Sunday, February 16, 2020

Rebound.

This is coolbert:

"Once on the phone, the virus would give Hamas operatives control over all aspects of the phone, including pictures, the soldier’s location, text messages and the soldier’s contact list. The virus would also have access to the phone’s camera and microphone, taking pictures and recording conversations remotely without the soldier knowing."

Courtesy the Jerusalem Post article and the tip from Mike

Boys will be boys. Beware the old Mata Hari routine. It does work!!

"IDF stops Hamas 'honeypots' from trapping soldiers"

"As part of 'Operation Rebound,' the IDF has foiled the third such Hamas network foiled in three years."

"The IDF has foiled a third Hamas network posing as attractive young women on social networks that lures in IDF soldiers in order to access as much information and intelligence on the army that they can.
The phones of hundreds of soldiers, including combat soldiers, were compromised in the third such Hamas honeypot operation foiled by the Israeli military and the Shin Bet (Israel Security Service) since 2017."


Here is Noa D. The temptress. Hamas operative and purports to be a recent immigrant to Israel and is having trouble with her Hebrew. Can the soldier help [of course he can!!]? Noa not too bad really. If I was fifty years younger I might go for it myself. Does she shave her armpits? You download to your smart phone the image of  Noa and get a virus installed on the phone as well. A virus that allows Hamas to gather intelligence without you the unwitting soldier even realizing so.

NO MATTER HOW MANY TIMES YOU WARN THE TROOPS ABOUT THIS TYPE OF STUFF AND TO AVOID IN ALL INSTANCES IT NEVER ENDS.

See previous blog entries as germane:

https://militaryanalysis.blogspot.com/2019/06/honey.html

https://militaryanalysis.blogspot.com/2019/04/telefon.html

https://militaryanalysis.blogspot.com/2019/03/track.html

coolbert.





No comments: