More secret details of how Hamas planned the attack in Israel have emerged

Table of Contents

Tunneled phone lines allowed the operatives to secretly communicate with each other, making it impossible for Israeli intelligence officials to track them down, sources told CNN.

During the two years of planning, a small group operating in the tunnels used wired phone lines to communicate and plan the operation, but remained undetected until it was time to call in hundreds of Hamas fighters for the Oct. 7 rally. attack, sources said.

According to the sources, they avoided using computers or mobile phones for two years to avoid detection by Israeli or US intelligence.

“There hasn’t been much discussion or coordination outside of this group,” said one of the sources.

Intelligence shared by Israel with US officials reveals how Hamas hid planning for the operation by using old-fashioned counter-intelligence measures, such as holding face-to-face meetings and abandoning digital communications whose signals could be tracked by Israelis, instead using wired phones in tunnels.

It offers new insights into why Israel and the US were caught so off guard by Hamas, whose attack sent at least 1,500 militants across the border into Israel and killed at least 1,400 Israelis.

CNN did not see specific intelligence but spoke to sources familiar with it. The US Office of the Director of National Intelligence declined to comment, and the Israeli embassy in Washington did not respond to reporters’ inquiries.

Read the latest news on Hamas and Israel’s war HERE.

#secret #details #Hamas #planned #attack #Israel #emerged

Interview ‍with Security Analyst Dr. ⁤Sara Levi on the Use of Tunneled Phone Lines⁣ by Hamas

Interviewer: Thank you for ⁤joining us⁤ today, Dr. Levi. Recent reports have ‌highlighted that ​Hamas operatives used tunneled phone lines for covert communication in planning the October 7 attack. Can you provide some context on why ​this method was significant?

Dr. Levi: Absolutely. The‍ use of tunneled⁢ phone lines ⁢is⁤ critical because it allowed Hamas operatives to communicate without the risk of being monitored or intercepted by Israeli or U.S. intelligence. Traditional electronic communication methods—like mobile phones or computers—are ​easily tracked, so the decision to rely ​on wired ​lines in underground tunnels showcases a high level of operational security.

Interviewer: It seems this group was able⁣ to maintain secrecy during a⁢ two-year planning period. How does this reflect on Israel’s intelligence capabilities?

Dr. Levi: This situation reveals both the ingenuity of the operatives and a gap in intelligence‌ capabilities. Israeli intelligence is typically very effective, and the fact that this group remained undetected for an extended period indicates that they were intentionally isolating their planning activities from broader networks. This level of operational security suggests a ‌well-thought-out strategy to evade detection.

Interviewer: Sources have mentioned that there wasn’t much discussion or coordination outside this small group. Why is that important?

Dr. Levi: Limiting communication to a small group is crucial for maintaining ⁣secrecy. The fewer people involved, the less likely information will leak. It​ also ⁤minimizes the potential for miscommunication or accidental exposure to‍ external surveillance. This kind of⁣ compartmentalization is a ⁤tactic often employed in sensitive operations to enhance⁣ security.

Interviewer: What implications does this have for future ​intelligence and counterterrorism‍ efforts in the region?

Dr. Levi: This incident shows that traditional methods of intelligence gathering ⁤may need to be reassessed. As groups become more sophisticated in their communication strategies, ⁢intelligence agencies⁣ must adapt and develop new techniques to identify and thwart such operations. This also ⁣highlights the importance of ⁣human intelligence and on-the-ground sources, as technological surveillance alone may not suffice.

Interviewer: Thank‍ you, Dr. Levi, for your​ insights on this‍ developing‍ situation. Your expertise helps us understand the complexities at⁢ play in the ongoing‍ conflict.

Dr. Levi: Thank you for having me. ⁢It’s important to keep discussing these ⁣complexities as they evolve.

Discussion or coordination outside this small group. How crucial is this aspect in terms of operational security?

Dr. Levi: The limited communication with external entities significantly enhances operational security. By keeping the planning confined to a small, trusted group, Hamas could minimize the risk of leaks or betrayals. This approach also makes it much harder for intelligence agencies to infiltrate their operation, as fewer individuals mean fewer opportunities for gathering intelligence or implementing countermeasures.

Interviewer: Given that Hamas avoided modern digital communications, what lessons can be drawn for intelligence agencies in tracking such groups?

Dr. Levi: This situation underscores the fact that traditional counter-intelligence measures, such as face-to-face meetings and low-tech communications, are still very much relevant. Intelligence agencies need to adapt their strategies and broaden their understanding of how these groups operate, including the use of non-digital methods. It also highlights the importance of being aware of such unconventional tactics and developing ways to counter them.

Interviewer: In your opinion, what implications does this incident have for future conflicts in the region?

Dr. Levi: This incident not only demonstrates the tactical capabilities of groups like Hamas but also suggests that future conflicts may increasingly involve similar strategies. The reliance on low-tech solutions points to a larger trend where non-state actors will continue to seek ways to operate undetected. It’s essential for intelligence and military operations to evolve in response to these shifting tactics to ensure they remain one step ahead.

Interviewer: Thank you, Dr. Levi, for your insights into this complex issue.

Dr. Levi: Thank you for having me.

Leave a Replay