Maps of Zionist Regime’s Vital Facilities Leaked
BEIRUT (Dispatches) -- A hacker group called Moses Staff said Monday it has successfully conducted a massive cyberattack against the occupying regime of Israel, and is now in possession of comprehensive data that could be leaked after accessing the servers of major companies.
The group announced that it had targeted a number of Israeli firms in its latest attack and acquired a vast trove of critical maps of facilities, which include information on the location and characteristics of vital systems across the occupied territories.
The data includes airborne mapping surveys with 5-centimeter (2-inch) accuracy and three-dimensional images of Israeli military sites and important buildings.
Moses Staff stated that the information it had was of immense significance, amid international sanctions that prevent accurate access to aerial images of critical areas inside Israeli-occupied Palestinian lands.
The group later released a video showing photos and maps of the Zionist regime’s vital facilities.
Moses Staff stated that the footage is a striking example of accurate images that it has taken over after infiltrating into the servers of Israeli cyber companies.
Unlike the Black Shadow hacker group that has also struck Israeli companies recently, Moses Staff did not make any demands for money or anything else.
On November 3, Moses Staff said it had carried out a cyberattack on three Israeli engineering companies, less than two weeks after it leaked files it said to have obtained in an attack on the occupying regime’s war ministry.
The group announced at the time that it had targeted Ehud Leviathan Engineering, David Engineers, and HGM Engineering in the attack.
The data leaked from the three companies included projects, maps, contracts, pictures, letters, and videoconferencing images.
The news came as a former member
of the Zionist army’s elite signals intelligence unit 8200 was quoted as saying that Israel can listen to every telephone conversation taking place in the West Bank and Gaza.
Every mobile or phone imported into Gaza through the Kerem Shalom crossing - in Gaza’s south - is implanted with an Israeli bug, and anyone using the only two mobile networks serving the occupied territories - Jawwal and Wataniya - is being monitored as well, the former signals intelligence member told the Middle East Eye.
At any given time, hundreds of soldiers are listening to the conversations being conducted. The audio monitoring falls into two groups. The first is Palestinians who are politically active or who represent a security threat in Israel’s view. The second level of monitoring is used by Shin Bet, the domestic security service to find “pressure points” in Palestinian society.
“This is an entire world in which the Shin Bet can acquire power over Palestinians that ultimately forces them to collaborate or reveal things about other people, and it is all part of the system of control,” he said.
The army veteran was speaking in the wake of the Washington Post’s revelations about Blue Wolf, facial recognition technology that alerts soldiers at checkpoints to detain suspects.
The “grunt work” of this system of mass surveillance is done by Zionist soldiers who studied Arabic as part of their military service. They are monitored by Druze soldiers or Zionist soldiers of Syrian descent for whom Arabic is their mother tongue. They transcribe the conversations, whose texts are translated and sent to the army’s intelligence units and to Shin Bet.
He said there were no limits to the occupying regime of Israel’s ability to invade Palestinians’ private and public lives. And there appear to be no limits as to what soldiers do with the conversations they have intercepted.
“Sometimes these are private conversations, maybe even intimate conversations. People who are soldiers in the army would laugh when they heard sex talk. Soldiers save the conversations and send them to their friends. This is a very harsh invasion of the privacy of every Palestinian living there,” he said.
The recent revelations about Pegasus and Blue Wolf are nothing new to Palestinians who have grown up under constant surveillance.
The mass surveillance is so routine that army high command has had to resort to create incentives to get soldiers to take photographs of Palestinians passing through checkpoints.
Prizes were said to have been offered for the units that gathered the greatest number of photos of Palestinians to add to the database described by a former soldier as the army’s “Facebook for Palestinians”.
The occupying regime of Israel is coming under mounting international pressure for the use of its spyware.
The U.S. government blacklisted NSO Group, the creator of Pegasus software, after cyber security campaigners obtained a leaked database of 50,000 phone numbers selected by NSO Group clients. Candiru, a second Israeli spyware firm, has been blacklisted. The U.S. said the companies’ activities were contrary to U.S. national security interests.