Along with bloodlust and brawn, Hamas proved this week that it also has brains, at least where its enemies’ weaknesses are concerned. But even though the terrorist organization that controls the Gaza Strip has grown quite proficient at using the internet to incite violence against Jews, it clearly is still no match for Israel in the realm of cyberspace.
Unbeknownst to the Israeli public until Tuesday, while Hamas was distributing candy in the streets of Gaza to celebrate Sunday’s truck-ramming attack — which killed four IDF soldiers who were about to embark on an educational field trip — the Islamist goons had been engaged in a clever sting operation to obtain classified information from the Israeli military.
Posing as beautiful girls on social media, with enticing photos and hip Hebrew lingo, Hamas cyber operatives succeeded in seducing boys in uniform.
As in the documentary film and later MTV series “Catfish,” these young guys believed that the scantily clad women they were chatting, flirting and exchanging messages with were genuine bombshells, and even potential girlfriends. Well, until the “girls” stopped responding, that is, as soon as they got their targets to download a certain app, which was actually spyware.
According to the IDF blog, this app “can turn a mobile device into an open book — leaving contacts, location, apps, pictures and files accessible … [and] can stream video from the camera and audio from the microphone.”
This was a case, the blog said, of Hamas using a weapon that was not a bomb, gun or vehicle, but rather a simple friend request.
It is not clear how many soldiers initially fell for the trap, but the scheme was uncovered by the IDF Military Intelligence Directorate’s Information Security Department when complaints of other suspicious online activity were lodged. In the process of investigating those issues, the Hamas “honey plot” was uncovered.
To counteract such threats, which the IDF reported happily resulted in no security breaches, a campaign has been launched to warn soldiers about cyber entrapment and provide guidelines for those whose phones have already been compromised.
Meanwhile, the IDF may expand its social media rules for soldiers to forbid them from revealing any information about their military service over the internet.
The irony of this foiled attempt on the part of Hamas is two-fold. In the first place, one of the aspects of Western democracies that the Islamist terrorist organization aims to eradicate by way of the sword is the freedom of men and women to behave as they wish, consensually, anywhere from the boardroom to the bedroom.