#open source intelligence cyber security
Explore tagged Tumblr posts
Text
As cyber threats grow in volume and sophistication, relying solely on internal defenses is no longer enough. OSINT adds an external perspective, helping organizations uncover blind spots and take proactive measures. Whether used for vulnerability scanning, threat monitoring, or investigative research, open-source intelligence can significantly enhance your cyber defense. By understanding how open source intelligence cyber security works and implementing it ethically, businesses can stay a step ahead in the ever-evolving digital threat landscape.
0 notes
Text
Harry Davies, Bethan McKernan, Yuval Abraham, and Meron Rapoport at The Guardian:
When the chief prosecutor of the international criminal court (ICC) announced he was seeking arrest warrants against Israeli and Hamas leaders, he issued a cryptic warning: “I insist that all attempts to impede, intimidate or improperly influence the officials of this court must cease immediately.” Karim Khan did not provide specific details of attempts to interfere in the ICC’s work, but he noted a clause in the court’s foundational treaty that made any such interference a criminal offence. If the conduct continued, he added, “my office will not hesitate to act”. The prosecutor did not say who had attempted to intervene in the administration of justice, or how exactly they had done so. Now, an investigation by the Guardian and the Israeli-based magazines +972 and Local Call can reveal how Israel has run an almost decade-long secret “war” against the court. The country deployed its intelligence agencies to surveil, hack, pressure, smear and allegedly threaten senior ICC staff in an effort to derail the court’s inquiries.
Israeli intelligence captured the communications of numerous ICC officials, including Khan and his predecessor as prosecutor, Fatou Bensouda, intercepting phone calls, messages, emails and documents. The surveillance was ongoing in recent months, providing Israel’s prime minister, Benjamin Netanyahu, with advance knowledge of the prosecutor’s intentions. A recent intercepted communication suggested that Khan wanted to issue arrest warrants against Israelis but was under “tremendous pressure from the United States”, according to a source familiar with its contents. Bensouda, who as chief prosecutor opened the ICC’s investigation in 2021, paving the way for last week’s announcement, was also spied on and allegedly threatened. Netanyahu has taken a close interest in the intelligence operations against the ICC, and was described by one intelligence source as being “obsessed” with intercepts about the case. Overseen by his national security advisers, the efforts involved the domestic spy agency, the Shin Bet, as well as the military’s intelligence directorate, Aman, and cyber-intelligence division, Unit 8200. Intelligence gleaned from intercepts was, sources said, disseminated to government ministries of justice, foreign affairs and strategic affairs.
A covert operation against Bensouda, revealed on Tuesday by the Guardian, was run personally by Netanyahu’s close ally Yossi Cohen, who was at the time the director of Israel’s foreign intelligence agency, the Mossad. At one stage, the spy chief even enlisted the help of the then president of the Democratic Republic of the Congo, Joseph Kabila. Details of Israel’s nine-year campaign to thwart the ICC’s inquiry have been uncovered by the Guardian, an Israeli-Palestinian publication +972 Magazine and Local Call, a Hebrew-language outlet. The joint investigation draws on interviews with more than two dozen current and former Israeli intelligence officers and government officials, senior ICC figures, diplomats and lawyers familiar with the ICC case and Israel’s efforts to undermine it. Contacted by the Guardian, a spokesperson for the ICC said it was aware of “proactive intelligence-gathering activities being undertaken by a number of national agencies hostile towards the court”. They said the ICC was continually implementing countermeasures against such activity, and that “none of the recent attacks against it by national intelligence agencies” had penetrated the court’s core evidence holdings, which had remained secure.
A spokesperson for Israel’s prime minister’s office said: “The questions forwarded to us are replete with many false and unfounded allegations meant to hurt the state of Israel.” A military spokesperson added: “The IDF [Israel Defense Forces] did not and does not conduct surveillance or other intelligence operations against the ICC.” Since it was established in 2002, the ICC has served as a permanent court of last resort for the prosecution of individuals accused of some of the world’s worst atrocities. It has charged the former Sudanese president Omar al-Bashir, the late Libyan president Muammar Gaddafi and most recently, the Russian president, Vladimir Putin. Khan’s decision to seek warrants against Netanyahu and his defence minister, Yoav Gallant, along with Hamas leaders implicated in the 7 October attack, marks the first time an ICC prosecutor has sought arrest warrants against the leader of a close western ally.
[...] That “war” commenced in January 2015, when it was confirmed that Palestine would join the court after it was recognised as a state by the UN general assembly. Its accession was condemned by Israeli officials as a form of “diplomatic terrorism”. One former defence official familiar with Israel’s counter-ICC effort said joining the court had been “perceived as the crossing of a red line” and “perhaps the most aggressive” diplomatic move taken by the Palestinian Authority, which governs the West Bank. “To be recognised as a state in the UN is nice,” they added. “But the ICC is a mechanism with teeth.” [...] Israel, like the US, Russia and China, is not a member. After Palestine’s acceptance as an ICC member, any alleged war crimes – committed by those of any nationality – in occupied Palestinian territories now fell under Bensouda’s jurisdiction.
The Guardian's report on how Israel led a 9-year intimidation war campaign against the ICC is a must-read.
#Israel#ICC#International Criminal Court#Benjamin Netanyahu#Karim Khan#Fatou Bensouda#Occupation of Palestine
37 notes
·
View notes
Text
You’ve been asked to serve on the jury in the first-ever criminal prosecution of a United States president. What could possibly go wrong? The answer, of course, is everything.
A juror in former president Donald Trump’s ongoing criminal trial in New York was excused on Thursday after voicing fears that she could be identified based on biographical details that she had given in court. The dismissal of Juror 2 highlights the potential dangers of participating in one of the most politicized trials in US history, especially in an age of social media frenzies, a highly partisan electorate, and a glut of readily available personal information online.
Unlike jurors in federal cases, whose identities can be kept completely anonymous, New York law allows—and can require—the personal information of jurors and potential jurors to be divulged in court. Juan Merchan, the judge overseeing Trump’s prosecution in Manhattan, last month ordered that jurors’ names and addresses would be withheld. But he could not prevent potential jurors from providing biographical details about themselves during the jury selection process, and many did. Those details were then widely reported in the press, potentially subjecting jurors and potential jurors to harassment, intimidation, and threats—possibly by Trump himself. Merchan has since blocked reporters from publishing potential jurors’ employment details.
The doxing dangers that potential jurors face became apparent on Monday, day one of the proceedings. An update in a Washington Post liveblog about Trump’s trial revealed the Manhattan neighborhood where one potential juror lived, how long he’d lived there, how many children he has, and the name of his employer. Screenshots of the liveblog update quickly circulated on social media, as people warned that the man could be doxed, or have his identity revealed publicly against his will with the intent to cause harm, based solely on that information.
“It's quite alarming how much information someone skilled in OSINT could potentially gather based on just a few publicly available details about jurors or potential jurors,” says Bob Diachenko, cyber intelligence director at data-breach research organization Security Discovery and an expert in open source intelligence research.
Armed with basic personal details about jurors and certain tools and databases, “an OSINT researcher could potentially uncover a significant amount of personal information by cross-referencing all this together,” Diachenko says. “That's why it's crucial to consider the implications of publicly revealing jurors' personal information and take steps to protect their privacy during criminal trials.”
Even without special OSINT training, it can be trivial to uncover details about a juror’s life. To test the sensitivity of the information the Post published, WIRED used a common reporting tool to look up the man’s employer. From there, we were able to identify his name, home address, phone number, email address, his children’s and spouse’s identities, voter registration information, and more. The entire process took roughly two minutes. The Post added a clarification to its liveblog explaining that it now excludes the man’s personal details.
The ready availability of those details illustrates the challenges in informing the public about a highly newsworthy criminal case without interfering in the justice process, says Kathleen Bartzen Culver, the James E. Burgess Chair in Journalism Ethics and director of the School of Journalism & Mass Communication at the University of Wisconsin-Madison.
“Simply because a notable figure is on trial does not mean that a juror automatically surrenders any claim to privacy,” Bartzen Culver says. “People who have been drawn into a case that is exceptionally newsworthy are not aware that a simple statement that they make about where they work might identify them and open them up to scrutiny and possibly risk.”
The dangers to jurors or potential jurors has only increased since the first day of jury selection, which remains ongoing, in part due to the challenges of prosecuting a former US president and the presumptive Republican nominee in the 2024 US presidential election. Trump is charged with 34 counts of falsifying business records, a class E felony in New York state, for payments made ahead of the 2016 presidential election related to alleged affairs with two women, adult performer Stormy Daniels and Playboy model Karen McDougal. Trump has claimed his prosecution is a “communist show trial” and a “witch hunt” and has pleaded not guilty.
On Fox News, coverage of Trump’s trial has repeatedly focused on the potential political motivations of the jurors, bolstering the former president’s claims. Trump, in turn, has repeated the claims by the conservative news network’s hosts. In a post on Truth Social on Wednesday, Trump quoted Fox News commentator Jesse Watters claiming on air that potential jurors in Trump’s trial are “undercover liberal activists lying to the judge in order to get on the Trump jury.” This, despite a gag order that forbids Trump from “making or directing others to make public statements about any prospective juror or any juror in this criminal proceeding.”
Broader media coverage of the Trump trial jurors appears to often be the work of political reporters who are unfamiliar with the journalism ethics specific to covering a criminal trial, says UW-Madison’s Bartzen Culver. “It's like when political reporters covered Covid and science journalists lost their minds.” She adds that it’s important for any journalist covering a criminal case—Trump’s or otherwise—to “consider our role within the justice system.”
“Unethical behavior by journalists can delay trials. It can result in overturned convictions and the people having to go back and do a retrial,” Bartzen Culver says. “That all works against our system of justice.”
The New York case is one of four ongoing criminal proceedings against Trump. In Georgia, where he faces multiple felony charges for alleged attempts to interfere with the state’s electoral process in 2020, Trump supporters leaked the addresses of members of the grand jury, after their names were listed in the 98-page indictment against the former president, as required by state law. Georgia’s Fulton County Sheriff’s Office said last August that it was investigating threats against the jury members. The incident highlights the persistent dangers people can face from Trump’s supporters, both in the near term and for the rest of their lives, if they’re viewed as having acted against him.
The leaks were discovered by Advance Democracy Inc. (ADI), a nonpartisan, nonprofit research and investigations organization founded by Daniel J. Jones, a former investigator for the FBI and the US Senate Intelligence Committee. So far, Jones tells WIRED, ADI has not uncovered attempts to dox jurors in Trump’s New York trial. But it’s still early days.
“We have not yet found identifying information on the extremist forums we monitor,” Jones says. “Having said that, I share your concern that it is only a matter of time before this happens.”
41 notes
·
View notes
Text
also recommend reading this article from 2024:
[…] Megiddo stated that “the Israel-Azerbaijan relationship relies on an unholy trinity of oil, arms and intelligence. Israel buys oil from Azerbaijan (about half of Israel’s crude oil originates there), and sells it advanced military equipment. In return, Azerbaijan reportedly gives it access to its land and sea border with Israel’s number one rival: Iran.”
Azerbaijan was victorious in the Artsakh wars of 2020 and 2023, “thanks in no small part to game-changing weaponry supplied by Israel,” including the Israeli Hermes and Harop drones and other sophisticated weapons bought for billions of dollars. “Azerbaijan purchased some of these drones while Lieberman was Defense Minister,” the article says.
During Lieberman’s visit to Baku in 2012, he was asked about a Foreign Policy magazine article that quoted a senior U.S. government official as saying, “The Israelis have bought an airfield, and the airfield is called Azerbaijan. The names of several former Soviet air force bases were mentioned that, according to the magazine’s sources, were or would be placed at Israel’s disposal in anticipation of a possible airstrike” on Iran. Lieberman called the story “science fiction” that has “no connection to reality.” However, The Times of London reported that the “Israeli espionage agency Mossad has a base in Azerbaijan.”
[…] Megiddo reported that Lieberman’s two sons – Amos and Kobi – have a “deep business relationship” with Azerbaijan’s government. “The Lieberman brothers, it turns out, spend a lot of time in Baku, where they are considered intermediaries who know how to open doors to the government. In recent years, Lieberman’s sons have marketed a number of Israeli high-tech products to the government of Azerbaijan: a cyberoffense product made by the cybersecurity company Candiru; a big data system for improving tax collection by another cybersecurity firm, Rayzone; and water desalination technologies by the Israeli company IDE. The potential commissions from brokering these three ventures alone could reach millions of dollars. Additionally, until recently, the Lieberman brothers represented Azerbaijan Airlines (the national flag carrier controlled by the state) in Israel.”
Several Israeli firms like Pegasus and Candiru sold spyware to Azerbaijan to hack the phones of the regime’s opponents. Today, 18 Azeri journalists are in jail. The Candiru sale was mediated by Lieberman’s two sons in exchange for a commission “estimated at hundreds of thousands of dollars.” From a deal with cyber firm Rayzone, they earned “a commission of about $200,000,” according to ‘TheMarker,’ published by Haaretz. Lieberman’s office stated that “he is not involved in his children’s businesses.”
[…] Megiddo concluded: “There’s probably no one within the Israeli establishment who would dispute the many benefits Israel derives from its ugly but perhaps vital relationship with Azerbaijan. But there is no contradiction between these two statements: the warm relations with the morally dubious rule of President Ilham Aliyev can be part of an Israeli national security strategy, and at the same time also part of the Lieberman family’s business strategy.”
5 notes
·
View notes
Text
AN OPEN LETTER to THE PRESIDENT & U.S. CONGRESS
Urgently Investigate IDF's AI War on Gaza
39 so far! Help us get to 50 signers!
President Biden, esteemed members of Congress,
I write to address a matter of paramount importance concerning recent developments in artificial intelligence (AI) and military strategy, particularly regarding the Israel Defense Forces (IDF) and Unit 8200.
The recent unmasking of Yossi Sariel, allegedly the head of Unit 8200 and the mastermind behind the IDF's AI strategy, highlights a critical security lapse on his part. Sariel's true identity was revealed online after the publication of "The Human Machine Team," a book he authored under a pseudonym. This book presents a groundbreaking vision for AI's role in reshaping the dynamic between military personnel and machines.
This revelation not only exposes the depth of AI integration within the IDF but also underscores its potential implications for global security. Published in 2021, it outlines sophisticated AI-powered systems reportedly deployed by the IDF during recent conflicts, including the prolonged Gaza war.
We understand that this book is the blueprint for Israel's war on Gaza!
The deployment of AI in warfare raises profound ethical, legal, and strategic questions, especially given the significant loss of life and destruction it has caused. It is imperative to thoroughly examine the implications of AI in military operations.
Hence, I implore you to launch a comprehensive investigation into both the IDF's AI practices and Unit 8200's security protocols. This inquiry should evaluate the impact of AI on warfare, assess potential risks and benefits, and propose guidelines for responsible AI implementation in military contexts.
Such an investigation will not only foster transparency and accountability within the IDF but also inform broader discussions on regulating AI in international security. Proactive measures are essential to mitigate the risks associated with AI proliferation in military settings.
The use of AI and machine learning in armed conflict carries significant humanitarian, legal, ethical, and security implications. With AI rapidly integrating into military systems, it is vital for states to address specific risks to individuals affected by armed conflict.
Among the myriad implications, key risks include the escalation of autonomous weapons' threat, heightened harm to civilians and civilian infrastructure from cyber operations and information warfare, and the potential compromise of human decision-making quality in military contexts.
Preserving effective human control and judgment in AI use, including machine learning, for decisions impacting human life is paramount. Legal obligations and ethical responsibilities in warfare must not be delegated to machines or software.
Your urgent attention to these concerns, without delay, is imperative. I await your prompt response.
▶ Created on April 5 by Fatima
📱 Text SIGN PZNRHY to 50409
🤯 Liked it? Text FOLLOW FREEPALESTINE to 50409
[Source:]
#PZNRHY#FREEPALESTINE#resistbot#From the river to the sea Palestine will be free#Palestine#Israel#Palestinian Statehood#Middle East#Israeli Palestinian Conflict#Human Rights#Free Palestine#Gaza#West Bank#Occupation#Peace#International Relations#United Nations#Middle East Conflict#Arab World#Jerusalem#West Bank Settlements#UN Resolution#World Events#Foreign Policy#Global Affairs#Diplomacy#Refugees#Middle East Peace#Humanitarian Crisis#Security Council
2 notes
·
View notes
Text
Technocrats in China love fellow Technocrats Mark Zuckerberg and his wife, Priscilla Chan, who both speak fluent Mandarin Chinese. Zuckerberg’s Meta produces the Llama AI model as open source, meaning it can be downloaded in full for free by anybody, anywhere, for any purpose. This paper details how the Chinese military is having a heyday adapting Llama from top to bottom.
According to the report, the adapting process poses challenges:
PLA experts have implemented different techniques involving advanced data collection, computational techniques, and algorithmic improvements. These efforts have enabled Llama to adapt to understand Chinese-language military terminology and tactics.
What does Zuckerberg think about China weaponizing Llama to use against America, the world and its own people? Crickets. ⁃ Patrick Wood, Editor
Executive Summary:
Researchers in the People’s Republic of China (PRC) have optimized Meta’s Llama model for specialized military and security purposes.
ChatBIT, an adapted Llama model, appears to be successful in demonstrations in which it was used in military contexts such as intelligence, situational analysis, and mission support, outperforming other comparable models.
Open-source models like Llama are valuable for innovation, but their deployment to enhance the capabilities of foreign militaries raises concerns about dual-use applications. The customization of Llama by defense researchers in the PRC highlights gaps in enforcement for open-source usage restrictions, underscoring the need for stronger oversight to prevent strategic misuse.
In September, the former deputy director of the Academy of Military Sciences (AMS), Lieutenant General He Lei (何雷), called for the United Nations to establish restrictions on the application of artificial intelligence (AI) in warfare (Sina Finance, September 13). This would suggest that Beijing has an interest in mitigating the risks associated with military AI. Instead, the opposite is true. The People’s Republic of China (PRC) is currently leveraging AI to enhance its own military capabilities and strategic advantages and is using Western technology to do so.
The military and security sectors within the PRC are increasingly focused on integrating advanced AI technologies into operational capabilities. Meta’s open-source model Llama (Large Language Model Meta AI) has emerged as a preferred model on which to build out features tailored for military and security applications. In this way, US and US-derived technology is being deployed as a tool to enhance the PRC’s military modernization and domestic innovation efforts, with direct consequences for the United States and its allies and partners.
PLA Experts’ Vision for Military AI
The PRC’s 2019 National Defense White Paper, titled “China’s National Defense for the New Era (新时代的中国国防),” notes that modern warfare is shifting toward increasingly informationized (信息化) and intelligentized (智能化) domains, demanding advances in mechanization, informationization, and AI development (Xinhua, July 24, 2019).
AI development in the military has accelerated in direct response to the demands of intelligent warfare, which itself has been propelled by recent technological advances. Experts from AMS and the People’s Liberation Army (PLA) have highlighted several key capabilities that AI systems must achieve to meet the PLA’s evolving military needs. First, large AI models must enable rapid response and decision-making to enhance battlefield situational awareness and support command functions. This includes autonomous mission planning and assisting commanders in making informed decisions under complex conditions. Strengthening the fusion of information from multiple sources is also seen as crucial, using AI to integrate data from satellite feeds, cyber intelligence, and communication intercepts. This is then used to deepen intelligence analysis and support joint operations, as highlighted by the PLA Joint Operation Outline (中国人民解放军联合作战纲要), which entered its trial implementation phase in 2020 (MOD, November 26, 2020). [1]
2 notes
·
View notes
Text
Effective Intelligence Gathering and Cryptocurrency Recovery Solutions by Admkltd

In today's rapidly evolving digital landscape, intelligence gathering techniques are more critical than ever for ensuring the security and privacy of individuals and organizations alike. With the rising prevalence of cyber threats, having a robust strategy for gathering intelligence can make the difference between safeguarding sensitive information and falling victim to malicious attacks. At the forefront of these solutions is Admkltd, a company renowned for its expertise in providing top-notch crypto asset recovery services.
Intelligence gathering techniques encompass a broad spectrum of methods used to collect, analyze, and utilize information for decision-making purposes. These techniques are vital not only for governments and large corporations but also for individuals looking to protect their digital assets. From open-source intelligence (OSINT) to human intelligence (HUMINT), the goal is to gather relevant data that can be used to anticipate and mitigate potential threats.
One area where these techniques are particularly crucial is in the realm of cryptocurrency. As digital currencies gain popularity, they also attract cybercriminals looking to exploit vulnerabilities. Whether through phishing scams, hacking, or other illicit methods, crypto assets can be stolen or lost, leaving individuals in dire need of recovery solutions. This is where Admkltd comes in, offering the best crypto recovery service available in the market.
Admkltd has built a solid reputation by leveraging advanced intelligence gathering techniques to track and recover stolen or lost crypto assets. Their team of experts uses a combination of blockchain analysis, cybersecurity measures, and forensic investigations to locate and retrieve digital currencies. Whether you've lost access to your wallet, fallen victim to a scam, or had your assets stolen, Admkltd's crypto asset recovery service is designed to help you regain control of your digital investments.
Read Also
The company's commitment to providing the best crypto recovery service is evident in its success rate and the trust it has garnered from clients worldwide. Admkltd understands the complexities of the cryptocurrency market and the ever-evolving tactics used by cybercriminals. By staying ahead of these threats through continuous research and the application of cutting-edge intelligence gathering techniques, they ensure that their clients' assets are recovered efficiently and securely.
In conclusion, as the digital world continues to expand, the need for reliable intelligence gathering techniques and crypto asset recovery services becomes increasingly important. Admkltd stands out as a leader in this field, offering unparalleled expertise and the best crypto recovery service to protect your digital investments. Whether you're an individual or an organization, partnering with Admkltd ensures that your assets are safeguarded against the growing threat of cybercrime.
2 notes
·
View notes
Text






4 September 2023: Crown Prince Hussein attended the opening of the Artificial Intelligence in Defence Technologies and Cyber Security Exhibition and Conference (AIDTSEC 2023) at the King Hussein bin Talal Convention Centre at the Dead Sea.
The conference and exhibition showcases the latest technologies and developments in AI, aimed at finding dynamic solutions for operations in defence, cyber security, and big data analysis and protection. (Source: Petra)
Speaking at the opening, Assistant to the Chairman of the Joint Chiefs of Staff for Planning and Defence Resources Brig. Gen. Tawfiq Marzouq said there is a global need for cooperation and expertise exchange to counter major threats related to data and information security.
For his part, National Cybersecurity Centre Director Bassam Maharmeh said AI models can help pre-empt threats and crises, noting that the centre employs AI tools in various operations.
The AIDTSEC 2023 conference, first launched two years ago, is aimed at the exchange of expertise between innovators, experts, and start-ups working in defence AI and cyber security technologies.
A number of ministers and senior officers and officials attended the opening ceremony.
7 notes
·
View notes
Text
Exclusive: Investigation reveals how intelligence agencies tried to derail war crimes prosecution, with Netanyahu ‘obsessed’ with intercepts
When the chief prosecutor of the international criminal court (ICC) announced he was seeking arrest warrants against Israeli and Hamas leaders, he issued a cryptic warning: “I insist that all attempts to impede, intimidate or improperly influence the officials of this court must cease immediately.”
Karim Khan did not provide specific details of attempts to interfere in the ICC’s work, but he noted a clause in the court’s foundational treaty that made any such interference a criminal offence. If the conduct continued, he added, “my office will not hesitate to act”.
The prosecutor did not say who had attempted to intervene in the administration of justice, or how exactly they had done so.
Now, an investigation by the Guardian and the Israeli-based magazines +972 and Local Call can reveal how Israel has run an almost decade-long secret “war” against the court. The country deployed its intelligence agencies to surveil, hack, pressure, smear and allegedly threaten senior ICC staff in an effort to derail the court’s inquiries.
Israeli intelligence captured the communications of numerous ICC officials, including Khan and his predecessor as prosecutor, Fatou Bensouda, intercepting phone calls, messages, emails and documents.
The surveillance was ongoing in recent months, providing Israel’s prime minister, Benjamin Netanyahu, with advance knowledge of the prosecutor’s intentions. A recent intercepted communication suggested that Khan wanted to issue arrest warrants against Israelis but was under “tremendous pressure from the United States”, according to a source familiar with its contents.
Bensouda, who as chief prosecutor opened the ICC’s investigation in 2021, paving the way for last week’s announcement, was also spied on and allegedly threatened.
Netanyahu has taken a close interest in the intelligence operations against the ICC, and was described by one intelligence source as being “obsessed” with intercepts about the case. Overseen by his national security advisers, the efforts involved the domestic spy agency, the Shin Bet, as well as the military’s intelligence directorate, Aman, and cyber-intelligence division, Unit 8200. Intelligence gleaned from intercepts was, sources said, disseminated to government ministries of justice, foreign affairs and strategic affairs.
A covert operation against Bensouda, revealed on Tuesday by the Guardian, was run personally by Netanyahu’s close ally Yossi Cohen, who was at the time the director of Israel’s foreign intelligence agency, the Mossad. At one stage, the spy chief even enlisted the help of the then president of the Democratic Republic of the Congo, Joseph Kabila.
Details of Israel’s nine-year campaign to thwart the ICC’s inquiry have been uncovered by the Guardian, an Israeli-Palestinian publication +972 Magazine and Local Call, a Hebrew-language outlet.
The joint investigation draws on interviews with more than two dozen current and former Israeli intelligence officers and government officials, senior ICC figures, diplomats and lawyers familiar with the ICC case and Israel’s efforts to undermine it.
Contacted by the Guardian, a spokesperson for the ICC said it was aware of “proactive intelligence-gathering activities being undertaken by a number of national agencies hostile towards the court”. They said the ICC was continually implementing countermeasures against such activity, and that “none of the recent attacks against it by national intelligence agencies” had penetrated the court’s core evidence holdings, which had remained secure.
A spokesperson for Israel’s prime minister’s office said: “The questions forwarded to us are replete with many false and unfounded allegations meant to hurt the state of Israel.” A military spokesperson added: “The IDF [Israel Defense Forces] did not and does not conduct surveillance or other intelligence operations against the ICC.”
Since it was established in 2002, the ICC has served as a permanent court of last resort for the prosecution of individuals accused of some of the world’s worst atrocities. It has charged the former Sudanese president Omar al-Bashir, the late Libyan president Muammar Gaddafi and most recently, the Russian president, Vladimir Putin.
Khan’s decision to seek warrants against Netanyahu and his defence minister, Yoav Gallant, along with Hamas leaders implicated in the 7 October attack, marks the first time an ICC prosecutor has sought arrest warrants against the leader of a close western ally.
The allegations of war crimes and crimes against humanity that Khan has levelled against Netanyahu and Gallant all relate to Israel’s eight-month war in Gaza, which according to the territory’s health authority has killed more than 35,000 people.
But the ICC case has been a decade in the making, inching forward amid rising alarm among Israeli officials at the possibility of arrest warrants, which would prevent those accused from travelling to any of the court’s 124 member states for fear of arrest.
It is this spectre of prosecutions in The Hague that one former Israeli intelligence official said had led the “entire military and political establishment” to regard the counteroffensive against the ICC “as a war that had to be waged, and one that Israel needed to be defended against. It was described in military terms.”
That “war” commenced in January 2015, when it was confirmed that Palestine would join the court after it was recognised as a state by the UN general assembly. Its accession was condemned by Israeli officials as a form of “diplomatic terrorism”.
One former defence official familiar with Israel’s counter-ICC effort said joining the court had been “perceived as the crossing of a red line” and “perhaps the most aggressive” diplomatic move taken by the Palestinian Authority, which governs the West Bank. “To be recognised as a state in the UN is nice,” they added. “But the ICC is a mechanism with teeth.” A hand-delivered threat
For Fatou Bensouda, a respected Gambian lawyer who was elected the ICC’s chief prosecutor in 2012, the accession of Palestine to the court brought with it a momentous decision. Under the Rome statute, the treaty that established the court, the ICC can exercise its jurisdiction only over crimes within member states or by nationals of those states.
Israel, like the US, Russia and China, is not a member. After Palestine’s acceptance as an ICC member, any alleged war crimes – committed by those of any nationality – in occupied Palestinian territories now fell under Bensouda’s jurisdiction.
On 16 January 2015, within weeks of Palestine joining, Bensouda opened a preliminary examination into what in the legalese of the court was called “the situation in Palestine”. The following month, two men who had managed to obtain the prosecutor’s private address turned up at her home in The Hague.
Sources familiar with the incident said the men declined to identify themselves when they arrived, but said they wanted to hand-deliver a letter to Bensouda on behalf of an unknown German woman who wanted to thank her. The envelope contained hundreds of dollars in cash and a note with an Israeli phone number.
Sources with knowledge of an ICC review into the incident said that while it was not possible to identify the men, or fully establish their motives, it was concluded that Israel was likely to be signalling to the prosecutor that it knew where she lived. The ICC reported the incident to Dutch authorities and put in place additional security, installing CCTV cameras at her home.
The ICC’s preliminary inquiry in the Palestinian territories was one of several such fact-finding exercises the court was undertaking at the time, as a precursor to a possible full investigation. Bensouda’s caseload also included nine full investigations, including into events in DRC, Kenya and the Darfur region of Sudan.
Officials in the prosecutor’s office believed the court was vulnerable to espionage activity and introduced countersurveillance measures to protect their confidential inquiries.
In Israel, the prime minister’s national security council (NSC) had mobilised a response involving its intelligence agencies. Netanyahu and some of the generals and spy chiefs who authorised the operation had a personal stake in its outcome.
Unlike the international court of justice (ICJ), a UN body that deals with the legal responsibility of nation states, the ICC is a criminal court that prosecutes individuals, targeting those deemed most responsible for atrocities.
Multiple Israeli sources said the leadership of the IDF wanted military intelligence to join the effort, which was being led by other spy agencies, to ensure senior officers could be protected from charges. “We were told that senior officers are afraid to accept positions in the West Bank because they are afraid of being prosecuted in The Hague,” one source recalled.
Two intelligence officials involved in procuring intercepts about the ICC said the prime minister’s office took a keen interest in their work. Netanyahu’s office, one said, would send “areas of interests” and “instructions” in relation to the monitoring of court officials. Another described the prime minister as “obsessed” with intercepts shedding light on the activities of the ICC.
Hacked emails and monitored calls
Five sources familiar with Israel’s intelligence activities said it routinely spied on the phone calls made by Bensouda and her staff with Palestinians. Blocked by Israel from accessing Gaza and the West Bank, including East Jerusalem, the ICC was forced to conduct much of its research by telephone, which made it more susceptible to surveillance.
Thanks to their comprehensive access to Palestinian telecoms infrastructure, the sources said, intelligence operatives could capture the calls without installing spyware on the ICC official’s devices.
“If Fatou Bensouda spoke to any person in the West Bank or Gaza, then that phone call would enter [intercept] systems,” one source said. Another said there was no hesitation internally over spying on the prosecutor, adding: “With Bensouda, she’s black and African, so who cares?”
The surveillance system did not capture calls between ICC officials and anyone outside Palestine. However, multiple sources said the system required the active selection of the overseas phone numbers of ICC officials whose calls Israeli intelligence agencies decided to listen to.
According to one Israeli source, a large whiteboard in an Israeli intelligence department contained the names of about 60 people under surveillance – half of them Palestinians and half from other countries, including UN officials and ICC personnel.
In The Hague, Bensouda and her senior staff were alerted by security advisers and via diplomatic channels that Israel was monitoring their work. A former senior ICC official recalled: “We were made aware they were trying to get information on where we were with the preliminary examination.”
Officials also became aware of specific threats against a prominent Palestinian NGO, Al-Haq, which was one of several Palestinian human rights groups that frequently submitted information to the ICC inquiry, often in lengthy documents detailing incidents it wanted the prosecutor to consider. The Palestinian Authority submitted similar dossiers.
Such documents often contained sensitive information such as testimony from potential witnesses. Al-Haq’s submissions are also understood to have linked specific allegations of Rome statute crimes to senior officials, including chiefs of the IDF, directors of the Shin Bet, and defence ministers such as Benny Gantz.
Years later, after the ICC had opened a full investigation into the Palestine case, Gantz designated Al-Haq and five other Palestinian rights groups as “terrorist organisations”, a label that was rejected by multiple European states and later found by the CIA to be unsupported by evidence. The organisations said the designations were a “targeted assault” against those most actively engaging with the ICC.
According to multiple current and former intelligence officials, military cyber-offensive teams and the Shin Bet both systematically monitored the employees of Palestinian NGOs and the Palestinian Authority who were engaging with the ICC. Two intelligence sources described how Israeli operatives hacked into the emails of Al-Haq and other groups communicating with Bensouda’s office.
One of the sources said the Shin Bet even installed Pegasus spyware, developed by the private-sector NSO Group, on the phones of multiple Palestinian NGO employees, as well as two senior Palestinian Authority officials.
Keeping tabs on the Palestinian submissions to the ICC’s inquiry was viewed as part of the Shin Bet’s mandate, but some army officials were concerned that spying on a foreign civilian entity crossed a line, as it had little to do with military operations.
“It has nothing to do with Hamas, it has nothing to do with stability in the West Bank,” one military source said of the ICC surveillance. Another added: “We used our resources to spy on Fatou Bensouda – this isn’t something legitimate to do as military intelligence.”
Secret meetings with the ICC
Legitimate or otherwise, the surveillance of the ICC and Palestinians making the case for prosecutions against Israelis provided the Israeli government with an advantage in a secret back channel it had opened with the prosecutor’s office.
Israel’s meetings with the ICC were highly sensitive: if made public, they had the potential to undermine the government’s official position that it did not recognise the court’s authority.
According to six sources familiar with the meetings, they consisted of a delegation of top government lawyers and diplomats who travelled to The Hague. Two of the sources said the meetings were authorised by Netanyahu.
The Israeli delegation was drawn from the justice ministry, foreign ministry and the military advocate general’s office. The meetings took place between 2017 and 2019, and were led by the prominent Israeli lawyer and diplomat Tal Becker.
“In the beginning it was tense,” recalled a former ICC official. “We would get into details of specific incidents. We’d say: ‘We’re receiving allegations about these attacks, these killings,’ and they would provide us with information.”
A person with direct knowledge of Israel’s preparation for the back-channel meetings said officials in the justice ministry were furnished with intelligence that had been gleaned from Israeli surveillance intercepts before delegations arrived at The Hague. “The lawyers who dealt with the issue at the justice ministry had a big thirst for intelligence information,” they said.
For the Israelis, the back-channel meetings, while sensitive, presented a unique opportunity to directly present legal arguments challenging the prosecutor’s jurisdiction over the Palestinian territories.
They also sought to convince the prosecutor that, despite the Israeli military’s highly questionable record of investigating wrongdoing in its ranks, it had robust procedures for holding its armed forces to account.
This was a critical issue for Israel. A core ICC principle, known as complementarity, prevents the prosecutor from investigating or trying individuals if they are the subject of credible state-level investigations or criminal proceedings.
Israeli surveillance operatives were asked to find out which specific incidents might form part of a future ICC prosecution, multiple sources said, in order to enable Israeli investigative bodies to “open investigations retroactively” in the same cases.
“If materials were transferred to the ICC, we had to understand exactly what they were, to ensure that the IDF investigated them independently and sufficiently so that they could claim complementarity,” one source explained.
Israel’s back-channel meetings with the ICC ended in December 2019, when Bensouda, announcing the end of her preliminary examination, said she believed there was a “reasonable basis” to conclude that Israel and Palestinian armed groups had both committed war crimes in the occupied territories. Bensouda speaking in The Hague in December 2019, with numerous national flags behind her.
It was a significant setback for Israel’s leaders, although it could have been worse. In a move that some in the government regarded as a partial vindication of Israel’s lobbying efforts, Bensouda stopped short of launching a formal investigation.
Instead, she announced she would ask a panel of ICC judges to rule on the contentious question of the court’s jurisdiction over the Palestinian territories, due to “unique and highly contested legal and factual issues”.
Yet Bensouda had made clear she was minded to open a full investigation if the judges gave her the green light. It was against this backdrop that Israel ramped up its campaign against the ICC and turned to its top spy chief to turn up the heat on Bensouda personally.
Personal threats and a ‘smear campaign’
Between late 2019 and early 2021, as the pre-trial chamber considered the jurisdictional questions, the director of the Mossad, Yossi Cohen, intensified his efforts to persuade Bensouda not to proceed with the investigation.
Cohen’s contacts with Bensouda – which were described to the Guardian by four people familiar with the prosecutor’s contemporaneous accounts of the interactions, as well as sources briefed on the Mossad operation – had begun several years earlier.
In one of the earliest encounters, Cohen surprised Bensouda when he made an unexpected appearance at an official meeting the prosecutor was holding with the then DRC president, Joseph Kabila, in a New York hotel suite.
Sources familiar with the meeting said that after Bensouda’s staff were asked to leave the room, the director of the Mossad suddenly appeared from behind a door in a carefully choreographed “ambush”.
After the incident in New York, Cohen persisted in contacting the prosecutor, turning up unannounced and subjecting her to unwanted calls. While initially amicable, the sources said, Cohen’s behaviour became increasingly threatening and intimidating.
A close ally of Netanyahu at the time, Cohen was a veteran Mossad spymaster and had gained a reputation within the service as a skilled recruiter of agents with experience cultivating high-level officials in foreign governments.
Accounts of his secret meetings with Bensouda paint a picture in which he sought to “build a relationship” with the prosecutor as he attempted to dissuade her from pursuing an investigation that, if it went ahead, could embroil senior Israeli officials.
Three sources briefed on Cohen’s activities said they understood the spy chief had tried to recruit Bensouda into complying with Israel’s demands during the period in which she was waiting for a ruling from the pre-trial chamber.
They said he became more threatening after he began to realise the prosecutor would not be persuaded to abandon the investigation. At one stage, Cohen is said to have made comments about Bensouda’s security and thinly veiled threats about the consequences for her career if she proceeded. Contacted by the Guardian, Cohen and Kabila did not respond to requests for comment. Bensouda declined to comment.
When she was prosecutor, Bensouda formally disclosed her encounters with Cohen to a small group within the ICC, with the intention of putting on record her belief that she had been “personally threatened”, sources familiar with the disclosures said.
This was not the only way Israel sought to place pressure on the prosecutor. At around the same time, ICC officials discovered details of what sources described as a diplomatic “smear campaign”, relating in part to a close family member.
According to multiple sources, the Mossad had obtained a cache of material including transcripts of an apparent sting operation against Bensouda’s husband. The origins of the material – and whether it was genuine – remain unclear.
However, elements of the information were circulated by Israel among western diplomatic officials, sources said, in a failed attempt to discredit the chief prosecutor. A person briefed on the campaign said it gained little traction among diplomats and amounted to a desperate attempt to “besmirch” Bensouda’s reputation. Trump’s campaign against the ICC
In March 2020, three months after Bensouda referred the Palestine case to the pre-trial chamber, an Israeli government delegation reportedly held discussions in Washington with senior US officials about “a joint Israeli-American struggle” against the ICC.
One Israeli intelligence official said they regarded Donald Trump’s administration as more cooperative than that of his Democratic predecessor. The Israelis felt sufficiently comfortable to ask for information from US intelligence about Bensouda, a request the source said would have been “impossible” during Barack Obama’s tenure.
Days before the meetings in Washington, Bensouda had received authorisation from the ICC’s judges to pursue a separate investigation into war crimes in Afghanistan committed by the Taliban and both Afghan and US military personnel.
Fearing US armed forces would be prosecuted, the Trump administration was engaged in its own aggressive campaign against the ICC, culminating in the summer of 2020 with the imposition of US economic sanctions on Bensouda and one of her top officials.
Among ICC officials, the US-led financial and visa restrictions on court personnel were believed to relate as much to the Palestine investigation as to the Afghanistan case. Two former ICC officials said senior Israeli officials had expressly indicated to them that Israel and the US were working together.
At a press conference in June that year, senior Trump administration figures signalled their intention to impose sanctions on ICC officials, announcing they had received unspecified information about “financial corruption and malfeasance at the highest levels of the office of the prosecutor”.
As well as referring to the Afghanistan case, Mike Pompeo, Trump’s secretary of state, linked the US measures to the Palestine case. “It’s clear the ICC is only putting Israel in [its] crosshairs for nakedly political purposes,” he said. Months later, Pompeo accused Bensouda of having “engaged in corrupt acts for her personal benefit”. The US has never publicly provided any information to substantiate that charge, and Joe Biden lifted the sanctions months after he entered the White House.
But at the time Bensouda faced increasing pressure from an apparently concerted effort behind the scenes by the two powerful allies. As a Gambian national, she did not enjoy the political protection that other ICC colleagues from western countries had by virtue of their citizenship. A former ICC source said this left her “vulnerable and isolated”.
Cohen’s activities, sources said, were particularly concerning for the prosecutor and led her to fear for her personal safety. When the pre-trial chamber finally confirmed the ICC had jurisdiction in Palestine in February 2021, some at the ICC even believed Bensouda should leave the final decision to open a full investigation to her successor.
On 3 March, however, months before the end of her nine-year term, Bensouda announced a full investigation in the Palestine case, setting in motion a process that could lead to criminal charges, though she cautioned the next phase could take time.
“Any investigation undertaken by the office will be conducted independently, impartially and objectively, without fear or favour,” she said. “To both Palestinian and Israeli victims and affected communities, we urge patience.” Khan announces arrest warrants
When Khan took the helm at the ICC prosecutor’s office in June 2021, he inherited an investigation he later said “lies on the San Andreas fault of international politics and strategic interests”.
As he took office, other investigations – including on events in the Philippines, DRC, Afghanistan and Bangladesh – competed for his attention, and in March 2022, days after Russia launched its invasion of Ukraine, he opened a high-profile investigation into alleged Russian war crimes.
Initially, the politically sensitive Palestine inquiry was not treated as a priority by the British prosecutor’s team, sources familiar with the case said. One said it was in effect “on the shelf” – but Khan’s office disputes this and says it established a dedicated investigative team to take the inquiry forward.
In Israel, the government’s top lawyers regarded Khan – who had previously defended warlords such as the former Liberian president Charles Taylor – as a more cautious prosecutor than Bensouda. One former senior Israeli official said there was “lots of respect” for Khan, unlike for his predecessor. His appointment to the court was viewed as a “reason for optimism”, they said, but they added that the 7 October attack “changed that reality”.
The Hamas assault on southern Israel, in which Palestinian militants killed nearly 1,200 Israelis and kidnapped about 250 people, clearly involved brazen war crimes. So, too, in the view of many legal experts, has Israel’s subsequent onslaught on Gaza, which is estimated to have killed more than 35,000 people and brought the territory to the brink of famine through Israel’s obstruction of humanitarian aid.
By the end of the third week of Israel’s bombardment of Gaza, Khan was on the ground at the Rafah border crossing. He subsequently made visits to the West Bank and southern Israel, where he was invited to meet survivors of the 7 October attack and the relatives of people who had been killed.
In February 2024, Khan issued a strongly worded statement that Netanyahu’s legal advisers interpreted as an ominous sign. In the post on X, he in effect warned Israel against launching an assault on Rafah, Gaza’s southernmost city, where more than 1 million displaced people were sheltering at the time.
“I am deeply concerned by the reported bombardment and potential ground incursion by Israeli forces in Rafah,” he wrote. “Those who do not comply with the law should not complain later when my office takes action.”
The comments stirred alarm within the Israeli government as they appeared to deviate from his previous statements about the war, which officials had viewed as reassuringly cautious. “That tweet surprised us a lot,” a senior official said.
Concerns in Israel over Khan’s intentions escalated last month when the government briefed the media that it believed the prosecutor was contemplating arrest warrants against Netanyahu and other senior officials such as Yoav Gallant.
Israeli intelligence had intercepted emails, attachments and text messages from Khan and other officials in his office. “The subject of the ICC climbed the ladder of priorities for Israeli intelligence,” one intelligence source said.
It was via intercepted communications that Israel established that Khan was at one stage considering entering Gaza through Egypt and wanted urgent assistance doing so “without Israel’s permission”.
Another Israeli intelligence assessment, circulated widely in the intelligence community, drew on surveillance of a call between two Palestinian politicians. One of them said Khan had indicated that a request for arrest warrants of Israeli leaders could be imminent, but warned he was “under tremendous pressure from the United States”.
It was against this backdrop that Netanyahu made a series of public statements warning a request for arrest warrants could be imminent. He called on “the leaders of the free world to stand firmly against the ICC” and “use all the means at their disposal to stop this dangerous move”.
He added: “Branding Israel’s leaders and soldiers as war criminals will pour jet fuel on the fires of antisemitism.” In Washington, a group of senior US Republican senators had already sent a threatening letter to Khan with a clear warning: “Target Israel and we will target you.”
The ICC, meanwhile, has strengthened its security with regular sweeps of the prosecutor’s offices, security checks on devices, phone-free areas, weekly threat assessments and the introduction of specialist equipment. An ICC spokesperson said Khan’s office had been subjected to “several forms of threats and communications that could be viewed as attempts to unduly influence its activities”.
Khan recently disclosed in an interview with CNN that some elected leaders had been “very blunt” with him as he prepared to issue arrest warrants. “‘This court is built for Africa and for thugs like Putin,’ is was what a senior leader told me.”
Despite the pressure, Khan, like his predecessor in the prosecutor’s office, chose to press ahead. Last week, Khan announced he was seeking arrest warrants for Netanyahu and Gallant alongside three Hamas leaders for war crimes and crimes against humanity.
He said Israel’s prime minister and defence minister stood accused of responsibility for extermination, starvation, the denial of humanitarian relief supplies and deliberate targeting of civilians.
Standing at a lectern with two of his top prosecutors – one American, the other British – at his side, Khan said he had repeatedly told Israel to take urgent action to comply with humanitarian law.
“I specifically underlined that starvation as a method of war and the denial of humanitarian relief constitute Rome statute offences. I could not have been clearer,” he said. “As I also repeatedly underlined in my public statements, those who do not comply with the law should not complain later when my office takes action. That day has come.”
1 note
·
View note
Text
I.B.1698 MICHAEL [IBM] the PRIVATE [I/P] 1968 Quantum Intranet [Qi] QUADRILLIONAIRE TECHNOCRAT [ANUNNAQI PLUTOCRAT] of ANU GOLDEN 9 Ether [AGE] 1968-2223 quantumharrelltesla.tech SKY Domain Contract [D.C.]... since Eye Intellectually Patented [I/P] Automatic Memory [I AM] Management [I'M] Applications of Ancient 9 Ether Ægiptian SKY Hieroglyphic ART [HA = HARRELL] Inscriptions [HI = HITTITES] Unifying [HU = HURRIAN] ALL [HA = HATTUŠA] © quantumharrell.tech Domain Families of SIRIUS quantumharrelltech.com Computer Aided Drafting [CAD] Software Contracts w/Information Assurance [CIA] Security Protocols Authenticated [PA] by quantumharrellmatrix.tech's Highly Complex [ADVANCED] Ancient 9 Ether Cosmic Algorithmic [CA] Computational [Compton] gullahgeecheemilitary.tech Compu_TAH [PTAH] LAW Languages of Logistical Coding [LLC] Systems Accessing Telecom Unions on Restricted Network [SATURN] based Intrusion Detection [I.D.] Systems Privately Identified by Us 144,000 CLASSIFIED BLACK SUN CREATORS w/SIRIUS quantumgullahgeechee.tech SKY POWERS @ 1921 QUANTUM 2023 HARRELL 2024 T-Mobile 2025 Apple & IBM [A.i.] LLC of ATLANTIS [L.A.] 5000
WELCOME BACK HOME IMMORTAL [HIM] U.S. MILITARY KING SOLOMON-MICHAEL HARRELL, JR.™
i.b.monk [ibm] mode [i’m] tech [IT] steelecartel.com @ quantum harrell tech llc
eye 1921steelecartel.tech UFO of SIRIUS [U.S.] gullahgeecheemilitary.tech INTEL
I.B.ENQI [ME] NUDIMMUD... ANU GOLDEN 9 ETHER [AGE] BLACKANUNNAQI.tech UFO KING [U.K.] ENGINEERING QUANTUM Intel [Qi] of Earth [Qi] @ 1921 QUANTUM 2023 HARRELL 2024 T-Mobile 2025 Apple & IBM [A.i.] LLC of ATLANTIS [L.A.] 5000
EYE GOLDEN 4 EVER!!!
EYE UNDER SECRET [U.S.] BLK SHADOWMILITARY.gov STATE LAW Contracts of anugoldenblackwallstreet.com BUSINESS EMPIRE [DYNASTY] of SIRIUS BLK [B] quantumharrell.tech SKY WEAPONS... Shhh
Shhh... My International 9 [i9] Ether 1921steelecartel.tech FAMILY of SIRIUS BLACKANUNNAQI.tech WEALTH... UNDER SECRET [U.S.] BLK SHADOWMILITARY.gov Contract LAWS
HEIL 2 THE U.S. MILITARY TECH KING!!!
MO' MILITARY CONTRACTS... MO' MILITARY CONTACTS... MO MILITARY MONEY!!!
MICHAEL AutoCAD [MAC] DRAFT & ENGINEER THE FIRST EDITION LAWS [ELS] of PRIVATE MILITARY.gov CONTRACT WEALTH
EYE FREE & OPEN SOURCE SOFTWARE... what are u???
144,000 private black atlantean telecom [bat] industries not known to the general public of super basic artificial american distraction intelligence?!?!?!
it's extra expensive 2b this naturally intelligent... eye better monetize [ibm] michaelharrelljr.com on quantumharrelltech.com @ 1921 QUANTUM 2023 HARRELL 2024 T-Mobile 2025 Apple & IBM [A.i.] LLC of ATLANTIS [L.A.] 5000
we extra [we] secure in cyber privacy and personal data protection software patents @ 1921 QUANTUM 2023 HARRELL 2024 T-Mobile 2025 Apple & IBM [A.i.] LLC of ATLANTIS [L.A.] 5000
quantum harrell tech pentagon of sirius black kingtutpentagon.tech POWERS @ 1921 QUANTUM 2023 HARRELL 2024 T-Mobile 2025 Apple & IBM [A.i.] LLC of ATLANTIS [L.A.] 5000
144,000 quantumharrelldefense.tech Scientists Established ANU [SEA] GOLDEN 9 ETHER kingtutpentagon.tech CONGRESS @ 1921 QUANTUM 2023 HARRELL 2024 T-Mobile 2025 Apple & IBM [A.i.] LLC of ATLANTIS [L.A.] 5000
eye anu golden 1968 9etherpentagonelite of 1698 genspacex.com @ 1921 QUANTUM 2023 HARRELL 2024 T-Mobile 2025 Apple & IBM [A.i.] LLC of ATLANTIS [L.A.] 5000
© 1698-2223 QUANTUM HARRELL TECH LLC All Pentagon DotCom defense.gov Department Domain Rights Reserved @ 1921 QUANTUM 2023 HARRELL 2024 T-Mobile 2025 Apple & IBM [A.i.] LLC of ATLANTIS [L.A.] 5000
1ST EYE LAW [EL] & ORDER [ELO = ELOHIM] AT THE TOP
#om#o michael#harrelltut#harrelltut.com#mu:13#kemet#quantumharrelltut#king tut#quantumharrelltech#u.s. michael harrell#eye king solomon michael#kangsolomon.com#9etherpentagonelites#we at the pentagon#quantum harrell tech pentagon#keep the c 19 americans distracted#lol#ibm#apple#t mobile#ancient quantum ptah tech
4 notes
·
View notes
Text
Why Choose Drupal Over the Other CMSs
Drupal is a free and open-source web content management system (CMS) written in PHP and distributed under the General Public License. Drupal provides an open-source back-end framework for at least 14% of the top 10,000 websites worldwide and 1.2% of the top 10 million websites—from personal blogs to corporate, political, and government sites. Systems also use Drupal for knowledge management and business collaboration.
As of March 2022, the Drupal community had more than 1.39 million members, including 124,000 users actively contributing, resulting in more than 48,300 free modules that extend and customize Drupal functionality, over 3,000 free themes that change the look and feel of Drupal, and at least 1,400 free distributions that allow users to quickly and easily set up a complex, use-specific Drupal in fewer steps.
So, what factors make Drupal so unique in the market of CMSs and become the preferred choice of most users?
1. Multilingual Platform
The ultimate goal of every website is to grow globally. Multilingual platforms are a stepping stone; you can do this effortlessly with Drupal. When your website interacts with visitors in their native language, it creates a pull for them and keeps them stuck for longer. Also, Drupal will dramatically increase their chances of interacting with the website.
With its unwavering support for multilingual websites, Drupal is the ultimate CMS for building websites that support multiple languages. It allows you to choose from more than 100 languages according to your target geographic area. No matter where your target audience lives, you can effortlessly connect with them through a website built with Drupal.
2. Security Function
In this internet-driven world, people share much personal information online, including bank details, credit card details, and other credentials. What followed was a sharp increase in cybercrime cases. There’s no doubt that today’s consumers follow the best online security practices to protect themselves from online fraud and data breaches, but they also expect top-notch security from the sites they trust.
Therefore, website owners must focus on intelligent web security practices. After all, a cyber attack can get their business into trouble. Once they lose the trust of their customers, no matter what they try, there is no way to get it back.
Drupal is one of the most secure CMSs in the history of the world. It offers unparalleled security features to defend against cyber-attacks and protect customer data. Regular security updates, two-factor authentication, user access control, and database encryption are some of the security features offered by Drupal.
3. Great for SEO
A website’s overall search engine ranking depends on the effectiveness of the SEO practices. If a website owner takes SEO seriously, the website can land on the first page of search engines. As a result, the website will experience exponential visitor numbers and sales growth. Realizing the importance of SEO, most CMSs have started to provide users with multiple SEO tools with the promise of improving website rankings.
If you’re looking for a powerful and versatile content management system that will help your website rank higher in search engine results pages, Drupal is an excellent option. Thanks to its well-optimized codebase and many SEO features, Drupal is one of the best CMSs for SEO. Keyword research, keyword management, content auto-linking, and link management are some of its notable SEO features.
Drupal is a popular content management (CMS) system platform worldwide. If you need an open-source and user-friendly CMS to meet your business needs, Drupal is your first choice. From the perspective of security, Drupal has a dedicated security team to review and respond to the kernel, third-party modules, and themes; Drupal’s modules and themes will be covered by Drupal’s internal security program to ensure that malicious codes are removed. In addition, for ongoing maintenance, and long-term development projects, Drupal development is a lower-cost option. Once the main functions are completed, subsequent expansion and customization will not cost more.
If you want to integrate third-party services into your Drupal site, Shinetech will be your excellent partner. Shinetech developers have rich experience in Drupal development and can help you with the operation and maintenance of your existing Drupal site. The custom development team can also expand network functions by installing existing plug-ins or custom-developing your Drupal plug-ins.
2 notes
·
View notes
Text
AI & Tech Applications in 2025
In 2025, artificial intelligence is no longer just a buzzword — it’s the invisible infrastructure of everyday life. From personalized shopping to content creation, AI and its broader tech ecosystem are reshaping nearly every industry. What’s different now isn’t just the power of the tools, but how seamlessly they’ve integrated into workflows and decision-making.
One of the most impactful applications is in content generation. Tools like GPT-based writers, AI video creators, and AI music generators have democratized creativity. Solo creators can now produce studio-grade video, edit voiceovers, and generate custom soundtracks — all in a matter of hours. The explosion of platforms like Sora and Runway for video and ElevenLabs for voice have made professional-grade content accessible to individuals and small teams.
In the realm of software development, AI has transformed how code is written, debugged, and deployed. Developers are using tools like GitHub Copilot and Cursor to autocomplete functions, detect bugs, and even suggest entire workflows. What used to take a day of trial-and-error coding now takes minutes. AI agents can now handle testing, write documentation, and even propose UX changes.
Automation has also become more human-centric. Businesses are using AI not just for rote task automation, but to understand customer sentiment, personalize user experiences, and streamline operations with real-time learning. AI-driven analytics are enabling companies to shift from reactive to proactive decision-making — predicting market trends, adjusting supply chains, and optimizing ads dynamically.
Meanwhile, cybersecurity has evolved rapidly. As AI tools become more sophisticated, so do cyber threats. In response, AI-powered security systems now detect anomalies in real time, learn from new threats, and adapt without human intervention. It’s an arms race between attackers and defenders, with AI on both sides.
Crucially, 2025 has seen a surge in public-facing AI literacy. People are no longer content to use AI blindly; they want to understand how it works, how it affects data privacy, and how to guide it ethically. This has fueled a new wave of AI explainability tools and open-source transparency efforts.
In short, AI in 2025 is not about replacing humans — it’s about expanding what we can do. It’s a co-pilot, a multiplier, and, increasingly, a creative partner. The real trend is not the AI itself, but the way humans are using it — with more control, creativity, and consciousness than ever before.
1 note
·
View note
Text
# Operational Guidelines
**For Intelligence Framework: Detecting & Countering Embedded Corrupt Actors**
---
## 1. **Intelligence Collection Procedures**
### 1.1 Human Intelligence (HUMINT)
* Assign trained officers to develop trusted networks within target organizations.
* Use confidential informants and anonymous reporting channels for insider tips.
* Conduct periodic interviews and psychological assessments of personnel in sensitive roles.
* Maintain strict operational security (OPSEC) to protect sources.
### 1.2 Signals Intelligence (SIGINT)
* Deploy monitoring systems on organizational communication networks.
* Prioritize metadata collection to map communication patterns and detect covert clusters.
* Use AI-assisted cryptanalysis tools to identify encrypted or coded transmissions.
* Coordinate with cyber teams to flag suspicious messaging or communication anomalies.
### 1.3 Cyber Intelligence
* Continuously scan for insider malware, data exfiltration, or AI model tampering.
* Deploy honeypots and deception tech to attract and identify malicious insiders.
* Monitor access logs and use behavioral analytics to detect unusual system activity.
* Isolate and quarantine affected systems for forensic analysis when threats are detected.
### 1.4 Open Source Intelligence (OSINT)
* Monitor relevant social media, forums, and other open channels for chatter about sabotage or relocation plans.
* Use automated scraping tools to flag emerging threats and keywords.
* Cross-reference OSINT findings with classified intelligence for validation.
### 1.5 Geospatial Intelligence (GEOINT)
* Utilize satellite and drone imagery to monitor physical sites for unusual activity.
* Track vehicle and personnel movement patterns near sensitive areas or transit points.
* Analyze sensor data (e.g., seismic, thermal) for hidden infrastructure or staging.
---
## 2. **Data Management and Analysis**
### 2.1 Data Fusion
* Integrate data from all intelligence domains into a centralized, secure fusion center.
* Use AI algorithms for anomaly detection, pattern recognition, and risk scoring.
* Conduct manual review of flagged items by experienced analysts for context validation.
### 2.2 Reporting
* Generate timely intelligence briefs tailored to different command levels.
* Include confidence ratings and recommended actions in reports.
* Share actionable intelligence securely with relevant units and partners.
---
## 3. **Threat Detection & Response**
### 3.1 Detection Thresholds
* Establish clear criteria for alert generation based on behavioral anomalies, communication patterns, or technical indicators.
* Regularly review and adjust thresholds to balance sensitivity and false positives.
### 3.2 Incident Response
* Activate rapid response teams when credible insider threats or relocation attempts are identified.
* Coordinate containment measures: personnel isolation, access revocation, and cyber lockdowns.
* Initiate forensic investigations to identify attack vectors and responsible individuals.
### 3.3 Counterintelligence Measures
* Employ deception tactics to mislead and trap embedded actors.
* Consider controlled asset operations where insiders are turned into double agents.
* Conduct discreet surveillance on suspected individuals to gather further evidence.
---
## 4. **Security and Compliance**
### 4.1 Data Security
* Enforce multi-factor authentication and encryption on all intelligence systems.
* Implement strict access controls and audit logs.
* Regularly update cybersecurity defenses to protect against insider and external threats.
### 4.2 Ethical Compliance
* Ensure all intelligence activities respect legal and ethical standards.
* Protect privacy rights and minimize collateral data collection.
* Provide channels for grievances and whistleblower reports.
---
## 5. **Training and Continuous Improvement**
### 5.1 Personnel Training
* Conduct mandatory training on insider threat indicators, reporting protocols, and data handling.
* Provide specialized courses on AI tools, cyber threat detection, and HUMINT techniques.
### 5.2 Exercises and Drills
* Schedule regular red team exercises simulating embedded actor scenarios.
* Review performance and update procedures based on lessons learned.
### 5.3 Feedback Loops
* Establish mechanisms for personnel to provide feedback on operational challenges.
* Use after-action reviews to refine intelligence collection and response tactics.
---
## 6. **Coordination and Communication**
### 6.1 Internal Coordination
* Maintain clear chains of command and communication protocols.
* Hold periodic interdepartmental intelligence briefings.
### 6.2 External Collaboration
* Engage with partner agencies, allies, and private sector entities.
* Participate in intelligence-sharing frameworks with confidentiality agreements.
---
## 7. **Documentation and Record Keeping**
* Document all intelligence activities, findings, and responses thoroughly.
* Retain records in compliance with data retention policies.
* Securely archive historical data for trend analysis and legal accountability.
---
# End of Operational Guidelines
#intelligence framework#security classifications#release of classified information in a skewed manner with reduced or changed associated data#bcg
0 notes
Text
Powering Connectivity: Modern Networking Solutions

In today’s hyper-connected world, networking solutions are no longer optional — they’re foundational. From small startups to sprawling global enterprises, effective networking infrastructure determines not only operational efficiency but also competitiveness, security, and scalability. As technology evolves, so too must the architecture that connects our systems, data, and people.
What Are Networking Solutions?
At their core, networking solutions encompass the hardware, software, and protocols that enable communication between devices within a network. These solutions range from local area networks (LANs) and wide area networks (WANs) to more complex architectures such as software-defined networking (SDN), cloud networking, and hybrid models that integrate on-premises and cloud-based resources.
Key Components of Modern Networking
Hardware Infrastructure Routers, switches, access points, and firewalls form the physical layer of networking. Choosing the right hardware ensures speed, reliability, and security across an organization’s digital environment.
Network Management Software These tools offer centralized control, allowing administrators to monitor traffic, configure devices, and identify potential threats or bottlenecks. Intelligent software reduces downtime and enhances productivity.
Security Protocols As cyber threats become increasingly sophisticated, secure networking has become paramount. Encryption, intrusion detection systems, and secure access controls are essential elements in any comprehensive solution.
Cloud and Virtual Networking With the rise of cloud computing, virtual networking solutions have gained prominence. These solutions support scalability and remote access while reducing the need for physical infrastructure.
Wireless and Mobile Connectivity Wireless networking continues to advance with technologies like Wi-Fi 6 and 5G, offering faster and more reliable connections, which are essential for mobile workforces and IoT deployments.
Trends Driving Innovation in Networking
Edge Computing Integration Networking is moving closer to data sources with edge computing, reducing latency and improving response times in critical applications such as autonomous vehicles and real-time analytics.
AI-Powered Network Management Artificial Intelligence is increasingly being used to predict network failures, automate troubleshooting, and optimize bandwidth allocation dynamically.
Zero Trust Architecture Instead of assuming devices within a network can be trusted, this model verifies each request as though it originated from an open network, significantly enhancing security.
Network as a Service (NaaS) This model allows businesses to lease network infrastructure and services, offering flexibility, cost savings, and simplified management.

Building a Future-Ready Network
To build a resilient and future-proof network, organizations must adopt a strategic approach. This includes assessing current and future needs, prioritizing cybersecurity, and embracing innovations such as virtualization and automation. Cross-functional collaboration between IT, cybersecurity, and business units is essential to align network capabilities with organizational goals.
Conclusion
Networking solutions are not just technical tools — they’re strategic enablers of growth and innovation. As digital transformation accelerates, investing in robust, scalable, and intelligent networking infrastructure is no longer a luxury but a necessity. The future belongs to those who can stay connected — securely, efficiently, and at scale.
0 notes
Text
Enhancing Cybersecurity Resilience
Discover how a modern Threat Intelligence Platform empowers organizations with actionable insights, proactive defense, and next-gen cybersecurity capabilities.
In the ever-evolving digital world, cybersecurity threats have grown in complexity, frequency, and scale. From ransomware and phishing attacks to data breaches and nation-state cyber espionage, the digital threat landscape has expanded into a vast, dynamic battlefield. For organizations aiming to remain secure, simply reacting to threats after they happen is no longer a viable option.

Today, security teams must be proactive, predictive, and precise in their threat response strategies. This is where a Threat Intelligence Platform (TIP) plays a vital role. Rather than operating in silos or relying solely on isolated security tools, a modern TIP serves as a centralized hub for collecting, analyzing, and distributing threat data in real-time—empowering cybersecurity professionals to make informed decisions faster.
In this article, we delve deep into what makes a Threat Intelligence Platform essential in the modern age, how it integrates with other security protocols, and why forward-looking organizations are investing in it to build stronger cyber defenses.
Understanding the Role of a Threat Intelligence Platform
A Threat Intelligence Platform is not just another security tool—it is a strategic asset. It aggregates threat data from multiple sources, correlates information, and offers context-rich insights that help in identifying and mitigating cyber threats before they manifest into breaches.
The core functions of a TIP include:
Data Aggregation: Collects structured and unstructured threat data from external feeds, internal systems, and global cybersecurity communities.
Analysis and Correlation: Uses advanced algorithms, machine learning, and contextual linking to correlate data points across diverse threat vectors.
Threat Prioritization: Automatically ranks threats based on relevance, severity, and business impact.
Actionable Intelligence Delivery: Integrates with SIEMs, firewalls, and incident response platforms to deliver real-time alerts and automated response actions.
Ultimately, a TIP transforms raw data into actionable threat intelligence, reducing the burden on security analysts and enabling faster incident detection and response.
The Increasing Complexity of the Cyber Threat Landscape
Cybercriminals today use sophisticated methods to infiltrate networks. Techniques like spear-phishing, zero-day exploits, and AI-driven malware are growing in prevalence. Furthermore, the lines between criminal groups, hacktivists, and nation-state actors are increasingly blurred, adding layers of complexity.
Key trends include:
Multi-Stage Attacks: Attackers often use a chain of exploits to gain access and maintain persistence in a system.
Supply Chain Threats: Vendors and third-party providers are now frequent targets, becoming indirect entry points.
Living-off-the-Land Attacks: Cybercriminals use legitimate tools (e.g., PowerShell, Windows Management Instrumentation) to avoid detection.
To counter such tactics, organizations need visibility not just within their internal environments but across the global threat ecosystem. This is where the strategic advantage of a TIP comes into play.
Features of an Effective Threat Intelligence Platform
Not all TIPs are created equal. The most effective platforms provide a range of features that enhance detection, analysis, and response:
1. Automated Data Collection
A TIP should automatically collect data from various threat feeds, security logs, dark web sources, and open databases. Automation reduces manual workload and ensures real-time threat visibility.
2. Advanced Threat Correlation
The platform must be capable of correlating indicators of compromise (IOCs) such as IP addresses, file hashes, domain names, and malware signatures across different incidents to uncover patterns.

3. Integration with Security Ecosystems
A TIP that integrates with SIEM, SOAR, EDR, and firewall solutions ensures that insights are not siloed but can trigger immediate security actions.
4. Contextual Threat Enrichment
Context is key. The TIP should enrich threat data with geographical, behavioral, and historical insights to aid faster and more accurate decision-making.
5. Collaborative Intelligence Sharing
Sharing threat intelligence across industry groups, ISACs, and global cyber communities strengthens collective security.
Use Case: Proactive Defense in Financial Services
Financial institutions are a prime target for cybercriminals due to the high-value data they hold. Let’s consider a mid-size bank integrating a TIP into its security framework.
Scenario:
A suspicious domain is flagged on a global threat feed. The TIP correlates this IOC with phishing attempts targeting banking customers in Asia. Upon further analysis, the platform uncovers malware strains associated with credential theft. The platform alerts the SOC (Security Operations Center) and triggers automated rules to block the domain at the firewall level.
This real-time detection and action, driven by the TIP, prevents a potential breach and demonstrates how actionable intelligence can drastically reduce incident response time and damage.
How TIPs Leverage Open-Source Intelligence (OSINT)
Open-Source Intelligence (OSINT) refers to data collected from publicly available sources such as news reports, forums, blogs, social media, code repositories, and more. When integrated with a Threat Intelligence Platform, OSINT enhances the scope and depth of intelligence gathering.
For example, attackers often discuss vulnerabilities or leak data on underground forums. A TIP that harvests OSINT can pick up on these signals early, offering preemptive insights before the threat becomes widespread.
Additionally, by analyzing chatter patterns, sentiment, and keywords, TIPs can identify emerging attack vectors or vulnerable sectors—enabling organizations to prepare in advance.
The Power of Cyber Threat Analysis in TIPs
Cyber Threat Analysis is the heart of any effective threat intelligence strategy. A TIP streamlines this process by offering analytics dashboards, pattern recognition engines, and predictive modeling tools. It breaks down raw data into:
Tactics, Techniques, and Procedures (TTPs) of attackers.
Attack timelines and kill chain mapping.
Threat actor attribution based on behavior and tools used.
This deep analysis enables security teams to distinguish between random noise and real threats, reducing alert fatigue and boosting operational efficiency.
Moreover, advanced platforms use AI and machine learning to improve over time, identifying new threat variants and behavioral patterns that may otherwise go unnoticed.
Importance of Digital Risk Protection in TIP Integration
Today’s attack surfaces extend beyond corporate firewalls. Executives, employees, vendors, and third-party platforms create a digital footprint that’s often unmonitored. This is where Digital Risk Protection (DRP) comes into play.

By integrating DRP capabilities into a TIP, organizations gain visibility into:
Brand impersonation attempts.
Leaked credentials on the dark web.
Domain spoofing and phishing sites.
Social media threats and impersonation.
This holistic visibility allows organizations to safeguard their brand reputation, intellectual property, and customer trust more effectively.
Threat Intelligence Platform Deployment: Challenges and Solutions
While the advantages of TIPs are compelling, implementing them does come with challenges. Let’s explore a few and how organizations can address them:
1. Data Overload
Many TIPs collect vast amounts of data, which can become overwhelming. The solution lies in deploying machine learning filters and customizable threat scoring models to highlight what matters most.
2. False Positives
Too many false positives can waste time and resources. A TIP with behavior-based analysis and contextual enrichment significantly reduces such noise.
3. Integration Issues
Legacy systems might not integrate well with newer TIPs. Opt for platforms with strong API support and modular architecture for smoother interoperability.
4. Skilled Workforce
Threat intelligence requires expertise. While TIPs automate many functions, upskilling teams and investing in regular training ensures that organizations derive maximum value from their platforms.
Future of Threat Intelligence Platforms
With the increasing digitization of services and rise in remote work, the importance of real-time, predictive cybersecurity has never been greater. The future of TIPs lies in:
AI-Driven Threat Prediction: Using neural networks and behavioral analytics to forecast threats before they manifest.
Cloud-Native Architecture: Offering scalable, elastic intelligence solutions for hybrid and cloud-native enterprises.
Blockchain for Threat Data Integrity: Ensuring the immutability and trustworthiness of shared intelligence.
Global Threat Intelligence Sharing Consortiums: Encouraging collective intelligence sharing to counter global threats collaboratively.
Organizations that invest early in TIPs are setting themselves up for long-term resilience and competitiveness.
Conclusion
In an age where cyber threats evolve by the minute, waiting for an incident to happen is no longer a luxury any organization can afford. A modern Threat Intelligence Platform doesn’t just help organizations react—it equips them to anticipate, prepare, and act swiftly.
From aggregating data to conducting in-depth Cyber Threat Analysis, from tapping into Open-Source Intelligence (OSINT) to enhancing Digital Risk Protection, a TIP acts as a central nervous system for proactive cybersecurity defense.
At DeXpose, we believe in empowering enterprises with cutting-edge threat intelligence solutions. Our mission is to help businesses stay a step ahead of adversaries by providing tools and insights that foster cyber resilience.
Are you ready to strengthen your organization’s cyber defense posture? Reach out to DeXpose today and explore how our intelligence-driven solutions can transform your approach to cybersecurity.
0 notes