Informed details of a security war against Hezbollah .. Read what was revealed


The “Al -Khadad” website concerned with strategic and security studies published a new report in which he talked about the security, intelligence and informational aspects that Israel adopted during its recent war against Hezbollah.

The report says that “most of the western countries, headed by America, operate day and night, the mockery of all its capabilities to protect this entity militarily, security and even economically and politically.” He added: “The absolute support by the United States allowed Israel to benefit from all available technical technologies, but rather directed all its scientific energies to protect Israel, especially the information side, and the major companies mocked to serve it security and information.”

He continued: “Recently, the Washington Post reported that Google has provided the enemy’s army with the latest technologies of artificial intelligence, Jimini, and it is helping the Israeli Ministry of Defense since 2021, and has cooperated with it since its inception, especially in the field of maps, where Google MAP refrains from showing the Israeli sensitive sites clearly, and prevents the user from accessing any information classified by the Israeli army as confidential Google Map or any other application to any useful information about the enemy’s military, security or economic sites.

The report also saw that “cybersecurity is considered an essential part of the enemy’s security doctrine, so the Israeli national Cyber ​​Defense Authority was established in 2016, which is affiliated directly to the presidency of the enemy government, after it was previously a unit belonging to the presidency of the enemy army staff, and its main function is to manage all defensive and practical efforts in the cybersecurity, operate and implement it, which provides a full defensive and permanent response to the attacks Or attempts to penetrate and electronic influence to the depth of the enemy, using the latest technologies, programs and electronic, algorithms and applications to protect all its security, military and economic interests, including the telecommunications, transportation, energy and water sector.

He continued: “Likewise, the enemy put a war plan to confront the capabilities of the security and information resistance, and he was able to apply it accurately during the battles of the Flood of Al -Aqsa and Al -Bass, the most prominent of which was:

– Media dishes and preventing any leakage of any news, except for what is issued by the Israeli army or what is allowed to be deployed.

– The settlers were transferred from the front front lines in the Gaza cover and on the border with Lebanon and the unloading of a number of settlements and considering them military areas, in order to facilitate its field movement away from the view of civilians, and most importantly, this measure facilitates it to spread within the homes of civilians away from monitoring the resistance.

– Adopting a special plan during the war, which is the spread of most soldiers outside the well -known military sites.

Changing the plans and means of communication and communication between military pieces on the ground.

Cyber ​​jamming similar to the arrest of the GPS system to determine places.

– Put a lot of cement berms to prevent vision and targeting its causes on the internal roads.

This is in addition to some of the military tactics he used in this war, taking advantage of the Venusrad Investigation Committee’s observations about their failure in the July 2006 war. (Tags)


Get Mobile Application