Professional Documents
Culture Documents
Israel and The Cyber Threat How The Startup Nation Became A Global Cyber Power Charles D Freilich Full Chapter PDF
Israel and The Cyber Threat How The Startup Nation Became A Global Cyber Power Charles D Freilich Full Chapter PDF
https://ebookmass.com/product/israel-and-the-cyber-threat-
charles-d-freilich/
https://ebookmass.com/product/cyber-threat-
intelligence-2023-edition-martin-lee/
https://ebookmass.com/product/cyber-technological-paradigms-and-
threat-landscape-in-india-ramnath-reghunadhan/
https://ebookmass.com/product/understand-manage-and-measure-
cyber-risk-practical-solutions-for-creating-a-sustainable-cyber-
program-2nd-edition-ryan-leirvik/
Israeli National Security: A New Strategy for an Era of
Change Charles D. Freilich
https://ebookmass.com/product/israeli-national-security-a-new-
strategy-for-an-era-of-change-charles-d-freilich/
https://ebookmass.com/product/hunting-cyber-criminals-vinny-
troia/
https://ebookmass.com/product/strategy-leadership-and-ai-in-the-
cyber-ecosystem-hamid-jahankhani/
https://ebookmass.com/product/transportation-cyber-physical-
systems-lipika-deka/
https://ebookmass.com/product/emerging-cyber-threats-and-
cognitive-vulnerabilities-vladlena-benson/
Israel and the Cyber Threat
Israel and the Cyber Threat
Published in the United States of America by Oxford University Press 198 Madison Avenue, New
York, NY 10016, United States of America.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, without the prior permission in writing of Oxford
University Press, or as expressly permitted by law, by license, or under terms agreed with the
appropriate reproduction rights organization. Inquiries concerning reproduction outside the scope of
the above should be sent to the Rights Department, Oxford University Press, at the address above.
You must not circulate this work in any other form and you must impose this same condition on any
acquirer.
DOI: 10.1093/oso/9780197677711.001.0001
CONTENTS
Introduction
Figures
I.1 Malware Peaks and Political Developments
I.2 Metcalf’s Law
1.1 Cyber Threats by Motivation
7.1 Cyber Decision Timeline
10.1 Israel’s Cyber System
Table
7.1 The Concept of Operations
Maps
6.1 Israel (1967 Borders)
6.2 The Middle East in Context
ACKNOWLEDGMENTS
AI Artificial Intelligence
APT Advanced Persistent Threat
ATP Advanced Technology Park
CBM Confidence Building Measure
CEC Cyber Education Center
CERT Computer Emergency Response Team
CNA Computer Network Attacks (for purposes of disruption or destruction)
CNE Computer Network Exploitation (cyber espionage)
CNI Computer Network Influence (cyber information operations)
CT Counterterrorism
CWC Chemical Weapons Convention
DDoS Distributed Denial of Service attacks
DMP Decision-Making Process
DoD (US) Department of Defense
DoS Denial of Service attacks
GUCD Governmental Unit for Cyber Defense
IAF Israel Air Force
ICT Information Communications Technology
IIA Israel Innovation Authority
IISS International Institute for Strategic Studies
INCD Israel National Cyber Directorate
INSC Israel National Security Council
INSS Institute for National Security Studies
IoT Internet of Things
IRGC Iranian Revolutionary Guards Corps
ISA Israel Security Agency, also known as the Shin Bet or Shabak
JCPOA Joint Comprehensive Plan of Action (“Iran nuclear deal” 2015).
LOAC Law of Armed Conflict
MABAM campaign between the wars (Hebrew acronym)
MI Military Intelligence
MNC Multinational Corporation
MoD Ministry of Defense
MoU Memorandum of Understanding
NCSA National Cyber Security Authority
NCSC National Cyber Security Center
NISA National Information Security Authority
NIW (Iranian) National information network
NPT Nonproliferation Treaty
NSA (US) National Security Agency
NSC (US) National Security Council
NSS National Security Staff (new name for INSC above)
SOC Security Operations Center
UAE United Arab Emirates
PROLOGUE
It was a quiet summer evening when the first signs of trouble appeared.
Some people in Tel Aviv were already strolling on the beachfront
promenade, others were still caught in rush hour traffic. Suddenly, traffic
lights went out and within minutes central Israel became one big snarl. In
Jerusalem, an ambulance with a patient in cardiac arrest was unable to
reach Hadassah hospital. The radar at Ben-Gurion Airport went blank and
aircraft had to be diverted to Cyprus.
Soon electricity began sputtering around the country. Air conditioners
and computers shut off, and hot and increasingly irritable people began
wondering what was going on. Young techies at Microsoft, Facebook, and
other high-tech firms were particularly exasperated. In Dimona, the usually
well-lit security fence around the nuclear reactor was shrouded in darkness.
Banking services crashed, and many found that their accounts and
investment portfolios registered a zero balance. TV programs were
disrupted, but soon showed images of Israelis killed in terrorist attacks.
Social media were overwhelmed by vicious propaganda messages, and
phone communications collapsed.
It was then that a barrage of Hezbollah rockets began hitting population
centers, airbases, and other major military targets. Some people noticed
that Iron Dome, Israel’s vaunted anti-rocket system, seemed to be missing
its targets. Unbeknown to them, Iron Dome operators were frantically
trying to recalibrate their unresponsive computers. An air force pilot
reported seeing extensive troop movements along the northern border, but
monitoring systems gave no indication thereof.
Tensions had been building for months. Iran was closer than ever to a
nuclear breakout and now had a forward operating base in Syria from
which to attack Israel, in addition to the 130,000 Hezbollah rockets housed
in Lebanon.
Over the next few days, the IDF mobilized reserves. Many never received
the messages sent to their smartphones. Others did, but were caught in the
never-ending traffic. By the time their units were able to fully mobilize and
reach the front . . . .
This account is based on actual events and IDF training scenarios, with
just a little help from our imaginations.1
Introduction
Israel has the world’s most tech-dependent economy and is a global leader
in high-tech R&D and startups, per capita. Israel has also come to be a
leading cyber power, home to as many cyber startups as the rest of the
world combined, not including the United States. Israel is also widely
considered a leading actor in both defensive and offensive cyber
capabilities, and its overall cyber prowess has become an important
component of its national security. As such, the cyber realm has come to
constitute a truly remarkable boon for Israel and a critical dimension of
every aspect of its national life today—socioeconomic, cultural,
governmental, diplomatic, and military.
For Israel’s enemies, conversely, its dependence on the cyber realm is
also a potential source of weakness, making it more vulnerable to cyber
attack than they and providing a possible means by which to counter
Israel’s economic power and military superiority.1 Israel has thus become
one of the top targets of cyber attacks in the world today, facing a nearly
constant daily barrage, both by state and nonstate actors. Indeed, cyber
attacks have come to be viewed as one of the primary threats that Israel
faces today.2
Attackers have targeted virtually every type of computer system in Israel,
hospitals, El Al airline, the Tel Aviv Stock Exchange, Bank of Israel, and
television stations, to mention just a few.3 Critical infrastructure firms,
providing electricity, water, communications, and more, have been a
particular focus of attack. The Israel Electric Corporation (IEC) alone
typically faces hundreds of thousands of attacks every day. Most are mere
nuisances and easily deflected, but some are sophisticated efforts to disable
its systems. A successful cyber attack on the IEC could disrupt power to
virtually all of Israel and paralyze the nation, with potentially severe civil
and military consequences. In 2020, a cyber attack on Israel’s water system
was detected before dangerous levels of chlorine could be released into the
national supply.4
Most of the known attacks are against purely civilian targets and are
designed simply to cause disruption and hardship. Some are conducted
without any stated political agenda or set of demands and are offshoots of
wider campaigns aimed at undermining Israel’s international standing,
weakening it physically, and undermining its societal resilience. For years,
on the eve of Holocaust Remembrance Day “hacktivist” groups have
conducted a coordinated annual series of cyber attacks against Israeli
websites. One such group has repeatedly threatened Israel with an
“electronic Holocaust” and of being “erased” from cyberspace.5
In 2019 foreign hackers almost succeeded in inserting fake video footage,
purporting to show rockets raining down on Tel Aviv, into the televised
broadcast of the Eurovision Song Contest, an annual musical extravaganza
held that year in Israel and viewed live by hundreds of millions of people
around the world. In 2020 hackers from Iran, China, North Korea, Russia,
and Poland launched more than 800 cyber attacks against Ben-Gurion
airport and approaching aircraft, to disrupt the arrival of more than 60 world
leaders attending a commemoration of the 75th anniversary of the liberation
of Auschwitz, including the presidents of Russia and France and the US
vice president. In 2022 hackers sought to disrupt President Zelenskyy’s live
address to the Knesset, at the height of Ukraine’s war with Russia.6 Had any
of these attacks succeeded, the damage to Israel’s image, tourist industry,
and commercial sector, as a whole, would have been severe.
Israel faces a myriad array of military threats and relies for its security on
a largely reservist army with exceedingly short mobilization times. A cyber
attack that successfully disrupted power, communications, or transportation
systems, even for a short period, could make a critical difference in times of
crisis or war. Even something as basic as shutting off traffic lights or
disrupting cellular communications could delay the mobilization of forces
and have a significant impact on military operations, not to mention the
chaos caused to the entire country. Attacks that successfully penetrated
command-and-control and intelligence systems, or even weapons systems,
could have an even more severe impact.
Iran, Hezbollah, and Hamas, unsurprisingly, are the primary sources of
cyber attacks against Israel. Iranian hackers reportedly targeted Israeli
nuclear scientists with “phishing” scams in an effort to gain access to
sensitive information.7 An Iranian-affiliated website succeeded in causing a
brief, but dangerous, spiral in tensions with Pakistan, based on an entirely
fabricated nuclear threat that Israel had supposedly made and a real nuclear
threat that Pakistan made in response.8
Iran, Hezbollah, and Hamas have apparently used Facebook and
messaging apps for purposes of terrorism against Israel.9 Palestinian Islamic
Jihad hacked the (unencrypted) communications of IDF drones operating
over Gaza, thereby gaining real-time intelligence that enabled it to better
hide its rockets from Israeli strikes.10 Hamas hackers, posing as attractive
Israeli women, enticed IDF soldiers into downloading fake dating sites onto
their smart phones. In so doing, they were able to gain control over the
soldiers’ phones, overhear the operational briefings they attended, or film
their bases and military positions. Even when the soldiers used secure land
lines for operational purposes, the infected phones continued to transmit
what they were saying.11
Cyber attacks against Israel do not only originate with its Middle Eastern
adversaries.12 Much like the United States and other democratic countries
today, Israel is also concerned about attempts to subvert its electoral system
and influence public opinion through cyber means.13 Russia and China and
their cyber espionage are a particular source of concern,14 as are even close
allies. During a high point in Israel’s ongoing conflict with Hamas in Gaza
and, even more importantly, at a time when Israel was preoccupied with the
danger of a possible Iranian nuclear breakout, US and British intelligence
reportedly tapped into live video feeds from Israeli aircraft, monitored
military operations in Gaza, and watched for a potential strike against Iran.1
5
Figure I.1 Malware Peaks and Political Developments Source: Adapted from Kausch and Tabansky 2
018.6
can also serve as an entry door for malicious cyber activity. It is thus hardly
surprising that the World Economic Forum has ranked large-scale breaches
of cyber security as one of the five most serious risks facing the world.26
The exponential power of information networks—and consequently of
information operations—is shown in Figure I.2. Whereas two telephones
are needed to make one connection, five telephones will make ten
connections, twelve will make sixty-six connections and so on.27
Between 2005 and 2019 more than 11.5 billion records containing
personal data, mostly of US citizens, such as email addresses and social
security numbers, were stolen in over 9,000 separate cyber attacks. During
2017–2019 alone, personal data was stolen from the accounts of nearly 140
million Facebook, 57 million Uber, 100 million Capital One, and 143
million Equifax users. Perhaps most embarrassingly, 400 million users of
the Adult Friend Finder, a casual sex site, were also compromised.28
One report estimated the cost of global cyber crime in 2018 at $600
billion, an increase of $100 billion over 2014, and forecast that it would
reach a whopping $6 trillion by 2021. US firms lose roughly $250 billion
each year as a result of cyber theft of intellectual property. The damage
from a successful cyber attack against just one of the operators of the US
electric grid has been estimated at anywhere between $240 billion and $1
trillion.29
Ransomware attacks, in which the target is forced to pay a fee in
exchange for a digital key that unfreezes a maliciously encrypted system,
have become one of the most important forms of cyber crime, and one
which is increasingly viewed as a national security threat. In 2020 global
ransomware attacks nearly doubled. In 2021 they took place in the United
States alone, on average, every eight minutes. Russian groups are believed
to be behind most ransomware attacks to date, although direct governmental
complicity has yet to be fully established.30
Various state actors, including Russia and Iran, have planted, or at least
planned, intrusions on the US electric grid, as the United States has on
theirs, or China has on India’s.31 In 2021, the computer systems of a water
treatment facility in Florida were breached, raising fears that dangerous
chemicals could have been released into the water supply.32 These and other
attacks on critical national infrastructure, with potentially systemic effects,
are a particularly severe danger.
In 2020 hackers sought to steal information about Covid-19 vaccine
research in the United States, UK, Canada, and elsewhere. Chinese-
affiliated attacks apparently began within months of the pandemic’s
outbreak, followed by Russian and North Korean attacks. Spearfishing
emails impersonated executives at legitimate firms involved in the global
vaccine distribution chain, as well as representatives of the World Health
Organization (WHO) and personnel recruiters for pharmaceutical
companies. Confidential information regarding the Pfizer vaccine was
stolen from the European Medicines Agency, the regulatory agency
responsible for authorizing its use throughout the EU. UNICEF, which was
planning vaccine delivery for poorer countries, was apparently also the
focus of an attack.33
Cyber poses a particularly severe threat in the military realm. Were an
attacker able to shut down an adversary’s electric grid, for example, it
would be possible to bring both its economy and military to a virtual
standstill and conceivably have a decisive impact on the outcome of a
conflict. Cyber attacks might render certain weapon systems inoperable, or
inaccurate. Most future military engagements of any magnitude are likely to
include at least some cyber operations.34
Russia may have been the first state to conduct cyber campaigns
designed to achieve strategic effects and destabilize foreign governments.
Russian operations began with attacks against Estonia in 2007,
subsequently dubbed Web War 1.35 A year later, during a conflict with
Georgia, Russia combined ground and air attacks with cyber operations.
Starting in 2014, Russia merged conventional and cyber means into a
continuous form of hybrid warfare designed to prevent Ukraine from
contesting the annexation of Crimea and occupation of the eastern part of
the country. The 2017 NotPetya cyber attack on Ukraine’s government,
power grid, and banking system may have been the most costly and
destructive ever. Speculation was rampant in 2022 that Russia would
preface an invasion of Ukraine with widespread cyber attacks.36
China considers cyber a particularly effective means of conducting
deniable, asymmetric warfare37 and has successfully hacked blueprints and
plans for major US weapons.38 For North Korea, the cyber realm is a cheap
means of attempting to level the playing field with the United States and
one in which it can act with virtual impunity, given the undeveloped nature
of its own cyber infrastructure. In 2015 North Korea launched widespread
cyber attacks against South Korean banks and broadcasters, paralyzing
roughly 48,000 computers as well as a nuclear energy firm, raising concerns
regarding the safety of South Korea’s power plants. In 2016 North Korea
successfully breached a South Korean military computer system that
contained detailed US war plans and began using cyber crime as a means of
financing its nuclear and missile programs. In 2017 it launched WannaCry,
a severe ransomware attack that spread to 230,000 computers in nearly 100
countries, starting with the British National Health Service.39
The United States is one of the most aggressive actors in the military
cyber realm and openly declares its intention to dominate it. As early as
2013, the United States had already breached over 85,000 computer
systems in 89 countries, reportedly including China’s national and nuclear
command and control systems, and implanted malware in Russia’s electric
grid. The United States sought to sabotage North Korea’s missile program
and has conducted a number of cyber attacks against Iran, including the
Stuxnet attack on its nuclear program, implants in its computer networks in
preparation for possible preemptive strikes, and attempted sabotage of its
missile program.40 In response, Iranian hackers attacked 46 major US
financial institutions, forcing them to spend billions of dollars on cyber
security. In a particularly destructive cyber attack, they also targeted
Aramco, the Saudi national oil company, bringing it to the verge of
collapse.41
Cyber has had a dramatic impact on espionage operations. In 2020,
18,000 customers around the world downloaded Russian malware,
including tens of high value targets mostly in the United States, such as the
National Security Agency and National Nuclear Security Administration
(which maintains the US nuclear stockpile), but also in Canada, Mexico, the
UK, Belgium, Spain, the UAE—and Israel.42 Whereas intelligence agencies
in the past had to go to great lengths to gain access to just a single such
target, the scope of the Russian attack and potential for damage were
staggering. In 2020 Chinese hackers breached the Vatican’s email system to
gain intelligence regarding its positions on negotiations over the
controversial appointment process of Catholic bishops in China.43 At the
height of the negotiations with the United States that ultimately led to the
nuclear deal in 2015,† Iran breached the personal email accounts of the US
negotiating team, other US officials, and Congressional critics of Iran.44
The cyber realm has also become an instrument of social control at home
and a means of achieving economic advantage abroad. China has built the
“Great Firewall of China” to control what domestic users can access on the
Internet and to spy on them. It has also conducted extensive cyber
operations against technology firms and financial institutions in the United
States, Japan, and Europe. State-linked Chinese firms, using AI, facial
recognition software, and cell phones, are building a global mass
surveillance capability against political opponents.45 Russia is centralizing
domestic Internet traffic and creating chokepoints designed to seal it off
from the rest of the world.46 Iran, too, has developed a national intranet to
control access. An Iranian cyber surveillance campaign during 2014–2020,
reportedly capable of outsmarting encrypted messaging systems, spied on
dissidents and minorities at home and abroad.47
Cyber information operations, especially against elections in Western
countries, have proven a particularly effective instrument of power. In 2008
China hacked the presidential campaigns of Barack Obama and John
McCain and that of Joe Biden in 2020.48 Russia’s attack on the US
presidential elections in 2016 was arguably the most prominent cyber attack
ever, certainly the most prominent cyber information campaign. It may have
also been part of a broader strategy designed to split the Western camp,
weaken NATO, and erode public faith in Western democracy and
institutions in 19 countries. Initially designed to embarrass Hillary Clinton
and undermine her public stature, the Russian campaign appears to have
evolved into an attempt to sway the election in favor of Donald Trump.
Russian interference in US elections continued, albeit at a lower level, in
2018 and 2020.49
Iran has interfered in US elections ever since 2012. In 2016 Iranian
hackers sought to boost the presidential campaign of Bernie Sanders, who
was considered more favorable to their interests than the Democratic front
runner, Hillary Clinton. In 2020 Iran hacked both the Trump and Biden
campaigns, in an attempt to sway the outcome in the latter’s favor and
prevent the reelection of its nemesis, Trump. In an attempt to promote
further discord following the elections, an Iranian-affiliated website issued
death threats against those US elections officials and governors who had
refuted the claims of voter fraud. Other Iranian information operations
sought to leverage domestic controversies, such as the Black Lives Matter
movement, to further exacerbate tensions in the United States.50
As with other exciting new technologies, there is much hype surrounding
the threats and opportunities posed by the cyber realm, some warranted,
some not. Cyber certainly does not change everything and, in many
important ways, the threat it poses is not fundamentally different from older
and better-known asymmetric capabilities, such as terrorism or chemical
and biological weapons. Much as there are no air-tight solutions to these
threats, there will be none to cyber either.
States have, however, learned to cope with the dangers and to reduce
them to levels that do not usually impose unacceptable costs on their ways
of life. Subsequent chapters will show that many of the same policy
considerations that apply to other asymmetric threats, and to the physical
realm as a whole, are also applicable to the cyber realm and that the
fundamental principles of military strategy will remain largely unchanged.
Nevertheless, cyber does pose critical new challenges to states’ national
security. Major new capabilities have emerged, and will continue to emerge,
that are sufficiently different from existing capabilities to warrant the
special attention afforded to the cyber realm by theoreticians and
practitioners alike, this book included.
* The IoT refers to home appliances, autonomous vehicles, transportation, manufacturing and
agricultural systems, and more. The IoB is an extension of the IoT that connects the human body to
computer networks through devices that are ingested, implanted, or connected to it.
† The Joint Comprehensive Plan of Action (JCPOA).
PART I
The Global
My Home Is No Longer Cyber Threat
My Castle
We used to say that “my home is my castle,” but the information available today
about our homes includes the entrance code, combination to the safe and when
we plan on being out.
Tamir Pardo, former Head of Mossad
Chapter 1 provides an essential background for readers who are not deeply
immersed in the cyber realm and a potentially important refresher for those
who are. It is also designed to place the Israeli case in the broader context
of the global cyber threat.
Chapter 1 has three sections. It begins with a few simple words on cyber
terminology and the common types of cyber attacks (for a detailed
description of the different types of attacks see the Appendix). No
technological background is necessary, and the text should be readily
accessible to all readers. Those readers who are well-versed with the basics
of the cyber realm may wish to turn directly to the second section, which
provides an overview of the global cyber threat. The third section seeks to
identify those characteristics of the cyber realm that are unique, or at least
substantially different from existing realms of human endeavor, and those
that are not.
Some fear that cyber attacks could have even more damaging effects than
nuclear weapons. As devastating as a nuclear weapon may be, its effects are
essentially localized or, in combination, regional. The lethal effects of cyber
weapons would be slower, but possibly nation-wide and beyond,30 what
some have called the cyber equivalent of the nuclear realm’s mutually
assured destruction (MAD).31 Yigal Unna, former head of the INCD, is one
of those who are particularly concerned. “Cyber weapons,” he believes,
“can be compared to nuclear weapons in their (destructive) power, but the
ease with which they can be obtained, or used, makes them more similar to
a spear or a bow and arrow.”32 Indeed, cyber attacks on civil infrastructure
and other critical capabilities could lead to results that are as debilitating as
kinetic attacks, with potentially devastating systemic ramifications.33 Even
if the threat has been over-hyped and most cyber attacks fail, their sheer
numbers are such that just a few isolated successes might be sufficient to
Another random document with
no related content on Scribd:
BURBANK
Prunus triflora
1. Ga. Hort. Soc. Rpt. 53, 99. 1889. 2. U. S. D. A. Rpt. 392. 1891. 3.
Wickson Cal. Fruits 360. 1891. 4. Cornell Sta. Bul. 106:46, 63. 1896. 5.
Ala. Col. Sta. Bul. 85:445. 1897. 6. Am. Pom. Soc. Cat. 26. 1897. 7. Am.
Gard. 19:75, 132, 220, 792. 1898. 8. Mich. Sta. Bul. 169:242, 249. 1899.
9. Cornell Sta. Bul. 175:143. 1899. 10. Waugh Plum Cult. 134. 1901. 11.
W. N. Y. Hort. Soc. Rpt. 88. 1902. 12. Can. Hort. 25:272. 1902. 13. Budd-
Hansen Am. Hort. Man. 308. 1903. 14. Ga. Sta. Bul. 68:11, 28. 1905. 15.
Ohio Sta. Bul. 162:256. 1905. 16. DeVries Plant Breeding 170. 1907.
Persing Nos. 1 & 2, 15. Russian plum 20M. 4. Wassu 4. Wassu 9.
Tree large, vigorous, distinguished by its low, sprawling habit and flat
open top, unusually hardy for a Japanese variety, very productive, healthy;
branches somewhat roughish, dark ash-gray, thickly covered with fruit-
spurs, with few, large, raised lenticels; branchlets medium in thickness and
length, with short internodes, greenish-red changing to dark brown, with
gray scarf-skin, glossy, glabrous, with raised lenticels of medium size and
number; leaf-buds short, obtuse, free.
Leaves folded upward, broadly oblanceolate, peach-like, one and one-
eighth inches wide, three and three-quarters inches long, thin; upper
surface light green, smooth, pubescent only on the deeply grooved midrib;
lower surface glabrous, pubescent on the midrib; apex taper-pointed, base
cuneate, margin finely and doubly serrate, with small amber or reddish
glands; petiole nine-sixteenths inch long, sparingly hairy on one side,
tinged red, with from one to four small, reniform or globose glands mostly
on the stalk.
Blooming season early and short; flowers appearing with the leaves,
white; borne in dense clusters on the lateral buds and spurs, in threes;
pedicels one-quarter inch long, thick, glabrous; calyx-tube green, obconic,
glabrous; calyx-lobes broad, obtuse, glandular-serrate, glabrous, erect;
petals broadly oval, entire, short-clawed; anthers yellowish; filaments one-
quarter inch long; pistil glabrous, longer than the stamens.
Fruit early, season long; variable in size, large when the tree is not
overloaded, one and three-quarters inches in diameter, roundish-conic,
halves equal; cavity deep, abrupt, regular; suture shallow; apex roundish;
color dark red over a yellow ground, mottled, with thick bloom; dots
numerous, large, russet, conspicuous; stem five-eighths inch long,
glabrous, parting readily from the fruit; skin thin, tough, sour, separating
from the pulp; flesh deep yellow, juicy, tender, firm, sweet, aromatic; good;
stone clinging, three-quarters inch by five-eighths inch in size, roundish-
oval, turgid, blunt but sharp-tipped, roughish, with a slightly winged ventral
suture; dorsal suture acute.
CHABOT
CHABOT
Prunus triflora
1. Ga. Hort. Soc. Rpt. 29. 1886. 2. Ibid. 52, 99. 1889. 3. Am. Gard.
12:501. 1891. 4. Ibid. 13:700. 1892. 5. Rev. Hort. 132, Pl. 537. 1892. 6.
Cornell Sta. Bul. 62:20, 22, 28. 1894. 7. Ibid. 106:44, 48, 51, 60. 1896. 8.
Rogers Cat. 9. 1896. 9. Cornell Sta. Bul. 139:38. 1897. 10. Am. Pom. Soc.
Cat. 26. 1897. 11. Cornell Sta. Bul. 175:150. 1899. 12. Waugh Plum Cult.
134, 135 fig. 1901. 13. Can. Exp. Farm Bul. 43:37. 1903. 14. Ohio Sta.
Bul. 162:250, 254, 255, 256, 257. 1905. 15. Ga. Sta. Bul. 68:12, 14, 28,
29, 30, 31, 32. 1905.
Babcock 15. Babcock ?15. Bailey 3, 4, 6, 7. Bailey 9, 11, 12, 15. Chase
9, 15. Chabot 15. Douglas 15. Furugiya 7, 15. Furugiya 11, 12, 15.
Hytankayo 14. Hytankayo 15. Hon-smomo 15. O-Hatankyo 11. Orient 6, 7.
Orient 14. O-hattankio 15. Paragon 8. Red Nagate of some 7. Uchi Beni of
some 11. Yellow Japan 9, 11, 12.
When properly handled the fruits of Chabot are far the most
attractive of the many Triflora plums. They are large, beautifully
molded and handsomely mottled in shades of red over yellow with
occasional splashes of russet and a heavy but delicate bloom. To
secure the best coloring, the fruit must be picked before ripe and be
matured in dark storage. Early picking is necessary also because the
season of ripening is very long and the fruit drops badly if permitted
to hang to the trees until fully ripe. There should be at least three
pickings for this variety. Unfortunately, the quality of Chabot belies its
appearance, being at best not above the average. The fruits are firm
and ship well and keep rather better than those of any other plum of
its species. The trees are hardy and dependable in bearing but not
as productive as could be wished. The blossoms of Chabot open
later than those of most other Trifloras, enabling this sort
occasionally to escape frosts which injure other varieties of this
species. The stamens are often short, undeveloped and wholly or in
part sterile. Because of its attractive fruit this variety might well be
grown more than it is for the markets.
Chabot was imported from Japan by a Mr. Chabot of Berkeley,
California, and was introduced to the trade by Luther Burbank in
1886. As with Abundance, the nomenclature of Chabot is badly
confused. Several names that have been found to be synonymous
with the former have also been applied to the latter. J. L. Normand,
Marksville, Louisiana, imported trees from Japan, among which was
a tree that was different from any growing on his grounds. He named
this variety after Bailey and introduced it in 1891. Later this was
found to be identical with Chabot. Furugiya, another introduction by
Normand, is undoubtedly Chabot. H. N. Starnes of the Georgia
Experiment Station, who has tested many of the Japanese plums,
published in Bulletin 68 of his station, the additional synonyms:
Chase, O-hattankio, Hytankayo, Douglas, Hon-smomo and Babcock.
Orient, introduced by Stark Brothers, Louisiana, Missouri, in 1893, is
Chabot as tested at the New York and Ohio experiment stations.
Paragon, introduced by the Rogers Nursery Company, Moorestown,
New Jersey, has also proved to be identical. In 1897 the American
Pomological Society added this variety to its fruit catalog list.
CHALCO
Prunus simonii × Prunus triflora
CHAMBOURCY
Prunus domestica
1. Rev. Hort. 39. 1898. 2. Soc. Nat. Hort. France Pom. 560, fig. 1904. 3.
Can. Exp. Farms Rpt. 433. 1905. 4. Cat. Cong. Pom. France 473 fig.
1906.
Reine-Claude Tardive De Chambourcy 2. Reine-Claude Tardive Latinois
1. Reine-Claude Tardive de Chambourcy 1. Reine-Claude Latinois 2, 4.
Reine-Claude tardive 1. Reine-Claude Verte 4. Reine-Claude Tardive 2, 4.
Reine-Claude de Chambourcy 3. Tardive de Chambourcy 4.
CHAMPION
Prunus domestica
1. Wickson Cal. Fruits 360. 1891. 2. Oregon Hort. Soc. Rpt. 147. 1893.
3. Am. Pom. Soc. Rpt. 150. 1895. 4. Oregon Sta. Bul. 45:30. 1897.
Champion Prune, 1, 2, 3.
CHENEY
CHENEY
Prunus nigra
1. Wis. Hort. Soc. Rpt. 15, 38. 1885. 2. Minn. Hort. Soc. Rpt. 126. 1890.
3. Cornell Sta. Bul. 38:36, 86. 1892. 4. Ia. Sta. Bul. 31:346. 1895. 5. Wis.
Sta. Bul. 63:24, 31 fig. 13. 1897. 6. Am. Pom. Soc. Cat. 24. 1897. 7. Gard,
& For. 10:367. 1897. 8. Colo. Sta. Bul. 50:33. 1898. 9. Minn. Hort. Soc.
Rpt. 412. 1899. 10. Waugh Plum Cult. 169. 1901. 11. Budd-Hansen Am.
Hort. Man. 294. 1903. 12. Can. Exp. Farm Bul. 43:29. 1903. 13. Ia. Hort,
Soc. Rpt. 488. 1904. 14. Ohio Sta. Bul. 162:254, 255. 1905. 15. S. Dak.
Sta. Bul. 93:11. 1905. 16. Ia. Sta. Bul. 114:129. 1910.
Cherry 16 incor.
CLIMAX
CLIMAX
1. Rural N. Y. 57:653, 818. 1898. 2. Cal. State Board Hort. 52. 1897-98.
3. Vt. Sta. Bul. 67:9. 1898. 4. Vt. Sta. An. Rpt. 12:222. 1899. 5. Burbank
Cat. 2. 1899. 6. Nat. Nur. 8:117. 1900. 7. Vt. Sta. An. Rpt. 14:273. 1901. 8.
Rural N. Y. 62:643. 1903. 9. Mich. Sta. Sp. Bul. 30:18. 1905. 10. Ga. Sta.
Bul. 68:8, 35. 1905. 11. Ga. Hort. Soc. Rpt. 66. 1907.
Royal 1. Royal 1, 3, 4.
CLING STEM
Prunus domestica
1. N. Y. Sta. Rpt. 9:347. 1890.
CLYMAN
Prunus domestica
1. U. S. D. A. Rpt. 574. 1888. 2. Cal. State Board Hort. 236, 239, Pl. II
figs. 3 and 4. 1890. 3. Wickson Cal. Fruits 358. 1891. 4. Am. Pom. Soc.
Cat. 25. 1897. 5. N. Mex. Sta. Bul. 27:124. 1898. 6. Ohio Sta. Bul.
113:158. 1899. 7. Waugh Plum Cult. 98. 1901. 8. Ohio Sta. Bul. 162:236,
237 fig., 254, 255. 1905.
Clyman has special merit as one of the earliest good Domesticas.
The fruit resembles that of Lombard somewhat, but is smaller and is
much better in quality. As grown in California the Clyman commands
high prices for shipping eastward. Whether it could be grown
profitably in the East remains to be seen but it deserves to be rather
widely tested for an early home and market plum. In New York it has
a few serious faults: the plums are susceptible to rot, they drop as
soon as ripe and the trees seem not to be quite hardy at Geneva;
though in the Ohio reference given above they are said to be “rather
hardier than those of most other European sorts.” Otherwise than in
hardiness the trees at this place are quite satisfactory. The variety is
characterized by very long stamens. Clyman is well deserving of trial
with the possibility that it may prove to be the best of our early
Domesticas.
This plum was raised from a Peach plum stone planted in 1866, by
Mrs. Hannah Clyman, Napa City, Napa Valley, California. The
original tree was cut down but several suckers were taken from the
roots and planted in an orchard. These bore fruit for many years,
never failing to mature a crop. In 1886, Leonard Coates, a
nurseryman and fruit-grower of Napa City, became interested in the
plum on account of its extreme earliness and offered it to his
customers. The American Pomological Society added Clyman to its
fruit catalog list in 1897.
COLUMBIA
Prunus domestica
1. Mag. Hort. 8:90. 1842. 2. Downing Fr. Trees Am. 292. 1845. 3. Cole
Am. Fr. Book 216. 1849 4. Thomas Am. Fruit Cult. 334. 1849. 5. Am. Pom.
Soc. Cat. 86. 1862. 6. Mas Pom. Gen. 2:159. 1873. 7. Hogg Fruit Man.
691. 1884. 8. Wash. Hort. Soc. Rpt. 135. 1893.
Columbian Gage 2, 4. Columbia Pflaume 6. Columbia Gage 7.
COMPASS
Prunus besseyi × Prunus hortulana mineri
1. Northwestern Agr. 348. 1895. 2. Vt. Sta. Bul. 67:10. 1898. 3. Ia. Sta.
Bul. 46:266. 1900. 4. Budd-Hansen Am. Hort. Man. 294. 1903. 5. S. Dak.
Sta. Bul. 93:13. 1905.
Compass Cherry 2. Heideman Sand Cherry.