Hebrew media: The privacy of Israelis has been trampled by Shabak under the pretext of war
A Hebrew-language media revealed that the Shabak intelligence and public security service of the Zionist regime is invading the most private privacy of Israelis under the pretext of war. |
According to the Hebrew group Tasnim News Agency
, Kalakalist newspaper announced in a report that was published in today’s Sunday issue, based on a Shabak recipe, it is allowed to penetrate any computer without the user’s knowledge and transfer the information contained in it to security services, this is only part of the wave These are the laws that Israel implemented in the shadow of the war.
This report continues, during the recent months and in the shadow of the events of October 7 , Israeli legislators tirelessly adopted a number of legal measures that could have a broad impact on privacy protection laws in Israel.
According to this Hebrew media, some of these laws allow security services to violate people’s right to privacy.
Among these laws Infringing on the privacy of Israelis is the interim order law, passed in November 2023, which allows the security services to process the information needed in any way possible to identify the bodies, as well as to determine the whereabouts of missing persons and prisoners. And to deal with possible hostile or warlike actions, the security services are allowed to have the biometric information bank and they can store this information even without the consent of the owner of this information.
100th day of “Aqsa Storm”| An explosion in a refinery in “Haifa”/ The Palestinian resistance in Gaza has reached 100 days/ The imminent resignation of Shabak head
Another example of these actions is the proposal for the Shabak law that was published recently, which allows the Chief of Staff of the Army to authorize the Shabak to collect information and data with the aim of neutralizing activities that disrupt Israel’s security, and in this regard, the relevant institutions in This relationship has allowed secret penetration into people’s computers and smart mobile devices for espionage purposes, and they even try to stop the activity of computers and delete the information contained in them so that this information is not allowed to be used in terrorist and espionage activities.
Publisher | Tasnim News |