Information Warfare: Israel Plays Rough
https://www.strategypage.com/htmw/htiw/20170712.aspx
July 12, 2017: The Israeli domestic intelligence service (Shin Bet, similar to the British MI5) recently confirmed what was already widely known among hackers; trying to hack Israeli networks will often trigger instant counter-hacks that will at least halt the hackers with unexpected error messages or, worse, generate a powerful counter-hack directed against the attackers system. The worst result is that, as several thousand foreign hackers have already discovered, the Israelis will identify who you are and where you are operating from. If the hacker is in a nation that has extradition or similar arrangements with Israel the hacker can start worrying about getting arrested or, at the very least, being placed under investigation and added to a list of the usual suspects.
Shin Bet could not hide the fact that it was expanding its Cyber War operations and recruiting additional personnel. So announcements like this are considered part PR and part recruiting. Since 2010 various Israeli government and military organizations have been seeking additional staff for new Cyber War efforts that can detect and thwart enemy hackers. This included seeking expert hackers willing to train to operate in the field with Israeli commando units. That new Cyber War unit was actually part of military intelligence and sought recruits from those already in the military as well as civilians.
Israel had long had troops dedicated to Cyber War activities, but in 2010 they introduced a new twist to this. Israel used the same screening and recruiting techniques they had developed for commando units to find suitable recruits for an elite Cyber War unit.
>>>
(Article does continue. Zim.)

Mad Poet Strikes Again.