Posted on 08/16/2018 5:20:05 AM PDT by SJackson
The IDF has uncovered another Hamas network posing as attractive young women on social networks in order to honeypot soldiers, this time on Instagram, in order to access as much information and intelligence on the army that they can.
This is a network in which the culture of sharing is paramount and where everything revolves around pictures and see me, said Lt.-Col. A, the head of information security policies at the IDFs Information Security Department.
Be the first to know - Join our Facebook page.
According to him, Popularity and the need to follow back increases the risk of soldiers taking the bait, and cautioned soldiers to follow military guidelines and not click on suspicious messages in their Instagram inbox.
We want to make it clear to the soldiers that even if Hamas adds additional applications and infiltrates additional platforms, once we identify them, they will not catch up with us, said Lt.-Col. A.
The IDF launched two operations in the past year uncovering networks of Hamas operatives trying to lure in soldiers through smartphone applications. According to the IDF Spokespersons Unit there have been hundreds of reports of suspicious individuals approaching soldiers online since January 2018.
The IDF first uncovered Hamass attempt to honeypot male soldiers online in January of last year in an operation dubbed Hunters Network where dozens of accounts on social networks, such as on Facebook, were identified as being operated with false or stolen identities with the intent to extract classified information from both regular and reservist soldiers.
In March the IDFs Military Intelligence Directorate launched Operation Heartbreaker and uncovered another cell behind suspicious online actions targeting IDF soldiers on social networks as well as on messaging applications such as Whatsapp using Israeli numbers to get soldiers to download applications from Googles official store.
In both instances the soldiers were asked to download applications which compromised their cell phones with Trojan horse viruses.
The reports we received after the publication [of Operation Heartbreaker] dealt a great deal with the fact that soldiers thought that an application from an official app store was not necessarily dangerous, Lt.- Col. A. was quoted by the army as saying.
After we thwarted and blocked the applications, Hamas tried unsuccessfully to preserve connections that had been initiated in the past, or new relationships with identities that have not yet been exposed. Thanks to the high reporting by soldiers, these attempts were also revealed and we were able to thwart other fake profiles, he said.
Once on the phone, the virus would give Hamas operatives access to all pictures, the soldiers location, text messages (including the history of sent messages), and the soldiers contact list. The virus would also be able to download files, have access to the phones camera and microphone, take pictures and record conversations remotely without the soldier knowing.
An investigation by the IDFs Military Intelligence found 11 suspicious individuals (three who approached soldiers on WhatsApp, another eight who approached soldiers on Facebook) were members of an intelligence network of the Hamas terrorist organization.
The military urged troops to only confirm friendship requests from people one knows personally, to not upload any classified information to any social network, and to only download applications from the actual App Store (rather than downloading applications from links).
Troops were also recommend that if they were approached by a stranger online to be aware that it might be an attempt to honeypot them, especially if the suspicious individual is unable to meet in person.
The IDF has urged all soldiers, including reserve soldiers, to report to their commander and security officials if the suspicious individual asks them to download applications and if they feel that their phone may have been compromised.
..................
I used to live in the Gush.
Mossad could find the Arab women at issue by tracking unusual Nair and commercial-grade hair trimmer purchases.
Only a wookie would know that!
This is an example of information that should not be posted on FR.
Beyond that, removal of body hair is permissible, and in some schools of thought required. Some of our soldiers in Iraq would see weird shit, the entire female population of a village going into the fields on the night of a full moon, stripping nekkid and removing all their body hair, because in their particular flavor of Islam it would be haram NOT to remove all their body hair.
Fataawa al-Lajnah al-Daaimah: There is no sin on a woman if she removes hair on her upper lip, thighs, calves and arms. This is not part of the tanammus (plucking) that is forbidden.
Most of it seems to relate to contesting understandings of archaic Arabic words and how a given Imam likes his gals, au natural or Brazilian.
Once on the phone, the virus would give Hamas operatives access to all pictures, the soldiers location, text messages (including the history of sent messages), and the soldiers contact list. The virus would also be able to download files, have access to the phones camera and microphone, take pictures and record conversations remotely without the soldier knowing.
Let's be clear about this. The Trojan Horse viruses are being provided by the sponsor of Hamas, and most of the rest of the Middle Eastern terrorist groups: IRAN. They've focused a lot of oil money on developing a new generation of cyber warfare specialists. Not just hacking, but developing viruses like these.
Those Iranian foreign exchange students from the 1980s, studying computer science at universities in the US and Western Europe, are the leaders and organizers of this cyber warfare effort.
Thanks to Barack Obama, they have $1.4 billion in fresh US cash to finance this operation and others.
Why hasn’t hamas been wiped out by now?
” how a given Imam likes his gals, au natural or Brazilian.”
This is the beginning and end of the analysis.
. . . . with the caveat that upper-class (and there are plenty of very rich Arabs in PA controlled areas) are meticulously groomed, often very pretty and smart, fully Western, and only play act as observant Muslims in public (and then only certain places in public — certainly not Ibiza, Spain for example, where it’s rare to find them dressed in more than a bikini bottom) to placate the unwashed masses.
The entirety of the “Palestinian struggle” is simply a scam to keep the cash spigot open for certain families.
The poor and uneducated are the true believers, and intentionally kept that way, so as to better serve as cannon fodder for the rich Arab families — to make them richer.
“Why hasnt hamas been wiped out by now?”
Well, it’s not like they have a big “H” tatted on their forehead.
Getting rid of them would essentially require genocide, which we Jews are not big on, despite the incessant claims by the Left that we are Nazis.
Believe it or not, there are lots of really good and nice people in Gaza, et al. Killing the 95% to get the 5% is not our speed.
“the entire female population of a village going into the fields on the night of a full moon, stripping nekkid and removing all their body hair”
Sounds like the kind of scam an adult might perpetrate on a naive young person, to get them naked. Lot’s of homosexuality and pedophilia in Islamic countries.
“The Trojan Horse viruses are being provided by the sponsor of Hamas, and most of the rest of the Middle Eastern terrorist groups: IRAN.”
The capabilities of the tool as described, could be used to prepare for (and during the conduct of) a real full blown war (in addition to terrorism).
The only solution is regime change in Iran.
Yep, Honeypot, diesel and a Zippo always rhymed with ticked off sergeant.
Well, it looks like the Russian honeypot at Trump Tower in June 2016...Natalia Veselnitskaya.....has found herself a new job.
ROTF! Love it!
“This is an example of information that should not be posted on FR.”
The Gush was/is on the beach. What was seen cannot be unseen.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.