Unit 8200 was blamed for having underestimated Hamas activities.[20] Unit 8200 is alleged to have stopped listening to Hamas’s handheld radios in 2022

I have invented a new literary form that combines a popular fictional spy, Biblical scholarship, and Israeli spies that are employed by Zionists, here, and in Israel. Unit 8200 is made up f very young men and women who are in the Israeli Army. Why are young women good at this, is key, because I wondered if the fictional characters in my Bond book ‘The Royal Janitor – were too young. I have been working on theories for four years. I might be involved in Artificial Intelligence – Intelligence! Is there such a thing as AI Prophecy?
John Presco
https://www.linkedin.com/company/unit8200/
https://en.wikipedia.org/wiki/Unit_8200
The Crystal Radio Typewriter Club
Posted on February 24, 2019 by Royal Rosamond Press

I am working on a proposal for a grant. I want to launch a Pirate Radio that will sit off shore from the old California Barrel Company site. I want to hand out free crystal radio kits, along with a poem, or page from a book, such as On The Road. A free stick of incense comes with – and a calling card that says “Free your mind!”
“I’m Nati Flamer, 34 years old. I served in the Israel Defense Forces for almost a decade, in Military Intelligence. I engaged in research and taught an intelligence officers’ course, and at the same time I studied at a university. In one of my master’s-level courses I wrote a paper about Hezbollah’s intelligence activities during the second Lebanon war. When I examined the available sources on the subject, I discovered that this was an almost untouched area in academia. The study of intelligence in non-state organizations is simply an unplowed field. For my doctoral dissertation I decided to try to fill that vacuum in academic, and perhaps also public, discourse – about the phenomenon as such and regarding Hamas and Hezbollah in particular.
In the failure to forecast the catastrophic 2023-2024 Hamas attack on Israel by Israel’s intelligence agencies, Unit 8200 was blamed for having underestimated Hamas activities.[20] Unit 8200 is alleged to have stopped listening to Hamas’s handheld radios in 2022, deciding it was a “waste of effort.” Monitoring that radio network might have helped the Shin Bet realize a few hours before the attack that the unusual activity they were seeing on the Gaza border was not just another military exercise by Hamas, Times of Israel noted.[21]
The New York Post reported in November, however, that at least one veteran analyst in Unit 8200 had indeed warned in July of an imminent cross-border attack but that such concerns were dismissed by senior military leadership as “totally imaginative”.[22]
An Elite Israeli Intelligence Unit’s Soldiers Are Sworn to Secrecy – but Tell All on LinkedIn
Soldiers in Israel’s 8200 intelligence unit are so highly prized in the high-tech world that companies want to poach them even before they’re released, leading them to share their knowledge on the professional social networkShare in FacebookShare in TwitterShare in WhatsApp
Send in e-mailSend in e-mailSaveSave article to reading listZen ReadPrint article

IDF Chief of Staff Maj. Gen. Aviv Kochavi and Tamir Hayman, former intelligence chief, visit an intelligence base. Credit: IDF Spokesperson’s UnitCorin DeganiGet email notification for articles from Corin DeganiFollow
Nov 18, 2021
Of Israel’s intelligence units, 8200 may be the most well-known. It receives frequent attention from the media – partially due to the pipeline funneling unit graduates to high-tech companies – but its operations are secret. Or, at least, they’re supposed to be. Even though its active-duty soldiers have their faces blurred on-camera, many are divulging specifics on one particular social media site.
“Hi LinkedIn, after two years of significant service at Unit 8200… I’m looking for my next challenge.” This is how a soldier nearing discharge from the exclusive unit opened her post on the professional social network. The soldier noted her position in the unit and the various software she worked with – and quickly received some 170 replies, mostly from HR personnel at high-tech firms.
– Advertisement –
The signal intelligence unit’s soldiers are prohibited from identifying themselves as such on social media, but it appears that this rule is flouted on LinkedIn. Many of them make LinkedIn profiles before they are even discharged, specifying the name of the unit and their own position, preparing themselves for the day after – when they turn overnight from soldiers to highly sought-after employees at startups and tech juggernauts. Overall, there are several hundred profiles on LinkedIn by users identifying themselves as 8200 personnel.
Another profile, by a soldier-student alumnus of 8200 who was recently discharged following over five years of service, noted that he headed an R&D team of seven engineers, specified methodologies he integrated in said team, and more.
National Security & Cyber exclusives straight to your inbox
Email *
Please enter a valid email addressSign Up
“HR recruiters contact soldiers from 8200 who make LinkedIn profiles,” says Ravit Segev, global recruiting managed at Cyberproof. “The goal is to start the process with them before they’re discharged and get offers from a whole lot of places, to direct them there before they go out in the world and be the first to offer them a salary.”
She says that “Everybody does it. That’s how you get a situation where these soldiers haven’t been discharged yet, and already have five or six offers.” Segev adds that the main demand for the unit’s alumni comes from cyber firms, and specifically for positions in development and analysis.
The IDF Spokesperson’s Unit said in response: “Those serving in 8200 are instructed not to reveal their organizational association or role in the unit on social media. As part of the effort in this regard, debriefings and unit-wide inspections are held, and every violation is being handled by the chain of command.”
- High-tech Is Draining Talent From Israel’s Medical System
- ‘Sometimes, Hamas Turns Israel’s Spies Into Double Agents Instead of Killing Them’
- Top Israeli Intel Commander Doesn’t See a Dystopian AI-dominated Future
‘The tech units have become a showcase’
Of the Intelligence Corps’ tech units, 8200 is the largest and best-known. It began as a radio and wire interception unit, and over the years, it expanded its encryption and data security technology capabilities. A smaller unit, more tightly focused on technological innovation, is Unit 81, which provides specific services for special operations and other security forces. The IDF has a defensive cyber unit as well.
A former officer in one of these units recently told TheMarker that “The tech units have become a showcase.” He stressed that soldiers who know they are being observed from the private sector might change their behavior, and want to maintain a good relationship with their fellow soldiers and commanders, “including due to thoughts of the startup the friend or commander might launch the day after [they are discharged]. The business world is in the consciousness of these units. That’s something that doesn’t exist in other units in the military.”
Many companies are made up of former 8200 personnel, and some of the unit’s former top commanders are senior figures in the world of Israeli venture capital. Tech unit alumni command impressive starting wages in the private sector – 30,000 to 60,000 shekels (about $9,750 to about $19,500) per month, according to market estimates. The median household income in Tel Aviv, for comparison, is 16,000 shekels (about $5,200).
As the IDF cannot compete with the wages offered by the private sector, in some cases, entire 8200 teams go on after discharge to work for startups or companies formed by their commanders. The recruiting in these firms is often done by friends bringing one another onboard. Tech units also have non-profit organizations to maintain networking contacts and locate jobs.
“The feeling of ‘end of an era’ and thoughts about the next step push [soldiers] approaching discharge to do things such as publishing data on social media, or giving information to third parties like placement agencies, when you don’t know if their data is secured,” says Demi Ben-Ari, co-founder and chief technology officer at cyber firm Panorays.
“In the recruiting process in our company, we don’t pounce on candidates like that,” he says. “Instead, we connect soldiers ahead of discharge with various cyber firms – even ones that compete with us directly for talent. We contact units like 8200 and 81, and offer them a tour of the companies’ offices, within the military’s framework. That’s how you make connections safely.”
‘Sometimes, Hamas Turns Israel’s Spies Into Double Agents Instead of Killing Them’
Bar-Ilan University scholar Netanel Flamer explains the difference between state intelligence and that of terrorist organizations like Hamas and Hezbollah – and warns of the serious tech threat to IsraelShare in TwitterShare in WhatsApp
Send in e-mailSend in e-mailGo to commentsPrint articleSaveSave article to reading listZen Read

Gilad Shalit, in captivity in Gaza, October 2011. “He was held under Israel’s nose, and Israel couldn’t track him down. Hamas pulled it off with an insane level of compartmentalization.”Credit: Khalid Farid/APAyelett ShaniGet email notification for articles from Ayelett ShaniFollow
Sep 17, 2021
Tell us something about yourself and your research.
I’m Nati Flamer, 34 years old. I served in the Israel Defense Forces for almost a decade, in Military Intelligence. I engaged in research and taught an intelligence officers’ course, and at the same time I studied at a university. In one of my master’s-level courses I wrote a paper about Hezbollah’s intelligence activities during the second Lebanon war. When I examined the available sources on the subject, I discovered that this was an almost untouched area in academia. The study of intelligence in non-state organizations is simply an unplowed field. For my doctoral dissertation I decided to try to fill that vacuum in academic, and perhaps also public, discourse – about the phenomenon as such and regarding Hamas and Hezbollah in particular.
– Advertisement –
How do you explain that vacuum?
The truth is that it’s surprising. Especially because it’s not just a local phenomenon. Internationally, too, it’s an untouched subject: Just as there is no information about the intelligence methods used in Hamas and Hezbollah, there is no information about this in other such groups, either. I think there are two reasons for this. Conceptually, when we think of intelligence, we think of states, of structured, institutionalized bodies such as, say Unit 8200 [in the IDF], or MI6. The second reason is accessibility. It’s extremely difficult to access materials dealing with intelligence in terrorist groups. Obviously they have no archives, there is no orderly documentation. When I set out, one researcher told me that there was no point trying to write a 300-page doctoral dissertation, that I would have trouble even producing a brief article on the subject.
Israel At War: Get a daily summary direct to your inbox
Email *
Please enter a valid email addressSign Up
In your research, you drew upon open sources only, and even so I felt a bit strange while reading it – in case I was seeing content I wasn’t supposed to see. It turns out that quite a few secrets are concealed in the open sources.
That’s true. In contrast to what that researcher told me, information does exist, even quite a bit of it. You just have to be open to things. For example, I used legal sources. They are true treasures: Court rulings sometimes reveal intelligence stories such as about [Hamas and Hezbollah] running spies and agents inside Israel, or lookouts who were apprehended in the Gaza Strip from whose testimony it was possible to understand how the whole matter of surveillance works. I also used Shin Bet security service reports, all kinds of things that the IDF published over the years, and materials published by the organizations themselves. That was already more complicated. For example, there’s a series of books that Hezbollah published in the 1990s, which sum up their activity annually. In Israel only one volume is available, in the National Library, but I wanted to read them all. I found a place in Beirut where the books were available, but that’s obviously not a real option. In the end I found an Israeli at a university abroad who agreed to order a copy [of the set] from Beirut for me, and he sent it to me.
Which is how you found, in completely open sources, exciting stories such as cases of double agents.
- Politics, Terrorism, Cyberattacks: The Challenges Facing Israel’s New Shin Bet Chief
- When the Shin Bet Chief Warned That Educated Arabs Are a ‘Problem’ for Israel
Both Hamas and Hezbollah know that Israel is running agents in their organizations. They have all kinds of ways to cope with this – arrest, torture, interrogations and killings – but sometimes they choose a cleverer way of dealing with the phenomenon: namely, turning the person into a double agent. Recruiting collaborators with Israel into their ranks, turning the threat into an opportunity. That’s a very difficult operation and, by the way, it is known as the “caviar” of intelligence. Thus I found a story about a Gaza resident who was a source of information for Israel, and after a certain period in which he worked for Israel he decided to confess his deeds to someone in Hamas. It’s not clear whether he acted out of ideological reasons or because he felt his life was in danger.
The Hamas man tells him, “Let’s take advantage of this,” and the guy started to tell Hamas about the information Israel wanted from him. For example, Israel talks to him about a particular house, and Hamas understands from this that Israel has plans to get to that house, and they booby-trap it. Afterward Hamas simply takes control of the man’s SIM card, so they can listen in on all his conversations with the Israeli handlers. Later on, the person who handles this man directly is a senior figure in Hamas’ military wing, Raed al-Atar, whom Israel assassinated during Operation Protective Edge [in 2014]. This shows intelligence activity being managed at high levels, not just as a local initiative, and also the importance of such operations from Hamas’ viewpoint. In the end, Israel discovers what’s going on and arrests the man – ultimately double agents are uncovered – and I actually scrape this whole treasure from a court ruling.
Obviously, a terrorist organization that takes on a state is in an inferior position in terms of intelligence. Still, in many cases that you mention in your research, it seems as though the disadvantage can be turned into an advantage.
When an organization like that takes on a state, it doesn’t expect to win the battle. Hamas and Hezbollah understand the limits of their strength. They don’t expect to vanquish Israel, but rather to damage its capabilities and strike at its soft belly. The thing is, the intelligence required for this is not of the highest level. Take, for example, the naval commando disaster [in 1997, when 12 members of the elite Shayetet 13 unit were killed in an ambush in Lebanon]. From Hezbollah’s viewpoint, that was an episode during which, as an organization, they succeeded in uncovering an operation by perhaps the world’s best commando unit, deep inside their territory. As far as we know, they accomplished this by raising an antenna and using it to intercept the communications of a drone. What a tremendous strategic achievement, using super-basic intelligence. If we had exposed a similar operation by Hezbollah, it would not have been seen as an exceptional accomplishment, but as one more terrorist attack that we succeeded in preventing. For us, it’s bread and butter, for them it’s the crowning glory.

Because the war is being waged all the time, including at the level of public awareness.
Yes, and that characterizes asymmetrical warfare in general. Because of the weak side’s limitations, its inability to score significant achievements, they rely on strategic accomplishments. It’s actually David managing to get close to Goliath’s forehead.
So, paradoxically, the advantage lies on their side.
Breaking news and the best of Haaretz straight to your inbox
Email *
Please enter a valid email addressSign Up
Yes. It’s usually said that in an asymmetrical war, a deadlock constitutes a victory for the weak side.
I think Hezbollah leader Hassan Nasrallah said something to that effect.
When a terror organization takes on a state, it doesn’t expect to win the battle. Hamas and Hezbollah understand their limits. They don’t expect to vanquish Israel, but rather to damage its capabilities and strike at its soft belly.Flamer
In his “spider’s web” speech [May 2000], he said exactly that. That Israel has nuclear arms and air power, but is as weak as a spider’s web. In the intelligence context, this means that sometimes intelligence information that a state might perceive as insignificant, can be pure gold for a non-state organization. It’s hard to get into the head of the other side and understand which intelligence is critical for them, or why and to what extent.
Passing notes
Let’s talk a bit about what’s known as counterintelligence. Explain what it is.
If positive intelligence is information I collect in order to carry out my activity, counterintelligence or negative intelligence serves to disrupt activity by the other side. Because these [non-state] organizations are up against an intelligence system that is strong, sophisticated and larger than theirs, they invest heavily in counterintelligence. Hamas was into this from the outset. As much as they could, their activity was executed with extreme secrecy and maximum monitoring. For example, they used primitive means like passing notes instead of making phone calls. It’s interesting, by the way, that both [Ismail] Haniyeh and [Yahya] Sinwar, two top Hamas figures, have counterintelligence backgrounds. In the second half of the 1980s Sinwar was in charge of al-Majd, a kind of counterintelligence unit run by Hamas in the southern Gaza Strip; Haniyeh was active in it as well. Counterintelligence is relatively well-developed in Hamas; it’s an area in which they can show fine achievements, the most impressive of which is, in my view, the Gilad Shalit story [referring to the IDF soldier kidnapped by Hamas and held from 2006 to 2011] – Hamas counterintelligence operated perfectly in that case.
For over five years.
Yes, and that was is in Gaza, not southern Lebanon. Shalit was held in small, closed Gaza, under Israel’s nose, and Israel couldn’t track him down. Hamas pulled it all off with an insane level of compartmentalization. The number of people in Hamas who knew where Shalit was could be counted on the fingers of one hand, and all of them were confidants of Ahmed Jabari [a top commander of Hamas’ military wing]. Suleiman al-Shafi [an Israeli journalist] reported that when Israel wanted to get new glasses to Shalit, via the Red Cross, Hamas refused to take them, for fear that Israel had implanted something in them, which would make it possible for them to discover where he was being held. They simply drew all the lessons from years of confronting Israel and applied them perfectly, leaving Israel without an answer. The working assumption of intelligence is that at some point the enemy will make a mistake from which you can profit – but Hamas simply made no mistake in this case.

Both Hezbollah and Hamas have undergone a significant evolution: from small organizations to large, institutionalized ones. Can you explain how that evolution is manifested in the realm of intelligence? Let’s start with Hamas.
With Hamas we’re talking about two periods, with the watershed being the disengagement [Israel’s withdrawal from the Strip in 2005] and Hamas’ takeover of the Strip [in 2007]. Before 2007, and even before 2005, Hamas still worked in squad format, with each squad being a self-enclosed unit. Many times the terrorist who perpetrates an attack is also the one who collects the intelligence materials. The intelligence itself was based on lookouts, overt collection of materials and the use of very basic HUMINT [human intelligence, typically gleaned via espionage or interrogations]. If they wanted to carry out an attack on a certain building, say, they would collect information about the security arrangements there, the times of the day people pass by, etc. Basic intelligence. Pinpoint.
That changes as the organization becomes more institutionalized, as does its intelligence activity. A military intelligence division is established in Hamas’ armed wing, Iz al-Din al-Qassam, a system of lookouts is put in place based on sectoral divisions, each battalion has its own lookouts, and information gathering is done systematically, in an orderly way, with documentation of the findings and their integration into a complete picture.
Your doctoral thesis contains a form that lookouts were supposed to fill out, divided into specific hours and sectors.
Hamas counterintelligence operated perfectly in Gilad Shalit’s case. Shalit was held in small, closed Gaza, under Israel’s nose, and Israel couldn’t track him down.Flamer
Indeed. And the overt gathering of information also undergoes a process of institutionalization, with the production of intelligence reports based on open sources from which conclusions are drawn. Gradually the organization also enters the realm of UAVs [unmanned aerial vehicles, or drones] and cyber, and starts to execute impressive operations relative to its limited resources.
What about Hezbollah?
They also went through several phases. In the 1990s, the intelligence they had related mainly to IDF outposts [in southern Lebanon] and the movement of forces, and was based on daytime observations carried out by squads, using binoculars. Intelligence collection improved in the second half of the 1990s, and included the use of night-vision equipment, interception of UAV broadcasts and an initial ability to field agents. After the IDF’s withdrawal from Lebanon, in 2000, Hezbollah established itself throughout the southern part of the country and consolidated its military wing, and its information gathering also became more institutionalized, with an extensive and systematic use of agents and strategic utilization of intelligence materials.
This was the period in which Hezbollah set up a monitoring network. Possessing a detailed list of the IDF’s communications frequencies in the northern region, the organization listened in systematically and picked up the traffic on the network, word for word. These capabilities were put into practice in 2006, during the second Lebanon war, when Hezbollah observed, listened in, ran agents and gleaned information from the media – and all in all, succeeded in creating quite a good picture of Israel and the IDF, which served it in managing the fighting. After the war, the organization underwent significant processes of change and upgrading, reshaped its systems and integrated information by means of a central intelligence unit, reestablished its network of lookouts, and like Hamas, entered the cyber realm. Of course, all along the way, Hezbollah has been enveloped by massive Iranian support in terms of information, know-how, equipment, training, etc.
That goes without saying.
When I started my doctoral dissertation, my supervisor, Prof. [Eliezer] Tauber, absolutely insisted that I learn Farsi. At first I questioned that, because it wasn’t my impression that there were significant sources that were not in English, Hebrew or Arabic. But he wouldn’t relent and said, “The Iranians are involved in this, so that [learning Farsi] will be useful.” I heeded what he said. I learned Farsi for my doctorate and in the end it led me to relevant information about one of the greatest mysteries: how [Hezbollah leader] Imad Mughniyeh was assassinated [in a car bomb attack in Damascus, in 2008].
I didn’t know there was a mystery.
Mughniyeh shaped Hezbollah’s intelligence culture with his own two hands. He was careful and cunning, and considered to be a very hard nut to crack. When Israel managed to get to him, many wondered how it was actually done. Naturally, I have no pretensions and had none, about answering that question, but one day I found on the web an interview with a senior Iranian figure who has observed Hezbollah from day one. In the interview he related that Mughniyeh, a few months before his assassination, decided to change his behavior. Until then he had been like a very elusive cat – it was impossible even to photograph him – and one day he simply decided to let go. The senior Iranian person said in the interview that he had met with Mughniyeh shortly before the assassination, had commented about his behavior and urged him to be careful. He says he also spoke with his aides, told them that Mughniyeh was walking around openly and that it was terribly dangerous. The aides replied that there was nothing that could be done, that it was his decision and he was insistent.

‘Useful idiot’
In your research you write at length about what’s known as open or overt intelligence information – such as that gleaned from newspapers, the internet and the like. Keeping that in mind, before this interview, I looked for some relevant information myself on the web, and the truth is that I was appalled by the amount and quality of what I saw there.
I learned Farsi for my doctorate and in the end it led me to information about one of the greatest mysteries: how [Hezbollah leader] Imad Mughniyeh was assassinated [in a car bomb attack in Damascus, in 2008].Flamer
There is a great deal of open information in Israel, especially on the web, with which the enemy can have a field day. That too is a subject that’s related to asymmetry. These organizations are undemocratic, while Israel, though it has censorship, is a democracy. One implication is that there is a lot of security information that is simply out there flowing around.
Not to say, gushing. With an emphasis, by the way, on what’s known as “interviews with senior figures.” What these people allow themselves to do to garner some media exposure is indescribable.
Okay, we’re getting into a super-sensitive area here. Really. The report of the Winograd Committee [which probed the events of the second Lebanon war] devotes a whole chapter to the IDF, communications and censorship, and the problem is addressed there at length. Look, these interviews have hasbara [propaganda] value, they sometimes contain messages earmarked for the enemy. Not all the comments are slips of the tongue, but the interviewees also aren’t sufficiently aware [of what they are saying]. There is a delicate balance, which is constantly shifting. I don’t think that in the name of information security all mouths and all breaches have to be shut, but it’s definitely necessary to think about this point. Maybe we don’t think about it enough.
That’s one of the things I understood from my work: When you, as a senior figure, give an interview, you have to be aware that these organizations are accessing the information you’re sharing, which you perhaps don’t even perceive as liable to constitute a threat. In my PhD dissertation, I mention the case of Hamas activists who placed an explosive device on rail tracks in June 2002 [in Lod]. The device exploded and a few people were wounded. According to Hamas, after the attack, they monitored Israeli media broadcasts about the incident. They heard a police officer say in an interview that the device weighed about five kilos and that it’s very fortunate that it was that small, because if it had been three times the size, the damage would have been far greater. That is an amazing remark, and the headline that the interview was given in the literature of the organization’s operatives, in which the behind-the-scenes of these actions are described, was, “The enemy teaches us how to operate.”
That is related with what we talked about earlier, about how the disparities in the balance of power can actually serve those in an inferior position. A small organization can also be more creative than a large state, and cross lines that a state is perhaps unable to cross.
Yes. I think Hamas’ cyber story is a clear example of a creative use of resources, of transforming the disadvantage into an advantage. Over the past few years Hamas set up a sort of fictitious network of profiles on social media. They are profiles of pretty, scantily dressed girls, who reach out to various people, including soldiers, chat with them, try to make some sort of contact that is supposedly intended to develop into a romantic relationship, with the goal being, of course, to try to run them [as agents]. It’s what’s known as “useful idiots,” meaning someone becomes an agent for the other side without realizing it. So a good-looking girl writes a soldier a message along the lines of, “Hey, you poor guy, stuck on the base, what a cutie, send me a photo, so I can see where you are” – and he doesn’t suspect, and sends it.
That’s one scenario – the least bad. In the bad scenario, the girl tells the soldier that her Telegram and WhatsApp aren’t working, that she wants to send him clips and photos of herself, and she asks him to download a chat app that will allow her to transmit them. She sends a link, and when he downloads the app his phone is hacked and controlled remotely by Hamas. I see that as being super-creative, exploiting a new technological platform. We talked about the disadvantage, ostensibly, of Israel’s being a democracy: As a by-product of that there is a lot of information that’s floating around in open sources, and this is another example that illustrates it. What we have here is a technological breakthrough which is based on a given situation – the IDF drafts youths, whose life is their phone – and it manages to contain this complexity. The IDF will not tell soldiers that it’s taking their phone away on Sunday and will return it on Friday, and these breaches are part of the price we are paying for the fact that we are a society that is technological and open.
Your thesis has screenshots of some of the correspondence you mention. What can I tell you? You need to have undergone a lobotomy to believe that this is a real girl and to go along with it. It’s a moment in which Israel loses.
It’s a campaign in which we’re losing. The campaign over awareness has failed. We are not coping with this threat, it’s within us, the potential damage it could cause us is enormous. I don’t know what goes on at the decision-making level, but even if they understand this, it’s not trickling down. If I had to hoist one red flag after my research, this would be the one. It’s absolutely serving the enemy – and, by the way, also enemy states, not just terrorist organizations.
I myself was contacted a few months ago via one of the social media. The profile looked fine, active, there were a reasonable number of friends, but when I started to probe I recognized the familiar characteristics from fake profiles that Hezbollah and Hamas use on the web. I understood unequivocally that it was this, and that the profiled individual trying to be in contact wanted me as a useful idiot. It was interesting to see it live – the activity reached my very doorsill. The intelligence battle is being waged with great intensity. We have to remember that. And technology places the threat right in the palm of our hand.
Unit 8200 (Hebrew: יחידה 8200, Yehida shmone matayim “Unit eight two-hundred”) is an Israeli Intelligence Corps unit of the Israel Defense Forces responsible for clandestine operation, collecting signal intelligence (SIGINT) and code decryption, counterintelligence, cyberwarfare, military intelligence, and surveillance. Military publications include references to Unit 8200 as the Central Collection Unit of the Intelligence Corps, and it is sometimes referred to as Israeli SIGINT National Unit (ISNU).[1] It is subordinate to Aman, the military intelligence directorate.
The unit is composed primarily of 18–21 year olds. As a result of the youth of the soldiers in the unit, and the shortness of their service period, the unit relies on selecting recruits with the ability for rapid adaptation and speedy learning.[2] Afterschool programs for 16–18 year olds, teaching computer coding and hacking skills, also serve as feeder programs for the unit.[3] Former Unit 8200 soldiers have, after completing their military service, gone on to founding and occupying top positions in many international IT companies and in Silicon Valley.[3][4]
According to the Director of Military Sciences at the Royal United Services Institute, “Unit 8200 is probably the foremost technical intelligence agency in the world and stands on a par with the NSA in everything except scale.”[5]
Overview[edit]
Unit 8200 is the largest unit in the Israel Defense Forces, comprising several thousand soldiers.[6] It is comparable in its function to the United States‘ National Security Agency and is a Ministry of Defense body just as the NSA is part of the United States Department of Defense.
Subordinate to Unit 8200 is Unit Hatzav (Hebrew name for Drimia (Hebrew: יחידת חצב)), responsible for collecting OSINT intelligence. The unit monitors and collects military intelligence–related information from television, radio, newspapers, and the internet. The translation of various items accounts for part of what is termed “basic intelligence”, which is collected by the units. According to media reports, the unit provides over half of the overall intelligence information for the Israeli Intelligence Community.[citation needed]
The IDF’s most important signal intelligence–gathering installation is the Urim SIGINT Base, a part of Unit 8200. Urim is located in the Negev desert approximately 30 km from Beersheba.[7] In March 2004, the Commission to investigate the intelligence network following the War in Iraq recommended turning the unit into a civilian national SIGINT agency, as is in other Western countries, but this proposal was not implemented.[citation needed]
Unit 8200 is staffed primarily by 18–21 year old conscripts. Selection and recruitment to the unit usually occurs at age 18 through the IDF screening process after high school. However, the unit also scouts potential younger recruits through after-school computer classes.[3] These after-school computer classes, teaching 16–18 year olds computer coding and hacking skills, sometimes act as feeder programs for the unit, with students receiving invitation letters from the IDF.[3]
The 18-year-olds selected for the unit are primarily chosen for their ability to teach themselves and to learn very quickly as the unit will only have access to their services for a short time before their military service period ends.[2]
History[edit]
Unit 8200 was established in 1952 using primitive surplus American military equipment. Originally, it was called the 2nd Intelligence Service Unit and then the 515th Intelligence Service Unit. In 1954, the unit moved from Jaffa to its current base at the Glilot junction.[8]
According to Peter Roberts, the Director of Military Sciences at the Royal United Services Institute, “Unit 8200 is probably the foremost technical intelligence agency in the world and stands on a par with the NSA in everything except scale. They are highly focused on what they look at — certainly more focused than the NSA — and they conduct their operations with a degree of tenacity and passion that you don’t experience elsewhere.”[9]
Activities[edit]

In 2010, the French newspaper Le Monde diplomatique wrote that Unit 8200 operates a large SIGINT base in the Negev, one of the largest listening bases in the world, capable of monitoring phone calls, emails, and other communications, throughout the Middle East, Europe, Asia, and Africa, as well as tracking ships. Unit 8200 also reportedly maintains covert listening posts in Israeli embassies abroad, taps undersea cables, maintains covert listening units in the Palestinian territories, and has Gulfstream jets equipped with electronic surveillance equipment.[7]
Ronen Bergman says in a 2009 book that a Hezbollah bomb, disguised as a cell phone, was picked up by agents, and taken for investigation to Unit 8200’s headquarters in February 1999. Inside the laboratory the cell phone exploded. Two Unit 8200 soldiers were injured.[11]
In 2010, The New York Times cited “a former member of the United States intelligence community” alleging that this unit used a secret kill switch to deactivate Syrian air defenses during Operation Orchard.[12]
In 2014, 43 veterans of Unit 8200 signed a protest letter decrying what they called the electronic surveillance unit’s abusive gathering of Palestinians’ private information.[13][14][15] In response, 200 other reservists signed a counter-protest letter.[16][17][18]
According to The New York Times, the Unit 8200’s hack of Kaspersky Lab allowed them to watch in real time as Russian government hackers searched computers around the world for American intelligence programs.[19] Israelis who had hacked into Kaspersky’s own network alerted the United States to the broad Russian intrusion of US systems.[19]
2023-2024 Hamas attack[edit]
In the failure to forecast the catastrophic 2023-2024 Hamas attack on Israel by Israel’s intelligence agencies, Unit 8200 was blamed for having underestimated Hamas activities.[20] Unit 8200 is alleged to have stopped listening to Hamas’s handheld radios in 2022, deciding it was a “waste of effort.” Monitoring that radio network might have helped the Shin Bet realize a few hours before the attack that the unusual activity they were seeing on the Gaza border was not just another military exercise by Hamas, Times of Israel noted.[21]
The New York Post reported in November, however, that at least one veteran analyst in Unit 8200 had indeed warned in July of an imminent cross-border attack but that such concerns were dismissed by senior military leadership as “totally imaginative”.[22]
Stuxnet[edit]
Many media reports alleged that Unit 8200 was partly or wholly responsible for the creation of the Stuxnet computer worm that in 2010 infected industrial computers, including Iranian nuclear facilities.[23][failed verification]
Duqu[edit]
Duqu is a collection of computer malware discovered on 1 September 2011. It is alleged[by whom?] to be the creation of Unit 8200.[24][25]
Companies founded by alumni[edit]
Former soldiers of Unit 8200 have gone on to found many high-tech companies, among them:[26][27][4][28][29]
- Adallom
- AlphiMAX
- Altnext
- Argus Cyber Security
- Armis
- Astrix Security
- AudioCodes
- Axis Security
- Bizo
- Bzigo[30]
- CardScan
- Check Point
- Claroty
- CloudEndure
- Cloudinary
- CommScope
- Crosswise
- CTERA Networks
- CTS Labs
- CyberArk
- Cybereason[28]
- CyCognito
- Cypago
- Dig Security
- Explorium
- Entitle
- EZchip
- Fireblocks
- Forter
- FST Biometrics
- GIDEON
- Gilat
- Hub Cyber Security
- Hunters.Ai
- Hyperwise Security
- ICQ
- IL Ventures
- Imperva
- Incapsula
- Indeni
- Infinidat
- Infinipoint
- IntSights
- IVIX
- Lacoon Mobile Security
- Leadspace
- LEVL Technologies
- noname Security
- Namogoo
- NICE
- NSO Group
- Onavo
- Opster
- OverOps
- Palo Alto Networks
- PerimeterX
- PrimeSense
- Radware
- Rosh Intelligent Systems
- Salt Security
- Secdo
- Silverfort
- Solaredge
- Viber
- Votiro
- Verint (spin-off from Comverse)
- Waze[31]
- Wing Security
- Wix
- Wiz
- XenSource
- XIV
- Yonatan Labs
- ZoomInfo
See also[edit]
- List of cyber warfare forces
- Havatzalot Program – Military Intelligence Directorate training program
- IDF C4I Corps
- IDF Center for Consciousness Operations
- IDF Information Security Department
- Mamram
- IDF Computer Service Directorate
- Military Intelligence Directorate (Israel)
- Talpiot program
- Unit 81
- Technion
Leave a comment