Tag Archives: Military Intelligence

Did Israel Reject Al Jazeera Request For 10 Extra Minutes?

Did Israel Reject Al Jazeera Request For 10 Extra Minutes?

Did Israel reject a request for 10 extra minutes to vacate the Al Jazeera building in Gaza, before bombing it?

Find out what’s this viral claim all about, and what the FACTS really are!

 

Claim : Israel Rejected Al Jazeera Request For 10 More Minutes!

A video showing a man pleading with Israeli authorities for 10 more minutes before a building is demolished, is being circulated, together with this message :

Director of Al Jazeera Palestine was begging for extra 10 minutes to Israel Army officer. But he refused to give any extra time and destroyed the Al Jazeera Building in Palestine in minutes.

They asked them to evacuate the building first and then used GPS Coordinate guided Bombs to destroy the Al Jazeera Palestine Head office building. The punishment is for broadcasting Fake news about Israel.

 

Did Israel Reject Al Jazeera Request For 10 Extra Minutes? Not Quite…

Irrespective of our views on the Israeli-Palestinian conflict, we must agree that they should be based on facts.

We investigated this video and claim, and here are the FACTS :

Fact #1 : That Is Not The Director Of Al Jazeera Palestine

The man in the video is not the director of Al Jazeera Palestine.

He is Jawad Mahdi – the owner of the al-Jalaa building that was destroyed by an Israeli airstrike on 15 May 2021.

Fact #2 : There Is No Al Jazeera Palestine, Or Al Jazeera Building

There is no organisation known as Al Jazeera Palestine, or a building called Al Jazeera Building.

The building in the video is the al-Jalaa, a 12-storey office tower which hosted the bureau offices of the Associated Press and Al Jazeera in Gaza.

Fact #3 : Israel Gave Them One Hour To Vacate

The IDF gave al-Jalaa occupants an hour to vacate the building. They would normally drop “roof knocker” bombs as a final warning before destroying the building.

However, it is impossible for anyone to vacate such a large building in such a short time frame, with anything more than some belongings.

Fact #4 : Israel Rejected The Request For 10 Extra Minutes

Jawad Mahdi was seen in the video asking an Israeli intelligence officer for an additional 10 minutes, so that four journalists can go in to retrieve their belongings.

The Israeli intelligence officer rejected his request, and the video shows the building collapsing after being bombed.

Fact #5 : Israel Claimed Hamas Secretly Used The Building

IDF and the Israeli government claimed that Hamas secretly used the building for “military intelligence purposes” and a unit operating out of the building had been “conducting sabotage operations against the IDF”.

However, they did not offer any evidence, or explain why it was justifiable to demolish a 12-storey office building that was “secretly” being used by Hamas.

It was also not explained why it was not possible to give journalist the extra 10 minutes to retrieve their belongings, when they had no issue giving the other occupants (and the secret Hamas operatives inside) an hour to evacuate the building.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Fact Check | Tech ARP

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Latest Cyber Technical Surveillance Counter-Measures

Jason Wells was a military intelligence officer for 17 years, before going into the private sector. He is now the Asia Pacific CEO of QCC Global – the world’s largest company specialising in TSCM (Technical Surveillance Counter-Measures). In this special presentation at the Kaspersky Lab Palaeontology of Cybersecurity Conference, he gave an overview of TSCM over the years before sharing the latest in Cyber TSCM, particularly with the upcoming 5G technology.

Don’t forget to check out the other Kaspersky Palaeontology of Cybersecurity presentations!

 

Cyber Technical Surveillance Counter-Measures

Like other members of QCC Global, Jason Wells is literally a poacher turned gamekeeper. He now helps organisations prevent their secrets from being leaked or intercepted by technical surveillance.

Here are the key takeaway points :

  • Physical keyloggers are still being used, because organisations ignore the risks.
  • Miniature GSM transmitters (smaller than a one Euro coin!) are now used to wirelessly transmit data over a third-party network.
  • Military-grade devices will use burst transmissions to avoid detection.
  • VOIP calls are possible to tap – as long as the device or line can be accessed, all conversations can be recorded or copied.
  • Light modulation or laser eavesdropping devices are now available to listen from a great distance.
  • WiFi light bulbs can be modified to pick up voices and transmit it to nearby devices via subtle modulation of the light wavelength or frequency.
  • A key concern, other than the typical eavesdropping of corporate offices, is backdoor access to Building Management Systems that are used in many modern buildings.
  • Public WiFi access points are a common source of “man-in-the-middle” attacks, where attackers set-up free access points that mimic actual public access points.
  • Bluetooth technology is a boon to surveillance devices because it is very low-powered. With Bluetooth Class 5, they now have a much longer range (400 m) and twice the speed, while drawing less power.[adrotate group=”2″]
  • Roughly 60% of the surveillance devices that QCC Global detects use cellular technology to transmit their data. The rest still use radio to transmit their data wirelessly.
  • Cellular technology gives an attacker great flexibility in areas of good coverage because he can dispense with additional requirements like a listening post, or rebroadcasters.
  • Using the cellular network also allows the listening device to hide amongst the many mobile devices nearby.
  • 5G technology will be a game-changer, offering new possibilities for technical surveillance.
  • With every 5G device always connected, they will make it much, much harder for counter surveillance companies like GCC Global to detect 5G listening devices.

Don’t forget to check out the other Kaspersky Palaeontology of Cybersecurity presentations!

 

The Presentation Slides

Here are Jason’s presentation slides on cyber technical surveillance counter-measures for your perusal :

Go Back To > Articles | Home

[adrotate group=”1″]

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!