could obviate some of the anomalies that exist today in the IDF. The scope of this article dictates a focus on the General Staff’s operational planning for force deployment. The limitations involved in planning processes related to force buildup should be discussed in a separate framework.
Defeating Suicide Terrorism in Judea and Samaria, 2002-2005
Gabi Siboni
Military and Strategic Affairs , 2010,
Abstract: Suicide attacks are a subject that has been studied and researched extensively, with the primary emphasis on the phenomenon of suicide as a terrorist weapon. Yet although it has been nearly a decade since the outbreak of the violent Palestinian uprising, the combat features used by the IDF and the security services against terrorism in general and suicide terrorism in particular, the most lethal form of terrorism, have not been studied in depth. The purpose of this essay is to attempt to understand the major components of activity that resulted in the near eradication of the phenomenon. The focus of this paper is the war on terrorism in Judea and Samaria without dealing with terrorism from the Gaza Strip, which has developed and assumed different forms over the years and is beyond the scope of this essay. This paper seeks to provide an historical picture of the processes employed by Israel in an attempt to foil suicide terrorism. The rst part of the essay examines the political directives issued by the Israeli government to the IDF from 2000, when the ghting erupted, until the government decision that led to Operation Defensive Shield. The second part examines the implementation of the directives and the development of the military and security response to suicide terrorism. This part of the essay also analyzes the process of formulating the military strategy for ghting terrorism in Judea and Samaria. The last part of the essay analyzes the ethical components of ghting a war on suicide terrorism that had the potential of being highly detrimental to the values of the IDF.
The Challenges of Warfare Facing the IDF in Densely Populated Areas
Gabi Siboni
Military and Strategic Affairs , 2012,
Abstract: Current assessments are that fighting in densely populated areas will be one of the main types of combat the IDF will face in the foreseeable future. This essay will focus on three points: one, the change in threats facing the State of Israel; two, the main characteristics of the military response necessitated by the change in the threat; and three, some components of the necessary method of action in such confrontations.
Protecting Critical Assets and Infrastructure from Cyber Attacks
Gabi Siboni
Military and Strategic Affairs , 2011,
Abstract: The impact of computer and communications systems in recent decades has not bypassed the national security of states in general, and the State of Israel in particular. Most systems in developed societies rely on computer and information infrastructures, and this growing dependence on information and communication technologies means that a blow to computers and information ow processes is liable to disrupt, paralyze, and sometimes even cause substantive physical damage to essential systems. Computer-based capabilities and their near-global ubiquity expose states to harm in cyberspace by various elements, including hostile countries, terrorist organizations, criminal elements, and even individuals driven by personal challenges or anarchist motives. The threat is particularly acute as management, control, and monitoring systems can be disrupted through changes to a computer program, and no physical attack is needed. Thus, it stands to reason that the face of future con icts will be transformed beyond recognition.
Iran and Cyberspace Warfare
Gabi Siboni,Sami Kronenfeld
Military and Strategic Affairs , 2012,
Abstract: Throughout the world decision makers and the general public have undoubtedly realized in recent years that cyberspace must be treated as a genuine realm of warfare. Since the the Stuxnet attack - one of the most destructive cyber attacks to date - Iran has been working hard to improve its cyberspace defenses on the one hand, while building up cyberspace intelligence gathering and offensive capabilities on the other. This article examines the current situation regarding various elements of Iran’s cyberspace development process. The rst section analyzes the country’s cyberspace strategy, while the second section describes the organizational and operational response to the formulated strategy. This comprises three components: infrastructures for training and developing technological manpower for work in cyberspace; technological developments that have already been introduced; and the overall processes of cyberspace force construction. Finally, the article focuses on a number of cyberspace incidents attributed to Iran, attempts to gain some insight into the way Iran conducts its cyberspace activities, and examines implications for Israel and other Western nations.
The Classic Cyber Defense Methods Have Failed - What Comes Next
Amir Averbuch,Gabi Siboni
Military and Strategic Affairs , 2013,
Abstract: The classic defense methods employed throughout the world in recent decades are proving unsuccessful in halting modern malware attacks that exploit unknown security breaches called "zero-day vulnerabilities." Solving this problem requires different thinking and solutions. This article proposes an up-to-date approach, based on an analysis of sensitive information that must be protected, for the purpose of identifying anomalous behavior. The analyzed information includes an organization's data silos as a means of understanding unusual (anomalous) activity that in most cases indicates the presence of malware in the system. This article further proposes relying on the data to be protected as a source of knowledge for developing the defense system. An analytical analysis of massive data (big data analytics) will make it possible to identify such malware, while constructing a model that will provide a high degree of reliability in identifying an minimizing false positives, which pose a challenge to every defense system.
What Lies behind Chinese Cyber Warfare
Gabi Siboni,Y. R.
Military and Strategic Affairs , 2012,
Abstract: Over the past several years China has been developing operational capabilities in the eld of cyberspace warfare. A cyber attack may be de ned as the unauthorized penetration of computer and communications systems belonging to individuals or organizations for the purpose of espionage and information theft, in order thereby to damage or disrupt the functioning of these systems or to damage other systems dependent on them, even to a point of causing actual physical damage. Despite denials by the Chinese government, researchers posit that China is behind a string of cyber attacks against the United States,Japan, France, Australia, and other Western nations. This essay argues that an analysis of the publicly available information about the more recent attacks makes it possible to establish that China does in fact stand behind these attacks and also makes it possible to identify the link between China’s cyberspace warfare strategy and its choice of targets. The analysis includes an examination of the companies attacked to identify possible motives for the attacks. The motives for these attacks are presumably to steal capabilities and conduct industrial espionage against nations and commercial competitors. Attacking companies and organizations in the nancial and even political sectors allows access to valuable intelligence in these elds. By contrast, the intelligence value for immediate use in attacking companies providing critical infrastructures and communications services is usually relatively low. Rather, gaining access, if only to some providers of communications and internet services in the West and the United States, is liable to give attackers the ability to damage these services.
Cyberspace and Terrorist Organziations
Yoram Schweitzer,Gabi Siboni,Einav Yogev
Military and Strategic Affairs , 2011,
Abstract: The use of cyberspace as a primary warfare arena between enemies or hostile nations has always been fertile ground for fantasy and lurid scenes on the silver screen. However, cyberspace is rapidly becoming a genuine central arena for future wars and hostile actions undertaken by various types of adversaries. These may include terrorist organizations, although until now they have relied primarily on physical violence to promote their own goals and those of their sponsors. In light of such threats, many nations in the West have in recent years established special authorities to use innovative technological means to prepare for war-like actions against strategic infrastructure targets.This essay focuses on an analysis of the factors that are likely to make terrorist organizations use cyber tools to perpetrate attacks on critical infrastructures of sovereign institutions and symbols, commercial and industrial infrastructures and systems, and public civilian targets. In addition, it examines the question of whether the threat is actual and imminent, or whether it is a far-fetched possibility that surfaces from time to time in the general discourse on the subject.
About the existence of the thermodynamic limit for some deterministic sequences of the unit circle
Stefano Siboni
International Journal of Mathematics and Mathematical Sciences , 2000, DOI: 10.1155/s0161171200004282
Abstract: We show that in the set Ω=ℝ
The Changing Threat
Gabriel Siboni
Military and Strategic Affairs , 2010,
Abstract: The purpose of this conference is to try to understand the changes in the threat against the State of Israel that have taken place in recent years, and to examine the components of the optimal response to the threat. Today’s seminar is organized within the framework of the INSS Military and Strategic Affairs Program, which aims to enhance the public discourse on subjects relevant to this discipline through conferences and the Military and Strategic Affairs journal.
Page 1 /132
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.