Raed Moussa-Gaza

Abu Osama uses an electronic application to control the use of his children on the Internet and social media platforms and monitor their behavior, in order to protect them from the damage "dive" in the maze of these platforms, and the bad use of them.

Working in the intelligence service of one of the resistance factions in Gaza, Abu Osama realizes that "the reality of the clash" with the Israeli intelligence services forces residents, like the competent security services, to take all measures to protect the home front.

Abu Osama told Al Jazeera Net that community security starts from the family, and it is necessary to protect family members and immunize them against any attempt to penetrate or overthrow by the Israeli intelligence services using technology and social media and widespread.

The Gaza Strip is currently witnessing security and community awareness campaigns, in light of the Ministry of Interior and National Security, which is run by the Islamic Resistance Movement (Hamas), on new methods used by the Israeli intelligence to trap citizens in its traps, and bring information about the Palestinian people and resistance.

Charity official and journalist
The Ministry of Interior cited two registrations through WhatsApp, which it published on its official website, showing the methods of occupation intelligence by impersonating a charity official who seeks to provide assistance, and an Israeli journalist who communicates with a Palestinian journalist. The aim is to gather intelligence.

The Ministry of Interior said that among the intelligence methods is the so-called "coordinator" on social networking sites, a page run by an Israeli officer who monitors the situation in the Gaza Strip, warning that giving any information to him is a treason punishable by law.

She stated that the security services succeeded in the context of the complex security conflict with the occupation of paralyzing the ability of its customers; which made him live in a state of helplessness, and limited the ability to move inside the Gaza Strip, or gather intelligence, he finally used new ways to access security information in a manner of circumvention and deception, In the form of associations, institutions and pages that provide assistance and services to citizens and facilitate their work.

Abu Osama said that these intelligence pages also work to "assassinate national figures and symbols of resistance morally," by broadcasting and promoting false rumors and stories to discredit them in the Palestinian street.

Lift the cover
In this regard, the "Joint Operations Room" of the resistance factions in Gaza announced that it decided to lift the cover for everyone who deals with the "Coordinator", considering that some Palestinian personalities deal with the Coordinator and his office officers are very dangerous, and conduct contrary to national values.

The "national and Islamic forces" that the official security services and belonging to the resistance revealed "serious information," highlighted this serious issue, and the systematic targeting by the occupation intelligence against Gaza.

Community awareness expert Mohammed Abu Harbeed said that the Israeli intelligence services are working to build an "information bank", using social media platforms, and through pages such as the "coordinator" and the centers of study and education, and charities, through which they practice "the art of deception and penetration of minds."

Abu Harbeed explained to Al Jazeera Net that the enemy is trying through these platforms, as well as telephone communications, to appear humanely, by offering to facilitate the need for people to travel or treatment or relief aid, which is considered these platforms as a bridge for communication between the recruitment services and the presumed victims. The Coordinator presents the recipes of Palestinian cuisine in order to create interaction and spread.

He said that "the enemy 's goal behind this is to access important information to help him in his hostile action against the resistance," warning that "the enemy is not content with its pages, but infiltrate into groups and community forums, such as meetings of women, crossings, students and others, to weave a relationship with its leaders in soft ways ".

Abu Harbeed urged the Palestinian family to "educate their children about the dangers of modern intelligence methods, without resorting to total deprivation of the use of technology. Deprivation leads to delinquency.

Information treasure
Dr. Ibrahim Habib, an expert in security affairs, told Al Jazeera Net that social media has become one of the most dangerous intelligence methods, in light of the state of great openness, and reach the target more easily than the traditional methods of projection and recruitment.

Habib warned of the danger of underestimating the information circulated through these pages, no matter how simple, they constitute a "treasure" of information that the intelligence services can analyze and employ them in drawing an accurate picture of the political, social and economic reality and all aspects of life.

"You should not be completely trusted that there is a 100% secure electronic program," said Mahmoud Abu Ghosh, an information security researcher for Al Jazeera Net. "Once you enter the Internet, you are in an open space, but there are protection measures that limit the risk of hacking."

He advised users of smartphones not to use any applications except through its official stores, and be careful to read the terms of use, and know the powers that the application requests to obtain, in terms of access to the camera and personal accounts and phone data, pointing out that informal applications sometimes carry accurate spyware, and requests Unwarranted access to many other data and phone applications.

Abu-Ghosh explained that among these applications are attractive names and do not raise doubts, including an application with the name of "your prayers", which requests at the time of verification to obtain the powers of "suspicious" and unjustified.

Abu Ghosh also warned against video games on smartphones that demand wide powers on the phone, broadcasting disrespectful and inappropriate ads and not suitable for children who are the main users of these games.

To achieve a high degree of security, Abu Ghosh urged Internet users not to use public wireless networks in the street, anonymous, and activate the feature of "two-factor authentication", and careful not to save important photos and personal data on the phone memory.