Analysis: This is Hamas’ Intelligence-Gathering Apparatus

Using open-source data, human intelligence, drones, and additional methods, Hamas displayed highly professional gathering and analysis capabilities, which served it well in preparation for the massacre it committed on October 7th

Destruction in Kibbutz Be'eri as the Israeli army regained control, October 7th 2023

On October 7th, Hamas forces infiltrated Israel, targeting pre-defined objectives as part of a carefully planned intelligence-driven operation.

Hamas forces knew how to reach the homes of the security coordinators in every residential community in the Gaza envelope. They knew the locations of IDF bases; the number of personnel at each base, their unit composition and activity routine; which protection system Israel tanks utilize; and more.

How did the Hamas terror organization gather such precise intelligence, that enabled it to plan and execute its heinous plan?  

For many years, Hamas has been operating its own intelligence organization, the Internal Security Force (ISF). At first, the ISF was subordinate to Hamas’ Ministry of Interior and primarily focused on countering Israeli espionage and thwarting subversive activities against Hamas. The ISF was established by members of the Izz ad-Din al-Qassam Brigades, the military wing of Hamas.

In 2015, a new intelligence division was established within the ISF. This division has been responsible for gathering information about Israel, which would enable Hamas to operate across all domains - land, air, sea, and cyber.

Hamas gathered intelligence on Israel using various methods:

Human intelligence (HUMINT): Operating Arab-Israelis and Bedouins who were tasked with gathering information, photographing sensitive sites, and so on. These individuals were able to collect information about IDF bases, access routes, unit deployments, and the like.

“Boots on the Ground” operations: Through workers from Gaza who crossed the border to work in Israel (both legally and illegally). It is likely that these assets were tasked with the more sensitive intel-gathering missions.

Provocative operations, such as firing rockets in specific quantities to assess the capabilities of the Iron Dome system in dealing with incoming projectiles or conducting incursion operations near the border to gauge the response times of the IDF and similar activities.

Cyber attacks: For many years, Hamas has been conducting cyber attacks against Israeli targets, in collaboration with Hezbollah and Iran. These attacks include social engineering operations against soldiers, who post personal details and information about their military service on social media.

At least three such major Hamas operations have revealed such tactics in the past. In these operations, they used avatars of women in order to engage in conversation with soldiers. After interacting with these avatars, soldiers were asked to install a video chat app on their phones, which turned the phones into surveillance devices from which additional information was extracted, such as photos, personal details, phone numbers, and more.

Hamas has also conducted cyber attacks against companies, organizations, and government agencies in order to gather the information it needs for planning its operational missions.

Visual intelligence: Hamas has made extensive use of visual intelligence gathered through open sources like Google Maps, on-the-ground reconnaissance, and aerial imagery captured using its drone system. Hamas has utilized visual intelligence to plan its attacks, determine entry points, seize control of Israeli communities, IDF bases, and more.

Open-Source Intelligence (OSINT): Hamas employed a variety of means to collect information from open sources, including visual intelligence from Google, and information about military bases, units, and soldiers from websites, social media, and news coverage.

The publicly available information regarding the IDF and Israel’s security array is extensive, and it is evident from captured materials how Hamas meticulously mapped out IDF units, unit commanders, force structures, weaponry, and more. The information seized from Hamas terrorists suggests a systematic and ongoing effort.

Technology Intelligence (TI): The documents found in the possession of the terrorists have revealed possible points of vulnerability on armored tanks, instructions for aiming weapons, the number of anti-tank missiles or RPGs to be fired at the tanks, and similar information.

The discovery of these additional documents, which detail Israeli warfare and weapon systems, strongly indicates that Hamas, with likely assistance from Iran and Hezbollah, has gathered technological intelligence and possesses the capability to analyze the performance of Israel's systems and platforms.

Such technological information can be gathered at defense exhibitions worldwide, from specific internet sources at a relatively low level (e.g., security company websites), or through reverse engineering of Israeli military equipment captured by Hamas or Hezbollah.

Iran is known for its capabilities in this field. The Iranian defense industry has developed several models of unmanned aerial vehicles and anti-tank missiles, often based on reverse engineering of Israeli defense systems.

Documents seized in the field and testimonies of captured terrorists, as documented in the media, indicate integrated intelligence capabilities and effective information gathering, research, and assessment capabilities that allowed Hamas to carry out their deliberate attack on that Saturday morning.

It should be noted that this is not the first time that such testimonies have been uncovered. In previous operations over the past decade, substantial intelligence data has been collected, indicating Hamas' capabilities to gather and analyze intelligence using a variety of available collection methods, which it can then apply on the battlefield against the IDF and Israel’s other security forces.

img
Rare-earth elements between the United States of America and the People's Republic of China
The Eastern seas after Afghanistan: the UK and Australia come to the rescue of the United States in a clumsy way
The failure of the great games in Afghanistan from the 19th century to the present day
Russia, Turkey and United Arab Emirates. The intelligence services organize and investigate