The command of the Syrian General Intelligence Division ignored security reports it received according to which the Israeli Mossad managed to penetrate military communication networks in Syria and used them to monitor the activities of the Iranian Revolutionary Guards (IRGC) and other militias associated with it.
This hacking was carried out not only on normal communication networks, but also included encrypted radio systems intended for military and security use, and is considered a direct threat to the Iranian presence in Syria.
THE PENETRATION MADE IT EASIER FOR ISRAEL TO REACH ITS GOALS
A security source told the "Suria TV" website that the hacking of the Syrian media networks by the Israeli Mossad is similar to the recent infiltration of Hezbollah's networks in Lebanon, which allowed Israel to build a detailed "target bank".
Over the past few weeks, secure information transmitted over hacked networks has facilitated the implementation of Israeli attacks in Damascus and its rural areas, Sweida, Homs, Hama, Latakia and Tartus, all of which have targeted facilities or senior commanders associated with the Revolutionary Guards or its affiliated and supported militias.
The source revealed that the bombing of the Almaza area in the capital Damascus, which occurred three times since the beginning of this October, came after information was received from the radios of the Syrian state security arm.
He added that the information was received after orders were given for security patrols to be near buildings where leading figures from Lebanon, Iraq and Iran were stationed, noting that the bombing occurred less than two hours after receiving the orders.
REMOVING THE SHROUD OF SECRECY FROM THE REVOLUTIONARY GUARDS
In mid-September, the Syrian regime began to distribute orders through military and security communication devices that included instructions regarding specific trucks that should not be detained or searches, they detailed routes of those trucks and the locations to which they were headed.
One of the shipments that sources of the "Syria TV" channel tracked using similar information, was bombed by Israel after its arrival at al-Tu'ala airport in Suwayda district, on the first of October.
The sources stated that the attack at the time resulted in the destruction of one truck out of four that left warehouses under the control of the Revolutionary Guards in the al-Kiswa area in the Damascus countryside to the Blay airport and the al-Tu'ala and Kholohola airports.
The As-Suwayda channel also confirms Israel's use of communication networks as one of the sources of intelligence information.
"CHANGES IN THE METHOD OF SECURITY WORK"
"Branch 40" of the General Intelligence Division changed the methods of deploying secret patrols around sites where people or facilities related to the Iranian Revolutionary Guards reside, and the method of searching for suspicious people, such as those who often move near these buildings or are photographed on the streets of the area.
During the last few weeks, the branch began to send precise instructions regarding the places to be secured, including details of addresses and names, and these instructions reached the security patrol personnel 24 hours before the start of the mission, the reporting source claimed.
The source estimated that the Mossad obtained this information in one of two ways: the first: wiretapping the communications of the security services branches and monitoring their activities, and the second: through elements within those branches who transmit important information to the Israeli side.