Online we have many documents that Hamas collected as part of their spying operations on over 2,000 Israeli army soldiers. Will the data leak impact how a fight grows?
The collection consists of more than two thousand PDF files, all with the same layout, olive green pages, and the terrorist group’s military wing, Kassam Brigades, on them.The names of Israeli soldiers are contained in each of these files.
Along with the names of mothers, fathers, girlfriends, and boyfriends, it also includes the date of birth, national ID card number, phone number, and email address. Misused information can be used to locate, trick, intimidate, or control people.
Passwords, licence plates for cars, credit card numbers, and bank account details, occasionally.
Each cover sheet contains the same Arabic statement, “For revenge on the killers of the children of Gaza,” which explains why Hamas collected the information. Here, “they” mean the Israeli army, which has been fighting Hamas in the Gaza Strip for the past eight months.
The data set has been evaluated by an international research team that consists of the Israeli daily Ha’aretz, the Austrian newspaper Standard, ZEIT, and ZDF. It not only shows that Hamas is participating in massive enemy monitoring on the Internet, but it also raises the possibility that the data of Israeli army (IDF) workers may not be sufficiently safeguarded.
There are around 211,000 individuals in all. DIE ZEIT has not disclosed any personal data from the files so as not to put the people affected in danger.
The study claims that Hamas has been gathering information on Israeli military members for a long time. Midway through December 2023, the PDF files started to surface online on different websites that provided data stolen from hacking activities. The materials are credited to one of the hacker groups, Ganosec, for being originally distributed.
The more than 2,000 documents were released the Sunday before last by the hacker collective Distributed Denial of Secrets (DDoSecrets). These are “intelligence files,” many of which have the Qassam Brigades of Hamas marked on them. The information was previously made public by a hacker collective known as the “Ganosec Team” that claimed to be from Indonesia last year.
The material in the documents was obtained through hacks or leaks, most likely from “civilian” website servers, as well as from social media, open databases, and earlier disclosures. An automated instrument known as a profiler, which facilitates the gathering, comparing, and integrating of open-source intelligence (OSINT) data to create full descriptions of intelligence targets, made the development of the papers possible.