Israel bombs building containing alleged Hamas hackers

Israel bombs building containing alleged Hamas hackers

As ZDNet reports, Israel Defense Forces (IDF) launched a military airstrike against a building in the Gaza Strip on Saturday.

That’s not the normal sort of story you’d expect a technology website like ZDNet to write about, until you realise that the IDF claims the building was the headquarters of Hamas’s cyberwarfare operations.

According to Israel, Hamas launched an internet-based attack (no details have been shared of the nature of the attack) from the building which was repelled. However, clearly Israel’s military decided that countering the attack in cyberspace wasn’t enough, and so things rapidly turned physical.

Sign up to our free newsletter.
Security news, advice, and tips.

“We were ahead of them all the time,” said Brigadier General D., the head of the IDF’s cyber defense division. “The moment they tried to do something, they failed.”

Israeli officials did not disclose any details about the Hamas cyberattack; however, they said they first stopped the attack online, and only then responded with an air strike.

“After dealing with the cyber dimension, the Air Force dealt with it in the physical dimension,” said IDF spokesperson, Brig. Gen. Ronen Manlis. “At this point in time, Hamas has no cyber operational capabilities.”

ZDNet‘s Catalin Cimpanu shared a video of the actual airstrike on Twitter.

In the past Hamas has used its hacking prowess to hijack Israeli military drones.

This is the world we now live in. Expect more of this.

Hear more discussion on this topic in this episode of the “Smashing Security” podcast:

Podcast artwork
Smashing Security #127

I do love the Dutch

0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
CAROLE THERIAULT
And I recorded a video of it. Not just the video, I even saved all your passwords, contact lists, and everything.

I did all of this when you were in the bathroom trying to clean yourself.
GRAHAM CLULEY
So a few things here.
CAROLE THERIAULT
First, why didn't you ask Ran to read this out?
Unknown
Smashing Security, episode 127: I Do Love the Dutch with Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 127. My name is Graham Cluley.
CAROLE THERIAULT
I'm Carole Theriault.
GRAHAM CLULEY
Hello, Carole.
CAROLE THERIAULT
Hello, Graham.
GRAHAM CLULEY
Hello. And we are joined— Groom? We are joined this week by someone new to the show, a bit of a podcast star in his native country of Israel.

It is Ran Levi, star of the Malicious Life podcast. Hello, Ran.
RAN LEVI
Hi, hi. Great to be here.
CAROLE THERIAULT
We are super stoked to have you here. It's awesome.
RAN LEVI
Thank you. I am super stoked myself.
GRAHAM CLULEY
Now, Ran, I'm sure lots of our listeners will already have checked out the Malicious Life podcast because, well, why don't you explain what it is and why people might enjoy it?
RAN LEVI
Okay. So my personal hobby is malware research and the history of malware.

And Malicious Life is a podcast about the history of malware where we talk every other week about some obscure episode from the past of cybersecurity. Lots of interesting stories.

I mean, some of them were rather famous back in the day, like the famous Morris worm from the 1980s. And of course, you, Graham, are a star of our show.

I mean, I've interviewed you at least twice, I think, for the show.
CAROLE THERIAULT
Oh, is this why he asked you to describe the show? Because he knew he'd get a plug?
RAN LEVI
Oh my God. It works. Yes, you see, it works.
CAROLE THERIAULT
He's a master.
GRAHAM CLULEY
But you've had some proper experts on the show as well talking about computer security.
RAN LEVI
Almost every episode we've got experts talking about very interesting stories, lots of human stories. I like the human side of cybersecurity.
CAROLE THERIAULT
Well, I have quite a few stories about Graham, real ones.
GRAHAM CLULEY
Whoa, whoa, whoa, whoa, whoa.
CAROLE THERIAULT
So maybe we should talk.
GRAHAM CLULEY
No time for that. No time for that. Carole, what's coming up on this week's show? And don't mention anything like that.
CAROLE THERIAULT
We have a fab story lineup for you guys today. Thanks to the support from our sponsors, Gartner, MetaCompliance, and LastPass. Graham is going to talk turkey about Intercourse. What?

I just said this is a fab lineup and you hit us with intercourse.
GRAHAM CLULEY
I wouldn't say hit you with intercourse. I don't think that's the verb I would use.
RAN LEVI
Right. Right.
CAROLE THERIAULT
He's going to educate us on modern asymmetrical cyber warfare. That's more like it.
RAN LEVI
Yeah, because it's happening in my backyard.
CAROLE THERIAULT
And I've actually solved a global problem and I'm going to run my theory past all of you to test it out. All this and more coming up on this episode of Smashing Security.
GRAHAM CLULEY
So chaps, imagine you have received an email. Not that unusual, obviously.

Carole, I've shared with you the text of an email, so maybe you can read it out to me and we will discuss it as though it's just appeared in my inbox.
CAROLE THERIAULT
Okay, I do know it has intercourse in it because I had to introduce the show, so I'm a little— Okay, if I hesitate, people, I have yet another surprise for you, our intercourse video.

There you go.
GRAHAM CLULEY
Intercourse. So this is the first thing which surprises me, right?
CAROLE THERIAULT
You don't remember making it, no?
GRAHAM CLULEY
Well, exactly. It's like, what? So there's someone who sent me an email saying, "I've got a surprise for you. Here is our, not hers, not theirs.

This is our intercourse." And who calls it an intercourse video? Did they mean a sex video, I imagine? Right?
CAROLE THERIAULT
Yeah.
GRAHAM CLULEY
You wouldn't necessarily call it an intercourse video, but anyway, let's hear more.
CAROLE THERIAULT
"Yes, you read it right. We had intercourse quite a long time back."
GRAHAM CLULEY
Quite the sexy talker there, isn't it? We had intercourse.
CAROLE THERIAULT
This is like, I am blushing here. Okay, I don't even know what the next bit's going to be.
GRAHAM CLULEY
Who did you have sex with? Richard Nixon? It's just bizarre. Okay.
CAROLE THERIAULT
"And I recorded a video of it. Not just the video. I even saved all your passwords, contact lists, and everything.

I did all of this when you were in the bathroom trying to clean yourself."
GRAHAM CLULEY
So a few things here. Firstly—
CAROLE THERIAULT
Why didn't you ask Ran to read this out?
GRAHAM CLULEY
Firstly, what the fuck?
RAN LEVI
It's better when you read it.
GRAHAM CLULEY
So imagine you were having intercourse, as it's called.

If you were having sex with someone, wouldn't you notice as they set up the lights and the microphones and all the rest of it to make this video?

But secondly, they say that they've also grabbed our passwords and contacts list and everything.

And they actually write, "I did all of this while you were in the bathroom trying to clean yourself." It's like, how dirty did you get?

And what is that dirt you're trying to scrape off? And how long does it take you in the bathroom to sort yourself out?
RAN LEVI
That this other person's like, "Oh, just download all their passwords." I think that we can safely assume that the person who wrote that email didn't have intercourse yet.
CAROLE THERIAULT
Ever in their lives.
GRAHAM CLULEY
Yeah, exactly. I think you're right. They've never had sex, have they?
RAN LEVI
They read about it.
GRAHAM CLULEY
Yeah, they've read about it. They think, oh, that must take an awfully long time to clean up afterwards.
CAROLE THERIAULT
They've watched some really nasty porn.
GRAHAM CLULEY
It's gone through Google Translate or something like that. So why are they saying all these things? Let's find out some more.
CAROLE THERIAULT
"Trust me, I can fuck up your life if I want to. I'm not an evil individual. It's just that I need some money and I'm certain you can help me with it."
GRAHAM CLULEY
Help you with a few things. Yeah, okay, carry on.
CAROLE THERIAULT
"So here's the non-negotiable deal. You send me $1,500 and I will delete everything I have about you. You will not ever, ever hear from me."
GRAHAM CLULEY
And then they give a bitcoin address. And so this is in many ways a fairly standard sextortion email, right?

But there's this unusual angle, which is not that they've hacked into your webcam or detected that you've been visiting porn sites and secretly videoed you as you enjoyed watching these videos.
CAROLE THERIAULT
I have a thought here. Right, okay. So let's say they send this, spam this out to, let's just say random number, 20,000 people.
GRAHAM CLULEY
Okay.
CAROLE THERIAULT
Okay. And let's say what, 1% of them are people that might go, "Possible."
GRAHAM CLULEY
It's possible. Maybe.
CAROLE THERIAULT
"I remember cleaning myself or trying to."
RAN LEVI
It did take me a long time in the shower. I was there a while.
CAROLE THERIAULT
And if those 1% respond and kind of panic, or 1% of 1%, they're still quids in.
GRAHAM CLULEY
Yeah, exactly. So there will be some people who think, well, I did have the intercourse a long time back. I don't remember who, but there was that strange situation.

I mean, I remember I've personally been secretly filmed. I think I may have mentioned this on the show before. Not while— Really?
CAROLE THERIAULT
Yes.
GRAHAM CLULEY
Not while having sex, to the best of my knowledge. It'd be a short movie at that. But no, I've been secretly filmed while on the lavatory inside a restaurant.
CAROLE THERIAULT
Oh, delicious.
GRAHAM CLULEY
A camera came under the cubicle door and started pointing at me. So I've had that experience.

So I might— if I'd received an email saying, we filmed you while you were in the bathroom trying to clean yourself up or something like that, then I might have found it more plausible.

But I think it's quite unlikely, this particular thing. So they are threatening. They're saying, unless you pay so many bitcoins within one day.

As though the average user can find out how to buy bitcoin and arrange all of that within a day.
GRAHAM CLULEY
They're saying they will send the video, or the intercourse video as they call it, to all of your contacts. They will leave the DVD with your neighbors.

They say, we know where you live, so they're going to pop round with a DVD, put it through the letterbox.
RAN LEVI
Who has a DVD player now?
CAROLE THERIAULT
Yeah, I guess.
GRAHAM CLULEY
Can't they just stream it on Netflix instead? That is so much more convenient.
CAROLE THERIAULT
You can put it between Miami Vice Season 3 and Miami Vice Season 4 DVDs.
RAN LEVI
You know, I might just wait for somebody to send me the actual video because then I'll have bragging rights at least.
CAROLE THERIAULT
I mean, yeah, exactly.
GRAHAM CLULEY
Mom, Mom, I finally had sex.
CAROLE THERIAULT
I'm a film star.
GRAHAM CLULEY
I mean, there'd be a lot of techie people who they would never believe this for a second, would they?

Because they would simply think, you know, the only time I have had sex was with myself. There's no one else present in the room.
CAROLE THERIAULT
And just last week, Graham, you were talking about people that can be duped by certain scams.

That maybe techie people may not fall for, but there seems to be a lot of people out there that do.
GRAHAM CLULEY
Yeah, and I think you're right, Carole, when you said that if this was sent to a huge number of people, there might be one or two unwary or vulnerable people, or—
CAROLE THERIAULT
They read the first line and freak out.
GRAHAM CLULEY
Or people who are just very, very sleazy and slutty, who think, well, nope, it's a fair cop, it might have happened.

And so the cost to the bad guy, email a lot of people, is practically zero, right?
CAROLE THERIAULT
Exactly.
GRAHAM CLULEY
But the rewards—
RAN LEVI
But it is, I mean, would it be more logical to assume that if you claim to have videoed someone who masturbated on, you know, some porn site, you'd get much more potential hits than somebody who was filmed during intercourse with somebody who just sent him an email?
CAROLE THERIAULT
I mean, this is a new area we haven't explored on the show.
GRAHAM CLULEY
Right.
CAROLE THERIAULT
Yeah.
GRAHAM CLULEY
And it's for that reason we're now going to survey our listeners. So if you Well, the only thing—
RAN LEVI
Send us your videos and we'll do some research.
GRAHAM CLULEY
I suppose the intent of this email is to make it appear that you are being more specifically targeted.

They know where you live, they might know your family situation, they may have a personal grudge against you. I mean, yes, it does seem implausible.
CAROLE THERIAULT
There's one dead giveaway that they don't. There's nothing specific in any of the email, right? Show me this video that you talk about.
RAN LEVI
You know, if you remember, there was a very, very serious attempt at that very thing when, how was that adultery site called?
CAROLE THERIAULT
Ashley Madison.
RAN LEVI
Ashley Madison, exactly. And after the Ashley Madison hack, people sent out mails to probably the people who were in the database that was siphoned away.

And claiming that they either pay and here were their actual details because it was in the database. And I understand that there were lots of people who did pay.
GRAHAM CLULEY
And there were some people who sadly ended up committing suicide. And, you know, obviously families will have broken up. It's absolutely horrific.
RAN LEVI
So I'm feeling as if I'm bringing your show down. I'm sorry.
CAROLE THERIAULT
Just wait for your story.
RAN LEVI
Yeah. And we haven't even started yet.
GRAHAM CLULEY
So, Ran, what story have you got for us this week?
RAN LEVI
Okay, so two days ago, Israel released a video, you know, the kind of generic videos when you— black and white videos where you see a bomb hitting a building and it explodes.

You've probably seen hundreds of those in Iraq, whatever. And it turns out this specific building is claimed to be the cyber headquarters of Hamas in Gaza.

So I think this needs a bit of an outline of what we're talking about. So very, very briefly, Israel and the Palestinians have been at odds for the last, what year is it?

Half a century.
GRAHAM CLULEY
What century is it? You mean? What millennium is it? Yes.
RAN LEVI
It's a rather old conflict to say the least. And in 2005, Israel pulled out of Gaza and a short time later, Hamas took control of Gaza.

And ever since then, people probably heard on the news about occasional conflicts, missiles, etc.

And in the background of that military conflict, there's also some sort of cyber warfare conflict going on.

Except that in that case, Israel is a major superpower in cybersecurity and Hamas is basically amateurs. So I mean, it's as asymmetrical as it gets, really.

And Israel has used every conceivable technology against Hamas, from advanced malware, spyware, tracking cell phones, whatever.

But it's very interesting to see from my perspective, I'm not talking here as an Israeli who's got a stake in this, but as somebody who follows cybersecurity.

It's very interesting to see how Hamas is kind of adapting to this reality of being, I would say, the David in that specific conflict.
CAROLE THERIAULT
Exactly, I was just going to say that.
RAN LEVI
Not in the political sense, mind you. Just in the more order of magnitudes in terms of capacity. And they do, they're trying interesting stuff over the years.
GRAHAM CLULEY
That's the thing, isn't it, with cyber attacks is that all you need is a computer and an internet connection at the very basic level.

That's much easier for me or someone else to get hold of than it is to get hold of a tank or a fighter jet.
RAN LEVI
Exactly. And you know what I mean?

Most media outlets I saw that referenced that strike two days ago against the Hamas headquarters, the actual building, were claiming that they were trying to paint that bombing as if it's maybe like a new phase in cyber warfare, that there's kind of kinetic warfare after a cyber strike or something like that.

And I call bullshit on that because really the way I see it, Israel probably was aiming to take down that specific building for years.

And just we had the opportunity right now because we are in the middle of an actual live conflict with missiles flying in every direction.

So it doesn't have anything to do with retaliation against any cyberattack from Hamas, as some people probably claimed.

And it's, I think, more of a publicity stunt from Israel because, as you said, Graham, everyone, everybody with a computer can actually plan some sort of an attack from their home.

Yeah, so actually taking down a building, which is quite "cyber headquarters" in Gaza, it was probably empty if you ask me. Yeah, they probably fled the building a long time prior.
GRAHAM CLULEY
I don't know, but I mean, Israel's Defense Force, they are the ones who've managed to get lots of attention for themselves with this because they tweeted out an image and then later a video was released as well where they painted it very much as, they did paint it as a response to a cyber attack, didn't they?

They said there had been an attack against Israel.
CAROLE THERIAULT
But no details.
GRAHAM CLULEY
They haven't given any details. So there was a cyber attack against Israeli targets, as they've said.

They said that it was thwarted, and so they managed to actually deflect it, whatever it was, maybe in a denial of service, who knows.
CAROLE THERIAULT
And bomb the headquarters.
GRAHAM CLULEY
And yes, but—
RAN LEVI
It sounds good, right?
GRAHAM CLULEY
I mean, if it was—
CAROLE THERIAULT
No, I don't think it does. For me, cyber warfare is, whilst there's loads of pains associated with it from all kinds of points of view, it is not actual physical violence, right?

Where people are actually dying.
RAN LEVI
Exactly.
CAROLE THERIAULT
And there seems to be some kind of evolution involved from moving from, you know, kind of beating someone on the head to being able to do it digitally.

So it's a sad day we actually have to respond in such a crude way.
RAN LEVI
Yeah.

I mean, if you look at what the, I mean, the actual cyber attacks that Hamas did over the last 3, 4 years, you can see that these are not really cyber attacks in maybe the way.
GRAHAM CLULEY
So what have they been doing?
RAN LEVI
So think about it from the perspective of somebody in Hamas trying to strike one of the most sophisticated armies in the world in terms of cybersecurity.

They can't really hack anything, I mean, not military installations or military systems and stuff. They are pretty amateurs in that regard. But what can they do?

They can target the actual soldiers, the servicemen and women in the military and try to gather intelligence.

And what they did in the last few years is use social engineering to try and get young servicemen and women to install compromised applications and use those applications to spy inside military installations around Gaza.

So the typical scenario would be, say you're a young soldier, a 20-year-old guy, and you're getting a Messenger message, Facebook Messenger, or a WhatsApp conversation from some lovely lady presenting herself as a young immigrant new to Israel, and she's really excited because she got your phone number from her girlfriend or whatever, and you're a brave soldier, whatever.
CAROLE THERIAULT
I mean, you're lonely and you hate— yeah.
GRAHAM CLULEY
And she saw the intercourse video which is going around as well, that's been making the rounds, and she thought that looks quite good, you know.
RAN LEVI
Yeah, yeah, why not? Why not?

I mean, I was in the Israeli military, and I've got to tell you I can tell you from personal experience, the minute somebody puts your uniform on, you become hungry, tired, and horny.

Not in that specific order.
GRAHAM CLULEY
I think now you're 43, Ran, you should really take the uniform off. I think you're pushing it a bit to still be strutting around.
CAROLE THERIAULT
It looks good with the ladies.
RAN LEVI
And I understand the attraction of that specific attack.

And I mean, there were probably hundreds of soldiers who installed these spyware applications and the applications themselves were related to stuff that interests young people like soccer, World Cup, dating, fitness, whatever.

I mean, it's a generic, it was used, generic tools that anybody can create simple applications. It's not that difficult.

And once the victim installed that application, now Hamas could turn on cameras, microphones, whatever inside military installation, it probably gave some sort of intelligence.

It seems like a good idea.
CAROLE THERIAULT
So it seems like cyber training is required for the actual young personnel upon entry to the military to help deflect this kind of stuff?
RAN LEVI
Exactly. So in response, the military started a public campaign to raise awareness in soldiers, and it was called Operation Broken Heart. They got good names.

They give good names to it.
CAROLE THERIAULT
Yeah, good names. Yeah.
RAN LEVI
So that's one aspect of what Hamas is doing. And the other aspect is more enlisting help from sympathizers from around the world.

Many of them kind of fuzzily related to the Anonymous movement.

And each year around, actually this time of the year, they commence some sort of coordinated attacks against Israeli websites, governmental websites, media outlets, whatever.

DDoSing, defacements. Actually, there was just a few days back, early this month, we had one of these attacks. It was called Operation Jerusalem.

And I think the attackers defaced around a million web pages in Israel. Quite a lot. And it was really smartly done.

They targeted an accessibility plugin that is used by many Israeli websites. And the hackers broke into the DNS record of the company which makes the plugin.

And since it is one single plugin and it injects JavaScript code into almost every major website in Israel, the attackers were able to deface tens of thousands of websites.
GRAHAM CLULEY
So the hackers only had to compromise one piece of code which was being used by many, many websites. It's effectively a supply chain attack.
CAROLE THERIAULT
Exactly.
RAN LEVI
So smart. I mean, this is really smart. Actually, the real objective of that attack was not defacement, but was installing ransomware on all the visitors of the websites.

And imagine to yourself for a second if that attack really came through and they were able to inject ransomware code into tens of thousands of websites in Israel.

I mean, half the population's PC computers would probably be ransomed in some way, except that they had a bug in the code.

There was some broken if condition somewhere in the code and it didn't work. But it was rather daring. I mean, if it did go through, it could have been a very annoying attack.
GRAHAM CLULEY
If it had happened, can you imagine? Can you just imagine how smug all those Apple Mac users would have been? That would have been vile, wouldn't it?
RAN LEVI
Exactly.
CAROLE THERIAULT
They would all put on their turtlenecks, get their flat whites out. Drink their macchiatos.
GRAHAM CLULEY
Yeah.
CAROLE THERIAULT
No, we've moved on now. It's flat whites.
GRAHAM CLULEY
Fantastic. Carole, what's your story for us this week?
CAROLE THERIAULT
I couldn't have wished for a better handover, Ran.

This is, of course, an equally terrifying and upsetting story, especially for those of you out there who are not inclusive or welcoming of our brothers and sisters afflicted with Tourette's.

Fucking seriously, get woke, people. Actually, it's even bigger problem than that.

This could be seen as a veritable nightmare for any technophile clean freak who is not very cozy with swearing, fulminations, profanities, or expletives.

Now, as the self-appointed CEO of the body advocating lewd language and signs, I swear a lot in this show. We all know that.

And I think we could say that I do fight intolerance to colorful castigations, right? And I want us to abandon this dogmatic and outdated mindset.

Screw the swearing naysayers, I say.
GRAHAM CLULEY
So have you swallowed a thesaurus? What's going on here?
CAROLE THERIAULT
I propose that this young hacker— I'm going to introduce him in a second.
GRAHAM CLULEY
Oh, yes.
CAROLE THERIAULT
May just have stumbled upon an exquisitely simple solution that resolves this global pandemic of no swearing allowed.

So this young hacker is an internet celeb-ish guy who seems to hack devices in fun ways for the pure entertainment of his followers.

Now, his channel, Michael Reeves, has well over 1.5 million subscribers, and he has 120,000 followers on Twitter.

And his banner on Twitter says, "I like to hack things." So I'm just giving you a kind of visual here. So no small potatoes, right? 1,000 followers.
GRAHAM CLULEY
Yeah.
CAROLE THERIAULT
And on his channel, he has videos like a robot that picks tomatoes out of your salad.
RAN LEVI
Only tomatoes?
CAROLE THERIAULT
Yeah. If you want to take a quick look at that link, I've even timed it for you so you can just see it in action for 10 seconds.
GRAHAM CLULEY
Okay. Okay, let's just check this out. Sounds very useful for some people.
RAN LEVI
If you hate tomatoes.
CAROLE THERIAULT
I love them.
GRAHAM CLULEY
So it's not working for me. Oh, there is a little bit of collateral damage, isn't there? Of course, by this thing.
RAN LEVI
Yeah.
CAROLE THERIAULT
He has another video, which is a robot that shoots an energy drink at you when you get tired. And I've also lined that one up appropriately for you guys if you want to take a look.
GRAHAM CLULEY
Oh, he's— oh my goodness. That's a bit like—
RAN LEVI
He's rather young, this guy.
GRAHAM CLULEY
A bit like having a visit from the Israeli army, that actually, isn't it?
CAROLE THERIAULT
See, that's what I was saying. Equally terrifying. Terrifying.
RAN LEVI
He's got a lot of time on his hands.
GRAHAM CLULEY
Yes.
CAROLE THERIAULT
So his videos are around 10 minutes long. So, you know, shortish. And they tend to show a little about how he hacks said device to make his wacky inventions, right?

And people seem to love it. Now, personally, I've watched a few of his videos and I find his on-screen persona incredibly annoying and smug.

And the thing is, as you say, Ran, he is just a kid, one that thought it was clever to use an old Tide pod container.

Did you notice that in that energy drink video, he's actually using an old Tide Pod container to hold the fizzy energy drink? So ha fucking ha.
GRAHAM CLULEY
I don't get that. What's that mean?
CAROLE THERIAULT
About a few years ago, kids were actually daring each other to chew the pod. It was the challenge.
RAN LEVI
The challenge.
GRAHAM CLULEY
And that's like washing.
CAROLE THERIAULT
Yeah, the washing thing. Yeah.
GRAHAM CLULEY
Okay.
CAROLE THERIAULT
Anyway, he was making a reference to a very uncool meme as far as I'm concerned.

Anyway, in a video that he uploaded on the weekend, Mike Reeves decides to hack a Roomba, those little automated vacuumy things.

And using a Raspberry Pi, a Bluetooth speaker, and some voice recordings, he does a little jiggery-pokery so that the Roomba, while it's doing its cleaning things and bumping into things as it does, like a table leg or a sofa or wall, it swears its butt off.
RAN LEVI
Okay, okay.
CAROLE THERIAULT
Now in a Karolery video, he tests out this hacked Roomba in a kind of dinner setting. So let me set the scene.

You got three roommates, they're all eating together while the Roomba crashes around their feet howling expletives.

Take a listen: "Oh, why was that created this way?" How likely would you be to adopt this into your household? This is hilarious.
GRAHAM CLULEY
Yes, yes, exactly. It's like it's really stubbed its toe.
CAROLE THERIAULT
Exactly. So he's basically—
RAN LEVI
Sounds like me.
CAROLE THERIAULT
It's quite fun. So today, Tuesday, on the day of recording, there's a few select tech media that have picked up and reported on this guy.

So you've got Next Web, Fast Company, those kind of guys. And I expect by the time we publish on Wednesday at midnight, this will be a much bigger story.

It has all the hallmarks of going viral. Anyway, back to me and my idea.
RAN LEVI
Good. I want that Roomba. I want that Roomba. I'll buy it.
CAROLE THERIAULT
Yes, right? Listen to my theory.
GRAHAM CLULEY
Alright, let's hear it.
CAROLE THERIAULT
As CEO of the BALLS, let me explain.
GRAHAM CLULEY
Sorry.
CAROLE THERIAULT
What? Body Advocating Lewd Language and Science.
RAN LEVI
Oh, okay.
GRAHAM CLULEY
Alright.
CAROLE THERIAULT
Yeah.
RAN LEVI
Yeah.
CAROLE THERIAULT
Let me explain how this will help me finally end the resistance to swearing. So there's this German expert.

I can't remember his name, but he showed that one way to get people over serious aversions that they suffer from is to basically lock them in with it for as long as possible until the panic and this fear subsides completely.

Say you were afraid of birds, crazy afraid.
GRAHAM CLULEY
Yes.
CAROLE THERIAULT
This guy would cure you by locking you in an aviary for hours on end.

And you would scream and freak out and panic and probably have one, two, ten panic attacks, but then your body would realize that your "I am dying" panic can't be trusted, right?

So it stops panicking. Boom.
RAN LEVI
So you're either healed or you go nuts.
CAROLE THERIAULT
Yep, 50/50.
GRAHAM CLULEY
My wife has a friend who has an aversion to canned sauces, so her idea of being locked in a pantry or something would be—
CAROLE THERIAULT
You'd bring her to Tesco's, right? Or Aldi or something.
GRAHAM CLULEY
Alright, yes, so you basically lock someone up with a great big hairy spider and then you say, look, you're over spider phobia, arachnophobia, rubber.
CAROLE THERIAULT
Yes, my theory is this: we need to wire up some sweary Roombas, place them in the houses of all those intolerant folks out there, and the barrage of sweary insults will indeed, after a while, make them immune to swearing.

They won't care anymore, and I've met my mission.
RAN LEVI
That's a start. That's a startup.
CAROLE THERIAULT
TM Carole Theriault.
RAN LEVI
Yeah. We can make more versions of this Roomba. You know, Canadian version: when the robot hits something, it apologizes.
CAROLE THERIAULT
Yeah, Quebec one, Carlis, you could say.
GRAHAM CLULEY
So Carole, when at the start of today's show, you said you were going to change the world for the better.
CAROLE THERIAULT
Yeah.
GRAHAM CLULEY
You are going to make people less intolerant of bad language by surrounding them with fowl speaking Roombas.
CAROLE THERIAULT
And people with Tourette's and people that are afflicted with bad language as well.
GRAHAM CLULEY
Okay.
CAROLE THERIAULT
Right?
GRAHAM CLULEY
Okay.
CAROLE THERIAULT
Tolerance is a great thing, wouldn't you agree, Ran?
RAN LEVI
Yeah, actually it reminds me of that robot in The Hitchhiker's Guide to the Galaxy. Marvin?
GRAHAM CLULEY
He's got this horrible pain down the diodes on his left-hand side.
CAROLE THERIAULT
Yes.
RAN LEVI
Exactly. Exactly. So now we've got that. I mean, science fiction is being realized. Not in the exact ways we thought it will.
CAROLE THERIAULT
Exactly. Together we can end the tyranny against swearing.
GRAHAM CLULEY
Frankly, who needs to fight climate change, right?
CAROLE THERIAULT
Exactly.
GRAHAM CLULEY
Who needs to do that? I think get your priorities right.
CAROLE THERIAULT
We've got bigger issues at hand right now, people.
GRAHAM CLULEY
Good.
CAROLE THERIAULT
Good. Let's go to Pick of the Week, for instance.
GRAHAM CLULEY
Very good, Carole.
RAN LEVI
Thank you very much.
GRAHAM CLULEY
Yes.
CAROLE THERIAULT
We are supported this week by Gartner. Gartner is the world's leading research and advisory company, and they are having a big event.
GRAHAM CLULEY
It's massive, I'll tell you. All the big security vendors are going to be there.

They're going to be talking about cyberattacks, artificial intelligence, blockchain, machine learning, and much more.

It's all taking place between June 17th, 18th and 19th at the Gaylord National Convention Center in National Harbor, Maryland.

So I'd really recommend that if you are a CISO, IT security and risk professional, you probably want to go to the Gartner Security and Risk Management Summit.
CAROLE THERIAULT
And listen up, listeners, you can receive $350 off the registration fee by using the code SMASHING with a G. To learn more, visit smashingsecurity.com/gartner.

We are also sponsored this week by our friends at LastPass. Now, Graham, isn't it something like 90% of security breaches involve a stolen password or a poor password?
GRAHAM CLULEY
Yeah, stolen passwords, poorly chosen passwords, reused passwords.

Passwords are really sort of the hinge pin of so many security attacks which happen, which means that you probably want an enterprise password manager like the one offered by LastPass.
CAROLE THERIAULT
Listeners can learn all about LastPass Enterprise at lastpass.com/smashing. You don't have to say forward slash, by the way, Graham, just say slash.

And we are also sponsored by MetaCompliance. Now MetaCompliance make this platform to help you train up all your employees in all things cybersecurity related.
GRAHAM CLULEY
That's right, you can simulate phishing attacks, you can teach them about password safety, all aspects of data security.

Go and sign up right now at smashingsecurity.com/metacompliance and you can see because you listen to this podcast. You're a listener to this podcast. Boom.
RAN LEVI
And welcome back.
GRAHAM CLULEY
And you join us on our favorite part of the show, the part of the show that we like to call Pick of the Week.
CAROLE THERIAULT
Pick of the Week.
RAN LEVI
And Pick of the Week. Took me a time to get on the wagon.
CAROLE THERIAULT
Yeah. Welcome aboard.
RAN LEVI
It's the lag. It's the lag.
GRAHAM CLULEY
Pick of the Week is the part of the show where everyone chooses something they like.

Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.

It doesn't have to be security related necessarily.
CAROLE THERIAULT
Well, shouldn't be.
RAN LEVI
Hmm.
GRAHAM CLULEY
Doesn't have to be. Now my Pick of the Week is a website.

Now I'm sure listeners remember we talked about a website a little while ago called thispersondoesnotexist.com, an extraordinary website which used artificial intelligence to create random computer-generated photos of a fictional person.

And these photos were in the main quite convincing.
CAROLE THERIAULT
Yes.
GRAHAM CLULEY
Sometimes they had an extra ear or a mouth in the middle of their forehead or something like that, but many of them didn't look like people who worked in tech support.

Many of them actually looked remarkably believable. Some of them I even quite fancied and thought, oh yeah, they're all right.
RAN LEVI
Actually, it was quite chilly to look at some of these pictures. I mean, they looked so real.
CAROLE THERIAULT
Yeah, yeah. It's just like Second Life, you know, 3.0.
GRAHAM CLULEY
Well, now another site has taken a new spin on things. There is a site called havethyfaked.me.

And havethyfaked me asks you to upload your own real photo or point it to a photo on the web, and it will then compare your photo to its collection of over 400,000 fake photos.

So you— You all right there, Carole?
RAN LEVI
So you—
CAROLE THERIAULT
Who's running this?
GRAHAM CLULEY
So you can find—
CAROLE THERIAULT
Where are the privacy legalese? I'm looking on the website. I see nothing.
GRAHAM CLULEY
So you can find out if you have a look-alike.
CAROLE THERIAULT
I'm looking for a picture of you. I'm looking for a picture of you.
GRAHAM CLULEY
I tested it. I haven't uploaded my photograph.
CAROLE THERIAULT
I'm putting your picture up right now.
GRAHAM CLULEY
Well, can you upload Ran's instead? Have you done it, Ran?
RAN LEVI
Yes, I did. I mean, I'm a serious guy. I try to be on the show, trying to prepare myself. And I've got nobody who looks like me in that estate.
CAROLE THERIAULT
You will now.
RAN LEVI
I'm either too ugly to be faked or I don't know, maybe probably too ugly.
GRAHAM CLULEY
Carole raises a quite reasonable concern, which is what the heck are they going to do with all of these photographs people are uploading?

Yes, because this could all be— this could be conveyor belted into some other artificial intelligence machine, or it could be going into some huge conglomerate.
CAROLE THERIAULT
Can we do a Whois? Who's— let's do a Whois.
GRAHAM CLULEY
Oh yes, because that will definitely answer it, won't it? They won't have thought of that one, Carole.
CAROLE THERIAULT
Anyway, they might not have. This is not looking that great so far.
GRAHAM CLULEY
Geoff Bezos registered this domain. Now, if you do look in the small print, if you do look in the small print, they're obviously aware that people might be concerned.

And they do say the website automatically deletes uploaded files 3 minutes after uploading and also removes additional information extracted from the photos for facial recognition.

But of course, you've only got their word for it, haven't you?
CAROLE THERIAULT
Whose word? Philip Wang?
GRAHAM CLULEY
Well, whoever's running the website, whoever you find on the Whois crawl.
CAROLE THERIAULT
That's the name, by Philip Wang. That's all we have.
GRAHAM CLULEY
Is it Philip Wang? Okay. All right.
RAN LEVI
Okay. I use the picture that is already, I mean, so, my picture is all over the web.
CAROLE THERIAULT
Oh, here come the excuses.
RAN LEVI
Yeah. I mean, I don't care.
GRAHAM CLULEY
I don't have any privacy at all. I don't care.
RAN LEVI
I don't care. My privacy is gone. Gone with the wind. 10 years ago, it was gone already.
GRAHAM CLULEY
Anyway, listeners, over to you. You feel free to upload pictures of yourself or indeed—
CAROLE THERIAULT
Just one co-host here, Carole Theriault, recommends that you just ignore this pick of the week entirely and on to Ran's pick of the week.
GRAHAM CLULEY
I thought it was interesting, interesting at least. Ran, what is your pick of the week?
RAN LEVI
Okay, I'm going to recommend a very interesting YouTube channel called Drugs Lab. It is a Dutch official governmental channel, which is important for our story.
GRAHAM CLULEY
Oh, is it run by the government?
RAN LEVI
It is run by the government.

And in it, there are, I think, three or four young guys in like the mid-20s, and they are trying in front of the camera every conceivable drug there is, from weed in the lowest extremity to cocaine, heroin, all sorts of mushrooms, whatever, in front of the camera.
CAROLE THERIAULT
I love the Dutch.
RAN LEVI
I do.
GRAHAM CLULEY
I do.
RAN LEVI
And it's amazing. I mean, the Dutch government apparently has a policy of, I mean, some of the drugs that they are showing are illegal in Holland.

So the policy is, okay, we know it's illegal.
GRAHAM CLULEY
No one would surely take illegal drugs though.
RAN LEVI
There are so many legal drugs, but apparently people... And they must be pretty serious, these illegal drugs, if they're illegal in Holland.
GRAHAM CLULEY
Yeah, I have to say. Yeah. Anyway, sorry, carry on.
CAROLE THERIAULT
Yeah.
RAN LEVI
Yeah. I mean, it's right. I mean, if you're going to be illegal in Holland, it's going to have to be a very risky drug. But it's very interesting.
CAROLE THERIAULT
I haven't heard of some of these drugs like Kamagra. What is that?
GRAHAM CLULEY
My goodness, Carole.
CAROLE THERIAULT
Yeah.
GRAHAM CLULEY
You've dropped the ball over the years. I think the "gra" is a hint. It's probably something related to Viagra, don't you think?
RAN LEVI
They actually do stuff while they're high with various drugs, like have sex, visit museums. I love the text. Have a party.

And they kind of let you see the real effects of drugs on real people and give you warnings when it's—why it's risky, how to do it properly if you're going to try.

And it's so refreshing to see somebody taking drugs, not in the, you know, the approach of don't do it, it's dangerous, but actually trying to explain what the risks are, why it's dangerous, why it can be used sometimes in a more—I mean, if you're using it, how to use it properly.

And I think, I mean, my personal take is that it's probably more effective than just saying, no, don't use it.
CAROLE THERIAULT
Because you trust it. You trust it. And that's why it's great.
RAN LEVI
It kind of turned me off certain kinds of drugs that I'm saying, I'll never—
CAROLE THERIAULT
Like Kamagra?
RAN LEVI
I don't remember that specific one.
CAROLE THERIAULT
And look at the views, guys. Look at the views. 100,000 views. Hey, listen, Theresa May, if you want to improve your standing in the UK, this is a seriously cool idea.
GRAHAM CLULEY
So I've watched a couple of these videos. Now, the videos that I watched were all in the Dutch language, so I didn't really understand what they were saying.
RAN LEVI
But they have subtitles.
GRAHAM CLULEY
Ah, and they were still quite entertaining. I actually found it quite—and they're very slickly produced and they're very sort of—
CAROLE THERIAULT
What did you learn, Graham?
GRAHAM CLULEY
Professional presenters. Well, what I found was I found it a little bit like The One Show, a show we have here on BBC TV.

But the difference being, of course, that to watch The One Show, you have to be taking drugs yourself to enjoy it.

Whereas here, it appears the presenters are the ones taking the drugs. Other than that, it's identical experience.
CAROLE THERIAULT
Do you think you get paid? You're like, look, you need to go on cocaine and we need you there for four hours and you have to do all this personal stuff. A tenner? Sounds good.
GRAHAM CLULEY
Get paid by the government as well. But it does, it does—
RAN LEVI
Would you do that kind of show? I would never do that.
GRAHAM CLULEY
No.
RAN LEVI
I mean, so dangerous.
GRAHAM CLULEY
I don't drink more than one cup of tea a day. That's enough for me. I'm not going crazier than that.
RAN LEVI
I don't want to get a psychosis because I tried some weird American mushroom. That's not part of my job description. I don't know. Well, that is a great channel.
CAROLE THERIAULT
Yeah. Well done, Holland. Yeah.
GRAHAM CLULEY
Well, it's an interesting approach by the government over there as well, isn't it?
CAROLE THERIAULT
Not going to get the edit till tomorrow, Graham. I know what my evening's all about. I'm going to be learning some stuff.
GRAHAM CLULEY
You could be editing all night long, Crow. You'll be fully awake. Crow, what's your pick of the week?
CAROLE THERIAULT
So my pick of the week found its way to me via Reddit. I've been following this sub called Influence Advice for a few months, and I find it really useful and cool.

So it links over to the— and forgive my pronunciation here, anyone who wants to help me, that's great— so Kletish website.
GRAHAM CLULEY
Kletish.
CAROLE THERIAULT
So K-L-E-T-I-S-H. S-C-H-E.
GRAHAM CLULEY
Okay.
CAROLE THERIAULT
Right?
RAN LEVI
Right.
CAROLE THERIAULT
Now, I've given you guys the link there. So basically, it's a kind of collection of articles all about advice on how people try to influence you or you can influence other people.

And as someone who studied rhetoric in college, I find it quite interesting. So one, I just pulled out a particular article here just to kind of give you an example here.

So, how master manipulators conceal their intentions. So I thought this would be very interesting to read, Graham, right?

As you're, you know, adept in the old manipulations, aren't you?
GRAHAM CLULEY
Oh, that's charming.
CAROLE THERIAULT
Well, let's just see if you would— let's just say if you feel this exposes you in any way, okay? So a master manipulator is someone who is patient and bides his or her time.

A manipulator's game is one of generating, storing, and not using the power until it's time. And the more skilled the manipulator, the fewer times you're looking to use this power.

You're looking to collect, invest, and build.
RAN LEVI
This sounds so dark side, doesn't it?
CAROLE THERIAULT
Doesn't it? Well, I heard you were from Israel, so I thought this will appeal to you, Ran, right?
RAN LEVI
We're all on the dark side here.
CAROLE THERIAULT
Exactly. Manipulative individuals tend to use the fact that you may be blind to some aspects of life which you can benefit from.

So for example, you might be being really good at work and I might not be doing so well.

I might be feeling a little nervous, right, that, Ran, you're doing so well in front of the boss, right?

And so I encourage you to go take a holiday, you know, and think it'll be good for your health, and you're looking tired.

And I keep doing this because my endgame is to get you out of the race so I can get a bit further ahead with the boss. But you might think, oh, this girl's so caring.
RAN LEVI
That's manipulation. That's smart.
GRAHAM CLULEY
What drew this to you? What drew you towards this, Carole?
RAN LEVI
That's evil.
CAROLE THERIAULT
No, no, it's not about becoming—
GRAHAM CLULEY
You've been reading this for months.
RAN LEVI
It's not about becoming evil.
GRAHAM CLULEY
What are you working on? What are you plotting?
CAROLE THERIAULT
An amazing audio drama, one day. Okay, look, that's one article.

Other ones are: why you should analyze live performances, why online anonymity should make you more positive, how to deliver bad news, how to entice people to hurry up.
GRAHAM CLULEY
Yeah, we've been recording for a while. Get a move on, Carole.
CAROLE THERIAULT
I'm done. Okay, seriously, check it out. It's a great resource. Cliché.com website.
RAN LEVI
There's actually a great book called How to Make Friends and Gain Influence by Dale Carnegie, which sounds, I mean, as evil as maybe this kind of manipulation, but it's actually quite helpful for people with social difficulties and tips for how to feel more natural in conversation.

So it can help you if it's used properly.
CAROLE THERIAULT
Hey, I read it. Look at me now.
GRAHAM CLULEY
On that bombshell, I think we've just about wrapped it up. Ran, thank you so much for joining us today.

I'm sure lots of our listeners would love to follow you online or find out more.
RAN LEVI
So probably the best way, the best site to go to is malicious.life. That's our podcast. Lots and lots of interesting episodes from the history of cybersecurity.

My Twitter handle is @ranlevi. That's R-A-N-L-E-V-I.
GRAHAM CLULEY
Simples. And you can follow us on Twitter @SmashingSecurity, no G. Twitter wouldn't allow us to have a G. And we've got a community up on Reddit too. You go and join us there.

Quickest way to find us is at smashingsecurity.com/reddit.

And if you are after a sticker or a t-shirt or a mug, you can also go to our online store where we've got all kinds of goodies. Go to smashingsecurity.com/store.
CAROLE THERIAULT
As always, we're hugely obliged to this week's Smashing Security sponsors: LastPass, Gartner, and MetaCompliance.

Their support helps us give you the show for free, so be sure to check out their offers. And of course, fist bumps to all you listeners out there.

Thank you for listening, supporting us, and helping us spread the word.
GRAHAM CLULEY
Until next time, cheerio, bye-bye.
RAN LEVI
Bye-bye, it's been great fun.
CAROLE THERIAULT
Bye-bye. Yay, it has been fun. Do you normally laugh a lot every day in your day-to-day life?
RAN LEVI
Yeah, I do, I do.
CAROLE THERIAULT
Excellent. You've got to, right? You've got to if you've got missiles overhead.
RAN LEVI
You know, it always looks more terrifying from the outside. I mean, actually yesterday we had a small event at the offices.

I run a podcasting company in Israel and we had an event on the roof and we were kind of happy to be on the roof because then you could see missiles flying.

There were actually missiles being fired from Gaza and of course back to Gaza. So we had great view. It sounds, it's dark humor.
CAROLE THERIAULT
Yes.
RAN LEVI
You were saying? Yes.
CAROLE THERIAULT
Yes. Yes. Very dark.
RAN LEVI
Dark, very dark.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and hosts the popular "Smashing Security" podcast. Follow him on TikTok, LinkedIn, Bluesky and Mastodon, or drop him an email.

7 comments on “Israel bombs building containing alleged Hamas hackers”

  1. Jim

    And what if they were just using a proxy server in that building? This is chilling

  2. Billy

    I wouldn't trust anything Israel say. They are known to be liars and often get caught out in the ir lies sooner or later. Unfortunately, the world doesn't blink an eye to check the authenticity of the report wherever Israel is concerned.

    1. coyote · in reply to Billy

      That's because the world – or most of it – blindly supports Israel despite the crimes it commits. Including things that are beyond hypocritical. Their settling removing people from their homes is the same thing as Lebensraum. Disgusting disregard for others and that's exactly what happened to the Jews – and others – during the Second World War. Oh hell anti-Semitism goes back centuries! Israel also uses white phosphorous (or did last I knew). And on the subject of Lebensraum and similar I read not long ago that Israel was evicting people from their homes – including Holocaust survivors! Unbelievable? No. Because of things they've done before. I believe it was also on their Holocaust Memorial Day to make it even worse (that I saw the articles anyway)! I have this vague memory they also in the past called some Holocaust survivors a risk to the state. Let's not forget that their blessed PM is guilty of something that they call out as horrible – revisionism. Telling the lie that Hitler wasn't going to gas the Jews until he talked with a Muslim … Right. First the Nazis just wanted them out of the Reich. There was the famous Madagascar Plan that fell out; there was also the 'leakage' of the ghettos. The Jews weren't even the Nazi's first enemies! Besides it was the 'euthanasia', 'wild euthanasia' and more so Aktion T4 that started the gas experiments. And ironically the first child of the 'euthanasia' programme was actually not targeted by the Nazis but rather a family member saw the suffering (loss of some limbs, deformed other limbs – something like that) and Hitler sent his doctor Karl Brandt to investigate to see if it was true. It was. And this only helped move things forward. They of course had their own ideals to help here but they also modelled their eugenics programme on the US eugenics programme – that in some states lasted until the 1970s even though the doctors were tried for this (certainly Karl Brandt was and he was executed despite not being a participant in the human experiments in the camps); one American said 'The Germans are beating us at our own game'. But they were even thanked (that is the family thanked the Nazis for the 'euthanasia')! Well of course there is a lot more to it but the point here is that Israel's PM is guilty of revisionism and that is what they say is a euphemism of Holocaust denial which is something they are obviously very very against and consider anti-Semitism to a high degree. So does much of the world where it's illegal to even suggest it (though not in the US). Well you can't have it both ways. Unless of course you are in fact Israel. My theory is that it's because of the fact the entire world didn't care about their plight; England turned down a deal of hostages lest the Nazis would want to unload more Jews upon them [England]. The US went out of its way to prevent many Jews from entering the nation. See also the SS St. Louis that nobody wanted. And then even after the war some Jews were imprisoned. Yet the worst of this all is that even an Israeli historian has admitted that they – Israel – abuse the Holocaust. Shameful. They even have a drone that decides by itself when to shoot itself! They also participate in assassinations.

      But there is so much more to it… Let's not forget the Turkish flotilla for yet another example. And going back to settling they even steamrolled over an American girl (as in child) who was there to protest. Says a lot doesn't it? All this in perspective I actually do believe Israel here. Whether or not the story is complete or not I have no doubt that they would bomb buildings of Hamas even if it was on faulty evidence. Whether it was really a cyberattack who can tell without more information? Who can tell with more information? You say unfortunately the world doesn't blink an eye to check the authenticity? Well consider all the UN resolutions that a certain nameless nation always vetoes. Yet it's also known that Israel is guilty of torture. Then again so is that nameless nation. There is heaps of evidence on this. And then there is the very well named website 'If American Knew' … They even point out the settling but there is much much more. And that's only on the home page! Look it up on Google – If Americans Knew.

      But of course we all know they're completely innocent and don't provoke attacks and don't have any part to play in the conflict! Well so many people of the world believe that anyway.

  3. J Lee

    Nice to see they still have time to make a joke while taking lives.

  4. Alfonso

    Hello Graham,
    Are you back in Facebook? I had the impression you quit.
    Regards,
    Alfonso
    P.S. As usual, I enjoy your articles

    1. Graham CluleyGraham Cluley · in reply to Alfonso

      No. I'm not on Facebook. :)

  5. Hayton

    The building may have been used by Hamas; I haven't seen any admission by Hamas that it was. But it most certainly contained the Gaza offices of the Turkish state news agency Anadolu, and it is implied that Anadolu occupied most or even all of the office space in the building. The Turks are taking this as a deliberate Israeli attempt to silence hostile news reporting at a time when Palestinians are staging demonstrations close to the border fence and many are being killed. So, as with most other news stories from the Middle East, don't believe initial reports wherever they come from; and try to corroborate any information being fed to you by checking multiple sources.

    https://www.timesofisrael.com/erdogan-blasts-israel-after-turkish-news-agency-in-gaza-bombed/

Leave a Reply to Jim Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.