20.9 F
New York
Sunday, March 2, 2025

Iranian Espionage: Hebrew-Speaking Women Used to Send Sexually Explicit Images to IDF Soldiers

- Advertisement -

Related Articles

-Advertisement-

Must read

Getting your Trinity Audio player ready...

Iranian Espionage: Hebrew-Speaking Women Used to Send Sexually Explicit Images to IDF Soldiers

Edited by: TJVNews.com

In a startling revelation, Iran has allegedly employed a group of Hebrew-speaking women in the city of Mashhad to engage in a covert operation targeting Israeli soldiers. A report in The Jerusalem Post said that the operation involved sending sexually explicit images to soldiers over social media platforms, with the aim of extracting sensitive information. The young women were reportedly trained by the Islamic Revolutionary Guards Corps (IRGC) and operated through fake profiles, showcasing the multifaceted and deceptive tactics employed by Iranian intelligence, according to the JPost report.

A report by Iran International indicated that the women, fluent in Hebrew, contacted Israeli soldiers through various social media channels. The explicit videos and photos sent to the soldiers were real, despite the fake names and profiles used in the operation, as was reported by the JPost. The content ranged from women wearing hats, heavy makeup, as well as adorning themselves in revealing clothing to sending explicit nude images.

The report identifies two of the women involved in the operation as Samira Baghbani Tarshizi and Haniyeh Ghaffarian. As was noted in the JPost report, the revelation sheds light on the contradiction in Iran’s approach, where, despite strict measures against perceived immodesty and the execution of individuals for such offenses, Iranian women are exploited for intelligence-gathering purposes on social networks.

Iran International alleges that the information obtained from the Israeli soldiers was passed on to Hamas, emphasizing the interconnected nature of these intelligence operations within the broader context of regional conflicts, according to the JPost report.

This method of using honeypot-style entrapments is not new to the Israel Defense Forces (IDF). The JPost said that the report draws attention to Hamas’s historical use of similar tactics, noting that the group has employed these methods for years to jeopardize soldiers’ lives and gain access to military information.

In 2022, the IDF uncovered and thwarted a Hamas network posing as young women on social networks, attempting to implant spyware under the guise of a puzzle app, as was indicated in the JPost report. This incident highlights the recurring nature of such threats and the need for constant vigilance in the face of evolving tactics employed by hostile entities.

Iran International, a dissident Persian-language news television channel and website based in London, has been actively exposing activities related to the IRGC, as was indicated in the JPost report. The channel regularly provides insights into the covert operations and tactics employed by Iranian intelligence.

The exploitation of social media platforms for espionage purposes reflects a broader trend in contemporary conflicts. The IDF remains vigilant, emphasizing the ongoing challenges in securing sensitive military information in the digital age.

 

 

 

 

 

balance of natureDonate

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest article

- Advertisement -