Shin Bet, Zionist War Minister Left Red-Faced
TEL AVIV (Dispatches) -- Shin Bet, Israel’s domestic security service, is highly embarrassed - and so is the occupying regime’s war minister Benny Gantz.
On Thursday, it was revealed that Omri Goren, a 37-year-old Israeli Jew who worked as housekeeper at Gantz’s private home, allegedly offered his services to Iranian intelligence. He has now been charged with espionage by the so-called ministry of justice.
It gets worse for Shin Bet. It transpires that Goren has a criminal record and served time in jail for robbery and burglary. Yet he was employed by Gantz and worked for him for two years.
The Shin Bet has a department in charge of security vetting personnel for the Zionist military, intelligence and security establishment. But it seems that it didn’t bother to vet and scan Goren.
What makes this so astonishing is that the security agency meticulously scans every junior employee who works for Israel’s security industries, along with employees of ministries, let alone the intelligence community. Their background is checked repeatedly. Candidates are requested to answer a very detailed questionnaire.
It is alleged that Goren used Telegram, an encrypted social media service, to initiate contact with a group of hackers calling themselves Black Shadow. He is then said to have offered to install a sort of Trojan horse virus on Gantz’s personal computer.
To prove he had access to the war minister, and would be useful, he took photos in Gantz’s home and sent them to what he hoped would be his future operators.
Experts say Shin Bet’s failure is a psychological blow to its pride and can be described as an important victory for Iran. However, Tehran has not officially claimed any responsibility or involvement in the affair.
Many Zionists, puzzled and ashamed by the revelations, have raised hypothetical questions as to what could have happened. Could, for example, the accused, with his access to Gantz, have easily planted a bomb in the war minister’s home?
It is one of the most serious and disturbing security breaches in the occupying regime’s security apparatus.
And while Israeli intelligence organizations - mainly Mossad and military intelligence - have boastfully been cited to be involved in terrorist operations against Iran’s nuclear facilities and its scientists , it turns out that the Israeli rear is exposed.
What also worries the Zionist public is that this time it was an Israeli Jew who agreed to spy.
The occupying regime has always bragged that its population is homogenous. Yet during the last few years, the number of Jews who have shown readiness to spy has been on the rise.
In a sting operation in 2019, Mossad and Shin Bet arrested Gonen Segev, a medical doctor and former member of parliament and minister of energy who also had a criminal record and spent some time in an Israeli jail for fraud.
After his release from prison in 2007, he settled in Nigeria and allegedly offered his services to the Iranian intelligence, who sent him for briefings in Tehran.
The Israeli opposition, led by former prime minister Benjamin Netanyahu, is using the incident to bash Gantz. Likud members and Zionist pundits point out that two years ago, when Gantz led the occupying regime’s largest party and was a leading candidate to be the prime minister, his phone was hacked, most probably by Iranian hackers.
In yet another intelligence defeat for the occupying regime, a report on Wednesday disclosed the identity of a senior Israeli officer involved in cyberattacks on Iran.
According to the report by Iran’s Fars news agency, the Zionist officer identified as Ohad Zeidenberg is working in the Unit 8200, an “Israeli Intelligence Corps unit” of the regime’s military that is responsible for collecting signals intelligence and code decryption.
Zeidenberg is the CEO of Cyber Threat Intelligence (CTI) company, assisting in planning anti-Iran operations by the Israeli security agencies and spy services, including Mossad, Fars said.
Back in July, a former Israeli politician was indicted on charges brought against him by the Shin Bet of involvement in espionage activity in favor of Iran.
Identified as Businessman Yaqoub Abu al-Qia’an, the accused was said to be linked to the occupying regime’s former foreign minister Moshe Yaalon’s Telem party, and once ran for joining the Knesset (parliament) on the right-wing party’s list.