Israel police, security breach, Iran spy

Severe Security Incident: 3 Israelis working for Iran

Shin Bet reveals a severe security breach: Israeli citizens were recruited to carry out missions for Iranian intelligence agencies. Three suspects were arrested in connection with the operation, and one of them has been formally charged.

Cyber attack from Iran (photo: Dubo/shutterstock)

The investigation revealed that Sharon agreed to execute the tasks, excluding murder and arson. For the execution of the missions, concealing awareness, and transferring packages, two additional Israeli citizens were recruited in exchange for financial compensation from ANNA ELENA in cryptocurrency.

Today, the Jerusalem District Attorney's Office filed charges against the suspect in the Jerusalem District Court, accusing him of communicating with a foreign agent. The two additional recruited citizens were investigated and released from custody upon completion of their questioning until a decision is made regarding their case.

The use of this method, involving social media networks, under false pretences regarding the identity of the contacting entity, is a well-known modus operandi of Iranian intelligence agencies. This method, as a platform for recruiting Israelis to carry out ostensibly innocent tasks, constitutes a convenient and readily available platform for real threats to national security. In recent months, numerous fictitious profiles used by Iranian security operatives have been identified and monitored, accumulating substantial information about the entities behind their operations.

These solicitations were conducted through social media platforms and job opportunity websites, operating across all social networks, including Instagram, Telegram, WhatsApp, Facebook, and Twitter (X), while presenting a false pretence to Israeli citizens for initial contact. These approaches were made in various languages, including Hebrew and English.

Furthermore, widespread dissemination of messages was identified, encompassing similar coverage, including links leading to the Telegram channel directing to the "International Security Agency of Iran" website. Many Israeli citizens who received these suspicious approaches refrained from responding and even reported them to relevant authorities.

Shin Bet Iran Israel at war Hezbollah Israel cyber attack

Comments

Do not send comments that include inflammatory words, defamation and content that exceeds the limit of good taste.

The comment was sent successfully.
Soon the response will be examined by our editors and if it is found to be correct it will be published on the website.
The comment was sent successfully.
Soon the response will be examined by our editors and if it is found to be correct it will be published on the website.


Less evil in the world now- thanks to Israel

Commander of Islamic Jihad's rocket unit eliminated by IDF 
Avi Nachmani | 08:27

Gallant blasts ICCs' decision on arrest warrant

Gallant on the arrest warrant against him: "The court's decision will be remembered for eternity"
Eliana Fleming, JFeed Staff | 21.11.24

Identity of victim of rocket attack earlier today

Released for publication: Brian Director is the victim of the rocket attack in Nahariya
Eliana Fleming, JFeed Staff | 21.11.24

Imminent Hostage Deal?

BREAKING: Highest chance for hostage deal since October '23
Gila Isaacson | 21.11.24

Baruch Dayan Haemet

WATCH IT LIVE: Israeli archeologist Zeev Erlich is laid to rest
Gila Isaacson | 21.11.24

Israeli airstrike in Syria

What was the target? More details about the unusual attack in Syria
Eliana Fleming, JFeed Staff | 21.11.24