Interview reveals state of mind of Israeli intelligence prior to October 7 attack
April 1, 2024 4 Comments
ON MARCH 23, CHANNEL 12 of Israeli television aired a remarkable interview with Sassi Elya, the former director of technology at the Israel Security Agency (ISA). Better known by the acronyms Shin Bet or Shabak, the ISA is Israel’s domestic security service. The interview had initially been scheduled for broadcast as part of the evening news on October 7, 2023. However, its airing was canceled due to the attack on Israel by Hamas, which occurred that morning.
But on March 23, after about 5 months, Channel 12 aired the original interview with Elya. The retired official spoke with glee about the advanced technological capabilities developed by the ISA in order to prevent terrorist attacks against Israel. Elya said Israeli intelligence had built a unique system, known as “the Tool”, which allegedly provided intimate knowledge about the life of every Palestinian living in the West Bank and Gaza. This technologically advanced surveillance system allegedly monitored every move of its targets, all for the purpose of preventing potential terrorist attacks against the Jewish state. Elya claimed that, as a result of this advanced technological system, there was no chance that Israel would be surprised by Palestinian militants. This system was so advanced, he said, that intelligence agencies from all over the world were coming to Israel to learn about it.
Thanks to Channel 12, we can now examine Elya’s interview retrospectively, and especially in light of the ISA’s poor performance on October 7, as well as its failure to warn Israeli authorities about Hamas’ preparations for the attack. Notably, Elya was interviewed again for the same television program. Predictably, he admitted that his prior assessment had been wrong and regretted being so overly confident about the technology.
This case demonstrates the overestimation by Israeli intelligence of its own capabilities, because of arrogance and over-confidence. This approach refutes the basic premise of intelligence work: be skeptical and be modest. Furthermore, this case highlights that Israeli intelligence agencies overly relied on technology (SIGINT) in the lead-up to October 7, while seemingly neglecting the low-tech activity of gathering information through human intelligence (HUMINT).
The system that Elya described in his initial interview as the ultimate counterintelligence tool was reportedly criticized internally by some in the ISA for gathering huge amounts of information without offering sufficient analytical capability. This imbalance between collection and analysis can render an entire surveillance system practically useless. The bottom line is that, almost by accident, we are now aware of the state of mind that the ISA was in before the sudden attack by Hamas on October 7, which cost so many lives as a result of the ISA’s complacency.
► Author: Avner Barnea | Date: 01 April 2024 | Permalink
Dr. Avner Barnea is research fellow at the National Security Studies Center of the University of Haifa in Israel. He served as a senior officer in the Israel Security Agency (ISA). He is the author of We Never Expected That: A Comparative Study of Failures in National and Business Intelligence (Lexington Books, 2021).
EVEN RUSSIAN MILITARY COMMANDERS and intelligence officials on the ground near the Ukrainian border are in the dark about whether the Kremlin intends to invade Ukraine in the coming weeks, according to a report. The American news network CNN
For the first time since 1985, when the Federal Bureau of Investigation broke the John Walker spy ring, an active United States Navy officer has been charged with espionage. On Sunday, the US Navy reported the arrest Lt. Cmdr. Edward C. Lin, who faces two counts of espionage and three counts of attempted espionage, among other charges. Aside from a three-page, heavily redacted
The head of the United States’ largest intelligence agency secretly visited Israel last week, reportedly in order to explore forging closer ties between American and Israeli cyber intelligence experts. Israeli newspaper Ha’aretz
British and American intelligence services worked together to hack Israeli unmanned aerial vehicles in order to acquire information on the Jewish state’s military intentions in the Middle East, according to documents leaked last week. Online publication The Intercept, said the operation was code-named ANARCHIST and was a joint project of Britain’s General Communications Headquarters (GCHQ) and America’s National Security Agency (NSA). The publication said it acquired documents about the operation from former NSA contractor Edward Snowden, who defected to Russia in 2013 and was offered political asylum by Moscow.
Canada says it will stop sharing certain types of intelligence with some of its closest international allies until it ensures that Canadian citizens’ information is not included in the data given to foreign spy agencies. The announcement follows an official admission, made earlier this week, that a Canadian intelligence agency failed to remove Canadian citizens’ data from information it shared with member-agencies of the so-called Five Eyes Agreement. The pact, which is sometimes referred to as the UK-USA Security Agreement, has been in existence since World War II. It provides a multilateral framework for cooperation in signals intelligence (SIGINT) between the United Kingdom, the United States, Canada, Australia, and New Zealand.













Researchers uncover secretive Russian spy unit by studying its commemorative badges
July 21, 2025 by Joseph Fitsanakis 2 Comments
Earlier this month, CheckFirst published its latest report titled “OSINT & Phaleristics: Unveiling FSB’s 16th Center SIGINT Capabilities”. The 36-page report focuses on the study of Russian government-issued commemorative badges—also known as challenge coins—relating to Center 16 (16-й Центр). Also known as Military Unit 71330, Center 16 is a secretive SIGINT unit that houses most of the cyber espionage capabilities of Russia’s Federal Security Service (FSB).
Challenge coins are custom-made medallions given by military, intelligence, and government agencies to recognize service, commemorate achievements, or build morale. Originating in the United States military during World War I, and popularized during the Vietnam War, challenge coins are routinely exchanged in ceremonies or offered to personnel as tokens of camaraderie and loyalty within a specific unit or mission.
Often regarded as collectors’ items, challenge coins from various agencies are often resold on websites such as eBay, or displayed online on websites maintained by private collectors. CheckFirst researchers tracked down several versions of Center 16 challenge coins found on a variety of publicly available websites, as well as on the websites of Russian challenge coin manufacturers, such as GosZnak, SpetsZnak, or Breget.
Based on this OSINT methodology, CheckFirst researchers were able to identify 10 distinct directorates within Center 16, which specialize on various aspects of defensive and offensive cyber espionage. Previously only a single Center 16 directorate had been identified in the unclassified domain. Moreover, by examining geographic indicators found on several of challenge coins, such as maps or coordinates, CheckFirst researchers were able to partly map out the geographic structure of Center 16, locating nearly a dozen interception facilities throughout Russia.
► Author: Joseph Fitsanakis | Date: 21 July 2025 | Permalink
Filed under Expert news and commentary on intelligence, espionage, spies and spying Tagged with challenge coins, commemorative badges, cyberespionage, Finland, FSB, FSB Center 16, News, OSINT, Russia, SIGINT