Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Vulnerabilities & Exploits » Major security breach? ‘Pentagon documents’ leaked online – ET CISO

Major security breach? ‘Pentagon documents’ leaked online – ET CISO

Major security breach? ‘Pentagon documents’ leaked online – ET CISO

https://etimg.etb2bimg.com/thumb/msid-114416419,imgsize-896964,width-1200,height=765,overlay-etciso/data-breaches/major-security-breach-pentagon-documents-leaked-online.jpg

A pro-Iranian Telegram account has leaked alleged classified Pentagon documents that detail Israel’s preparations for a potential military strike against Tehran.

The documents, published by a pro-Iran Telegram account called “Middle East Spectator,” claim to provide insights into US intelligence observations of Israeli military activities conducted on October 15-16.

On October 1, Iran had launched a barrage of 200 ballistic missiles at Israel, prompting widespread alarm and sending many Israelis to bomb shelters. The attack reportedly came as retaliation for previous strikes in Lebanon that resulted in the deaths of key Hezbollah leaders and a July explosion in Tehran that killed Hamas leader Ismail Haniyeh. In response to this aggression, Israeli officials have been preparing for a counterattack, leading to increased military readiness.

The Pentagon and the Office of the Director of National Intelligence declined to comment on the leaked documents, but did not dispute their authenticity, said a report by Axios.

Details of the alleged leak

The leaked documents are said to originate from the National Geospatial-Intelligence Agency (NGA) and describe various military exercises conducted by the Israeli Air Force (IAF). According to these reports:

  • Missile activity: The IAF has been observed handling at least 16 Golden Horizon air-launched ballistic missiles (ALBMs) and 40 IS02 (Rocks) ALBMs since October 8. These munitions were reportedly used in prior strikes against Houthi positions in Yemen. Additionally, there are reports of “covert drone activity” and large-scale deployment exercises at key airbases such as Ramat David and Ramon.
  • Military exercises: The documents indicate that the IAF conducted extensive drills involving air-launched ballistic missiles, fighter jets, unmanned aerial vehicles (UAVs), and refueling tankers. These exercises are interpreted as preparations for a potential long-range strike against Iranian targets.
  • Aerial refueling: One document suggests that an aerial refueling exercise was conducted on October 16, enhancing Israel’s capabilities for long-range operations. Furthermore, the leaks imply that Israel has been using drones for intelligence gathering across the region, indicating a sophisticated level of military preparedness.
  • Covert operations: Reports also mention covert drone activities and large-scale deployment exercises at various Israeli airbases, including Ramat David and Ramon.

The leak has raised significant concerns within US intelligence circles. Officials told Axios that the situation was “deeply concerning”, with investigations underway to determine the source of the leak and how classified information reached a pro-Iran platform. While the authenticity of the documents has not been independently verified, US authorities are treating them seriously.

A senior official from Israel’s defense establishment has also expressed grave concern over the leak, indicating that it could compromise operational security. However, US sources suggest that this leak is unlikely to alter Israel’s military plans against Iran.

Strategic timing

The timing of this leak is critical as it coincides with heightened military readiness in Israel following Iran’s missile attack. Analysts speculate that the publication of these documents may be an attempt by Iranian-affiliated sources to disrupt Israeli operations or influence public perception regarding US-Israeli relations.The Pentagon’s silence on the matter has led some experts to speculate whether this could be a deliberate leak intended to showcase US oversight over Israeli military actions and reassure critics within the Democratic Party regarding US influence over its ally.

The leak also came hours ahead of a drone attack that targeted the holiday residence of Israeli Prime Minister Benjamin Netanyahu in Caesarea, although he and his wife were not present at the time. The attack involved three drones, one of which struck near his home, while the other two were intercepted by Israeli defense systems.

Israeli PM Netanyahu accused “agents of Iran” as being behind the assassination attempt on him and his wife.

  • Published On Oct 21, 2024 at 11:46 AM IST

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get latest insights & analysis.

Download ETCISO App

  • Get Realtime updates
  • Save your favourite articles


Scan to download App

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket