{"id":55785,"date":"2024-04-04T14:12:14","date_gmt":"2024-04-04T14:12:14","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35743\/Israel-Used-AI-To-Identify-37-000-Hamas-Targets.html"},"modified":"2024-04-04T14:12:14","modified_gmt":"2024-04-04T14:12:14","slug":"israel-used-ai-to-identify-37000-hamas-targets","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/","title":{"rendered":"Israel Used AI To Identify 37,000 Hamas Targets"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\/0_285_5151_3091\/master\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"dcr-4cudl2\">The Israeli military\u2019s bombing campaign in <a href=\"https:\/\/www.theguardian.com\/world\/gaza\" data-link-name=\"in body link\">Gaza<\/a> used a previously undisclosed AI-powered database that at one stage identified 37,000 potential targets based on their apparent links to Hamas, according to intelligence sources involved in the war.<\/p>\n<p class=\"dcr-4cudl2\">In addition to talking about their use of the AI system, called Lavender, the intelligence sources claim that Israeli military officials permitted large numbers of Palestinian civilians to be killed, particularly during the early weeks and months of the <a href=\"https:\/\/www.theguardian.com\/world\/israel-hamas-war\" data-link-name=\"in body link\">conflict<\/a>.<\/p>\n<p class=\"dcr-4cudl2\">Their unusually candid testimony provides a rare glimpse into the first-hand experiences of Israeli intelligence officials who have been using machine-learning systems to help identify targets during the six-month war.<\/p>\n<p class=\"dcr-4cudl2\">Israel\u2019s use of powerful AI systems in its war on Hamas has entered uncharted territory for advanced warfare, raising a host of legal and moral questions, and transforming the relationship between military personnel and machines.<\/p>\n<p class=\"dcr-4cudl2\">\u201cThis is unparalleled, in my memory,\u201d said one intelligence officer who used Lavender, adding that they had more faith in a \u201cstatistical mechanism\u201d than a grieving soldier. \u201cEveryone there, including me, lost people on October 7. The machine did it coldly. And that made it easier.\u201d<\/p>\n<p class=\"dcr-4cudl2\">Another Lavender user questioned whether humans\u2019 role in the selection process was meaningful. \u201cI would invest 20 seconds for each target at this stage, and do dozens of them every day. I had zero added-value as a human, apart from being a stamp of approval. It saved a lot of time.\u201d<\/p>\n<figure id=\"c3b630f4-2078-476e-b03f-c7a593251c84\" data-spacefinder-role=\"showcase\" data-spacefinder-type=\"model.dotcomrendering.pageElements.ImageBlockElement\" class=\" dcr-5h0uf4\"><figcaption class=\"dcr-1bhe99k\"><span class=\"dcr-1inf02i\"><svg width=\"18\" height=\"13\" viewBox=\"0 0 18 13\"><path d=\"M18 3.5v8l-1.5 1.5h-15l-1.5-1.5v-8l1.5-1.5h3.5l2-2h4l2 2h3.5l1.5 1.5zm-9 7.5c1.9 0 3.5-1.6 3.5-3.5s-1.6-3.5-3.5-3.5-3.5 1.6-3.5 3.5 1.6 3.5 3.5 3.5z\" \/><\/svg><\/span><span class=\"dcr-1qvd3m6\">Palestinian children salvage items amid the destruction caused by Israeli bombing in Bureij, central Gaza, on 14 March.<\/span> Photograph: AFP\/Getty Images<\/figcaption><\/figure>\n<p class=\"dcr-4cudl2\">The testimony from the six intelligence officers, all who have been involved in using AI systems to identify Hamas and Palestinian Islamic Jihad (PIJ) targets in the war, was given to the journalist Yuval Abraham for a <a href=\"https:\/\/www.972mag.com\/lavender-ai-israeli-army-gaza\/\" data-link-name=\"in body link\">report published by the Israeli-Palestinian publication +972 Magazine and the Hebrew-language outlet Local Call<\/a>.<\/p>\n<p class=\"dcr-4cudl2\">Their accounts were shared exclusively with the Guardian in advance of publication. All six said that Lavender had played a central role in the war, processing masses of data to rapidly identify potential \u201cjunior\u201d operatives to target. Four of the sources said that, at one stage early in the war, Lavender listed as many as 37,000 Palestinian men who had been linked by the AI system to Hamas or PIJ.<\/p>\n<p class=\"dcr-4cudl2\">Lavender was developed by the Israel Defense Forces\u2019 elite intelligence division, Unit 8200, which is comparable to the US\u2019s National Security Agency or GCHQ in the UK.<\/p>\n<p class=\"dcr-4cudl2\">Several of the sources described how, for certain categories of targets, the IDF applied pre-authorised allowances for the estimated number of civilians who could be killed before a strike was authorised.<\/p>\n<p class=\"dcr-4cudl2\">Two sources said that during the early weeks of the war they were permitted to kill 15 or 20 civilians during airstrikes on low-ranking militants. Attacks on such targets were typically carried out using unguided munitions known as \u201cdumb bombs\u201d, the sources said, destroying entire homes and killing all their occupants.<\/p>\n<p><gu-island name=\"InteractiveBlockComponent\" priority=\"critical\" deferuntil=\"idle\" props=\"{&quot;url&quot;:&quot;https:\/\/interactive.guim.co.uk\/embed\/from-tool\/generic\/index.html?vertical=News&amp;opinion-tint=false&amp;title=Story%20tips%3F&amp;description=Do%20you%20have%20information%20about%20this%20story%3F%20Email%20%3Ca%20style%3D%22color%3A%23ab0613%22%20href%3D%22mailto%3Ainvestigations%40theguardian.com%22%3Einvestigations%40theguardian.com%3C%2Fa%3E%2C%20or%20use%20Signal%20or%20WhatsApp%20to%20message%20(UK)%20%2B44%207584%20640566%20or%20(US)%20%2B1%20646%20886%208761.%20For%20the%20most%20secure%20communications%2C%20use%20%3Ca%20style%3D%22color%3A%23ab0613%22%20href%3D%22https%3A%2F%2Fwww.theguardian.com%2Fsecuredrop%22%3ESecureDrop%3C%2Fa%3E%20or%20see%20%3Ca%20style%3D%22color%3A%23ab0613%22%20href%3D%22https%3A%2F%2Fwww.theguardian.com%2Fhelp%2Fng-interactive%2F2017%2Fmar%2F17%2Fcontact-the-guardian-securely%22%3Eour%20guide%3C%2Fa%3E.&amp;link=false&quot;,&quot;scriptUrl&quot;:&quot;https:\/\/interactive.guim.co.uk\/embed\/iframe-wrapper\/0.1\/boot.js&quot;,&quot;alt&quot;:&quot;story tips embed&quot;,&quot;format&quot;:{&quot;display&quot;:0,&quot;theme&quot;:0,&quot;design&quot;:0},&quot;elementId&quot;:&quot;a0922ffd-b8ab-47d4-95f8-d5923bf45736&quot;,&quot;isMainMedia&quot;:false}\" config=\"{&quot;renderingTarget&quot;:&quot;Web&quot;,&quot;darkModeAvailable&quot;:false}\"><\/p>\n<figure id=\"a0922ffd-b8ab-47d4-95f8-d5923bf45736\" data-alt=\"story tips embed\" data-testid=\"interactive-element-story%20tips%20embed\" data-spacefinder-role=\"inline\" class=\"element element-interactive element--inline element-inline dcr-1r6vapj\"><a data-name=\"placeholder\" href=\"https:\/\/interactive.guim.co.uk\/embed\/from-tool\/generic\/index.html?vertical=News&amp;opinion-tint=false&amp;title=Story%20tips%3F&amp;description=Do%20you%20have%20information%20about%20this%20story%3F%20Email%20%3Ca%20style%3D%22color%3A%23ab0613%22%20href%3D%22mailto%3Ainvestigations%40theguardian.com%22%3Einvestigations%40theguardian.com%3C%2Fa%3E%2C%20or%20use%20Signal%20or%20WhatsApp%20to%20message%20(UK)%20%2B44%207584%20640566%20or%20(US)%20%2B1%20646%20886%208761.%20For%20the%20most%20secure%20communications%2C%20use%20%3Ca%20style%3D%22color%3A%23ab0613%22%20href%3D%22https%3A%2F%2Fwww.theguardian.com%2Fsecuredrop%22%3ESecureDrop%3C%2Fa%3E%20or%20see%20%3Ca%20style%3D%22color%3A%23ab0613%22%20href%3D%22https%3A%2F%2Fwww.theguardian.com%2Fhelp%2Fng-interactive%2F2017%2Fmar%2F17%2Fcontact-the-guardian-securely%22%3Eour%20guide%3C%2Fa%3E.&amp;link=false\" class=\"dcr-1eupayo\">story tips embed<\/a><\/figure>\n<p><\/gu-island><\/p>\n<p class=\"dcr-4cudl2\">\u201cYou don\u2019t want to waste expensive bombs on unimportant people \u2013 it\u2019s very expensive for the country and there\u2019s a shortage [of those bombs],\u201d one intelligence officer said. Another said the principal question they were faced with was whether the \u201ccollateral damage\u201d to civilians allowed for an attack.<\/p>\n<p class=\"dcr-4cudl2\">\u201cBecause we usually carried out the attacks with dumb bombs, and that meant literally dropping the whole house on its occupants. But even if an attack is averted, you don\u2019t care \u2013 you immediately move on to the next target. Because of the system, the targets never end. You have another 36,000 waiting.\u201d<\/p>\n<p class=\"dcr-4cudl2\">According to conflict experts, if Israel has been using dumb bombs to flatten the homes of thousands of Palestinians who were linked, with the assistance of AI, to militant groups in <a href=\"https:\/\/www.theguardian.com\/world\/gaza\" data-link-name=\"in body link\" data-component=\"auto-linked-tag\">Gaza<\/a>, that could help explain the shockingly high death toll in the war.<\/p>\n<p class=\"dcr-4cudl2\">The health ministry in the Hamas-run territory says 33,000 Palestinians have been killed in the conflict in the past six months. <a href=\"https:\/\/www.ochaopt.org\/content\/hostilities-gaza-strip-and-israel-reported-impact-day-45\" data-link-name=\"in body link\">UN data<\/a> shows that in the first month of the war alone, 1,340 families suffered multiple losses, with 312 families losing more than 10 members.<\/p>\n<figure id=\"cdd518b0-44f2-450e-9d6c-059a0efdf82e\" data-spacefinder-role=\"inline\" data-spacefinder-type=\"model.dotcomrendering.pageElements.ImageBlockElement\" class=\" dcr-173mewl\"><figcaption class=\"dcr-10c8vbz\"><span class=\"dcr-1inf02i\"><svg width=\"18\" height=\"13\" viewBox=\"0 0 18 13\"><path d=\"M18 3.5v8l-1.5 1.5h-15l-1.5-1.5v-8l1.5-1.5h3.5l2-2h4l2 2h3.5l1.5 1.5zm-9 7.5c1.9 0 3.5-1.6 3.5-3.5s-1.6-3.5-3.5-3.5-3.5 1.6-3.5 3.5 1.6 3.5 3.5 3.5z\" \/><\/svg><\/span><span class=\"dcr-1qvd3m6\">Israeli soldiers stand on the Israeli side of the Israel-Gaza border surveying the Palestinian territory on 30 March.<\/span> Photograph: Amir Cohen\/Reuters<\/figcaption><\/figure>\n<p class=\"dcr-4cudl2\">Responding to the publication of the testimonies in +972 and Local Call, the <a href=\"https:\/\/www.theguardian.com\/world\/2024\/apr\/03\/israel-defence-forces-response-to-claims-about-use-of-lavender-ai-database-in-gaza\" data-link-name=\"in body link\">IDF said in a statement<\/a> that its operations were carried out in accordance with the rules of proportionality under international law. It said dumb bombs are \u201cstandard weaponry\u201d that are used by IDF pilots in a manner that ensures \u201ca high level of precision\u201d.<\/p>\n<p class=\"dcr-4cudl2\">The statement described Lavender as a database used \u201cto cross-reference intelligence sources, in order to produce up-to-date layers of information on the military operatives of terrorist organisations. This is not a list of confirmed military operatives eligible to attack.<\/p>\n<p class=\"dcr-4cudl2\">\u201cThe IDF does not use an artificial intelligence system that identifies terrorist operatives or tries to predict whether a person is a terrorist,\u201d it added. \u201cInformation systems are merely tools for analysts in the target identification process.\u201d<\/p>\n<h2 id=\"lavender-created-a-database-of-tens-of-thousands-of-individuals\">Lavender created a database of tens of thousands of individuals<\/h2>\n<p class=\"dcr-4cudl2\">In earlier military operations conducted by the IDF, producing human targets was often a more labour-intensive process. Multiple sources who described target development in previous wars to the Guardian, said the decision to \u201cincriminate\u201d an individual, or identify them as a legitimate target, would be discussed and then signed off by a legal adviser.<\/p>\n<p class=\"dcr-4cudl2\">In the weeks and months after 7 October, this model for approving strikes on human targets was dramatically accelerated, according to the sources. As the IDF\u2019s bombardment of Gaza intensified, they said, commanders demanded a continuous pipeline of targets.<\/p>\n<p class=\"dcr-4cudl2\">\u201cWe were constantly being pressured: \u2018Bring us more targets.\u2019 They really shouted at us,\u201d said one intelligence officer. \u201cWe were told: now we have to fuck up Hamas, no matter what the cost. Whatever you can, you bomb.\u201d<\/p>\n<p class=\"dcr-4cudl2\">To meet this demand, the IDF came to rely heavily on Lavender to generate a database of individuals judged to have the characteristics of a PIJ or Hamas militant.<\/p>\n<p class=\"dcr-4cudl2\">Details about the specific kinds of data used to train Lavender\u2019s algorithm, or how the programme reached its conclusions, are not included in the accounts published by +972 or Local Call. However, the sources said that during the first few weeks of the war, Unit 8200 refined Lavender\u2019s algorithm and tweaked its search parameters.<\/p>\n<p class=\"dcr-4cudl2\">After randomly sampling and cross-checking its predictions, the unit concluded Lavender had achieved a 90% accuracy rate, the sources said, leading the IDF to approve its sweeping use as a target recommendation tool.<\/p>\n<p class=\"dcr-4cudl2\">Lavender created a database of tens of thousands of individuals who were marked as predominantly low-ranking members of Hamas\u2019s military wing, they added. This was used alongside another AI-based decision support system, called <a href=\"https:\/\/www.theguardian.com\/world\/2023\/dec\/01\/the-gospel-how-israel-uses-ai-to-select-bombing-targets\" data-link-name=\"in body link\">the Gospel<\/a>, which recommended buildings and structures as targets rather than individuals.<\/p>\n<figure id=\"13f03f3a-6f82-451c-a90c-a8ecac0ca725\" data-spacefinder-role=\"inline\" data-spacefinder-type=\"model.dotcomrendering.pageElements.ImageBlockElement\" class=\" dcr-173mewl\"><figcaption class=\"dcr-10c8vbz\"><span class=\"dcr-1inf02i\"><svg width=\"18\" height=\"13\" viewBox=\"0 0 18 13\"><path d=\"M18 3.5v8l-1.5 1.5h-15l-1.5-1.5v-8l1.5-1.5h3.5l2-2h4l2 2h3.5l1.5 1.5zm-9 7.5c1.9 0 3.5-1.6 3.5-3.5s-1.6-3.5-3.5-3.5-3.5 1.6-3.5 3.5 1.6 3.5 3.5 3.5z\" \/><\/svg><\/span><span class=\"dcr-1qvd3m6\">Two Israeli air force F15 fighter jets near the city of Gedera, southern Israel, on 27 March.<\/span> Photograph: Abir Sultan\/EPA<\/figcaption><\/figure>\n<p class=\"dcr-4cudl2\">The accounts include first-hand testimony of how intelligence officers worked with Lavender and how the reach of its dragnet could be adjusted. \u201cAt its peak, the system managed to generate 37,000 people as potential human targets,\u201d one of the sources said. \u201cBut the numbers changed all the time, because it depends on where you set the bar of what a Hamas operative is.\u201d<\/p>\n<p class=\"dcr-4cudl2\">They added: \u201cThere were times when a Hamas operative was defined more broadly, and then the machine started bringing us all kinds of civil defence personnel, police officers, on whom it would be a shame to waste bombs. They help the Hamas government, but they don\u2019t really endanger soldiers.\u201d<\/p>\n<p class=\"dcr-4cudl2\">Before the war, US and Israeli estimated membership of Hamas\u2019s military wing at approximately 25-30,000 people.<\/p>\n<figure id=\"83d25ca6-4d27-438e-952a-13c3c9e3df77\" data-spacefinder-role=\"richLink\" data-spacefinder-type=\"model.dotcomrendering.pageElements.RichLinkBlockElement\" class=\" dcr-1your1i\"><gu-island name=\"RichLinkComponent\" priority=\"feature\" deferuntil=\"idle\" props=\"{&quot;richLinkIndex&quot;:33,&quot;element&quot;:{&quot;_type&quot;:&quot;model.dotcomrendering.pageElements.RichLinkBlockElement&quot;,&quot;prefix&quot;:&quot;Related: &quot;,&quot;text&quot;:&quot;\u2018The Gospel\u2019: how Israel uses AI to select bombing targets in Gaza&quot;,&quot;elementId&quot;:&quot;83d25ca6-4d27-438e-952a-13c3c9e3df77&quot;,&quot;role&quot;:&quot;richLink&quot;,&quot;url&quot;:&quot;https:\/\/www.theguardian.com\/world\/2023\/dec\/01\/the-gospel-how-israel-uses-ai-to-select-bombing-targets&quot;},&quot;ajaxUrl&quot;:&quot;https:\/\/api.nextgen.guardianapps.co.uk&quot;,&quot;format&quot;:{&quot;display&quot;:0,&quot;theme&quot;:0,&quot;design&quot;:0}}\" config=\"{&quot;renderingTarget&quot;:&quot;Web&quot;,&quot;darkModeAvailable&quot;:false}\"><\/gu-island><\/figure>\n<p class=\"dcr-4cudl2\">In the weeks after the Hamas-led 7 October assault on southern Israel, in which Palestinian militants killed nearly 1,200 Israelis and kidnapped about 240 people, the sources said there was a decision to treat Palestinian men linked to Hamas\u2019s military wing as potential targets, regardless of their rank or importance.<\/p>\n<p class=\"dcr-4cudl2\">The IDF\u2019s targeting processes in the most intensive phase of the bombardment were also relaxed, they said. \u201cThere was a completely permissive policy regarding the casualties of [bombing] operations,\u201d one source said. \u201cA policy so permissive that in my opinion it had an element of revenge.\u201d<\/p>\n<p class=\"dcr-4cudl2\">Another source, who justified the use of Lavender to help identify low-ranking targets, said that \u201cwhen it comes to a junior militant, you don\u2019t want to invest manpower and time in it\u201d. They said that in wartime there was insufficient time to carefully \u201cincriminate every target\u201d.<\/p>\n<p class=\"dcr-4cudl2\">\u201cSo you\u2019re willing to take the margin of error of using artificial intelligence, risking collateral damage and civilians dying, and risking attacking by mistake, and to live with it,\u201d they added.<\/p>\n<h2 id=\"its-much-easier-to-bomb-a-familys-home\">\u2018It\u2019s much easier to bomb a family\u2019s home\u2019<\/h2>\n<p class=\"dcr-4cudl2\">The testimonies published by +972 and Local Call may explain how such a western military with such advanced capabilities, with weapons that can conduct highly surgical strikes, has conducted a war with such a vast human toll.<\/p>\n<p class=\"dcr-4cudl2\">When it came to targeting low-ranking Hamas and PIJ suspects, they said, the preference was to attack when they were believed to be at home. \u201cWe were not interested in killing [Hamas] operatives only when they were in a military building or engaged in a military activity,\u201d one said. \u201cIt\u2019s much easier to bomb a family\u2019s home. The system is built to look for them in these situations.\u201d<\/p>\n<figure id=\"66b797a6-0997-40da-83bb-3a0d746bbf97\" data-spacefinder-role=\"showcase\" data-spacefinder-type=\"model.dotcomrendering.pageElements.ImageBlockElement\" class=\" dcr-5h0uf4\"><figcaption class=\"dcr-1bhe99k\"><span class=\"dcr-1inf02i\"><svg width=\"18\" height=\"13\" viewBox=\"0 0 18 13\"><path d=\"M18 3.5v8l-1.5 1.5h-15l-1.5-1.5v-8l1.5-1.5h3.5l2-2h4l2 2h3.5l1.5 1.5zm-9 7.5c1.9 0 3.5-1.6 3.5-3.5s-1.6-3.5-3.5-3.5-3.5 1.6-3.5 3.5 1.6 3.5 3.5 3.5z\" \/><\/svg><\/span><span class=\"dcr-1qvd3m6\">Relatives outside the morgue of the al-Najjar hospital in Rafah mourn Palestinians killed in Israeli bombings on 1 February.<\/span> Photograph: Mohammed Abed\/AFP\/Getty Images<\/figcaption><\/figure>\n<p class=\"dcr-4cudl2\">Such a strategy risked higher numbers of civilian casualties, and the sources said the IDF imposed pre-authorised limits on the number of civilians it deemed acceptable to kill in a strike aimed at a single Hamas militant. The ratio was said to have changed over time, and varied according to the seniority of the target.<\/p>\n<p class=\"dcr-4cudl2\">According to +972 and Local Call, the IDF judged it permissible to kill more than 100 civilians in attacks on a top-ranking Hamas officials. \u201cWe had a calculation for how many [civilians could be killed] for the brigade commander, how many [civilians] for a battalion commander, and so on,\u201d one source said.<\/p>\n<p class=\"dcr-4cudl2\">\u201cThere were regulations, but they were just very lenient,\u201d another added. \u201cWe\u2019ve killed people with collateral damage in the high double digits, if not low triple digits. These are things that haven\u2019t happened before.\u201d There appears to have been significant fluctuations in the figure that military commanders would tolerate at different stages of the war.<\/p>\n<p class=\"dcr-4cudl2\">One source said that the limit on permitted civilian casualties \u201cwent up and down\u201d over time, and at one point was as low as five. During the first week of the conflict, the source said, permission was given to kill 15 non-combatants to take out junior militants in Gaza. However, they said estimates of civilian casualties were imprecise, as it was not possible to know definitively how many people were in a building.<\/p>\n<p class=\"dcr-4cudl2\">Another intelligence officer said that more recently in the conflict, the rate of permitted collateral damage was brought down again. But at one stage earlier in the war they were authorised to kill up to \u201c20 uninvolved civilians\u201d for a single operative, regardless of their rank, military importance, or age.<\/p>\n<p class=\"dcr-4cudl2\">\u201cIt\u2019s not just that you can kill any person who is a Hamas soldier, which is clearly permitted and legitimate in terms of international law,\u201d they said. \u201cBut they directly tell you: \u2018You are allowed to kill them along with many civilians.\u2019 \u2026 In practice, the proportionality criterion did not exist.\u201d<\/p>\n<p class=\"dcr-4cudl2\">The IDF statement said its procedures \u201crequire conducting an individual assessment of the anticipated military advantage and collateral damage expected \u2026 The IDF does not carry out strikes when the expected collateral damage from the strike is excessive in relation to the military advantage.\u201d It added: \u201cThe IDF outright rejects the claim regarding any policy to kill tens of thousands of people in their homes.\u201d<\/p>\n<p class=\"dcr-4cudl2\">Experts in international humanitarian law who spoke to the Guardian expressed alarm at accounts of the IDF accepting and pre-authorising collateral damage ratios as high as 20 civilians, particularly for lower-ranking militants. They said militaries must assess proportionality for each individual strike.<\/p>\n<figure id=\"b689341b-0eb8-4744-9b6a-2dc2481f7f3a\" data-spacefinder-role=\"showcase\" data-spacefinder-type=\"model.dotcomrendering.pageElements.ImageBlockElement\" class=\" dcr-5h0uf4\"><figcaption class=\"dcr-1bhe99k\"><span class=\"dcr-1inf02i\"><svg width=\"18\" height=\"13\" viewBox=\"0 0 18 13\"><path d=\"M18 3.5v8l-1.5 1.5h-15l-1.5-1.5v-8l1.5-1.5h3.5l2-2h4l2 2h3.5l1.5 1.5zm-9 7.5c1.9 0 3.5-1.6 3.5-3.5s-1.6-3.5-3.5-3.5-3.5 1.6-3.5 3.5 1.6 3.5 3.5 3.5z\" \/><\/svg><\/span><span class=\"dcr-1qvd3m6\">Smoke rises over the Gaza Strip, as seen from from the Israeli side of the border on 21 January.<\/span> Photograph: Amir Levy\/Getty Images<\/figcaption><\/figure>\n<p class=\"dcr-4cudl2\">An international law expert at the US state department said they had \u201cnever remotely heard of a one to 15 ratio being deemed acceptable, especially for lower-level combatants. There\u2019s a lot of leeway, but that strikes me as extreme\u201d.<\/p>\n<p class=\"dcr-4cudl2\">Sarah Harrison, a former lawyer at the US Department of Defense, now an analyst at Crisis Group, said: \u201cWhile there may be certain occasions where 15 collateral civilian deaths could be proportionate, there are other times where it definitely wouldn\u2019t be. You can\u2019t just set a tolerable number for a category of targets and say that it\u2019ll be lawfully proportionate in each case.\u201d<\/p>\n<p class=\"dcr-4cudl2\">Whatever the legal or moral justification for Israel\u2019s bombing strategy, some of its intelligence officers appear now to be questioning the approach set by their commanders. \u201cNo one thought about what to do afterward, when the war is over, or how it will be possible to live in Gaza,\u201d one said.<\/p>\n<p class=\"dcr-4cudl2\">Another said that after the 7 October attacks by Hamas, the atmosphere in the IDF was \u201cpainful and vindictive\u201d. \u201cThere was a dissonance: on the one hand, people here were frustrated that we were not attacking enough. On the other hand, you see at the end of the day that another thousand Gazans have died, most of them civilians.\u201d<\/p>\n<p class=\"dcr-4cudl2\"><em class=\"dcr-4cudl2\"><a href=\"https:\/\/www.theguardian.com\/guardian-live-events\/2024\/feb\/16\/guardian-newsroom-the-unfolding-crisis-in-the-middle-east\" data-link-name=\"in body link\">Guardian Newsroom: The unfolding crisis in the Middle East<\/a><br \/>On Tuesday 30 April, 7-8.15pm GMT, join Devika Bhat, Peter Beaumont, Emma Graham-Harrison and Ghaith Abdul-Ahad as they discuss the fast-developing crisis in the Middle East. Book tickets<a href=\"https:\/\/www.theguardian.com\/guardian-live-events\/2024\/feb\/16\/guardian-newsroom-the-unfolding-crisis-in-the-middle-east\" data-link-name=\"in body link\"> here<\/a> or at <a href=\"https:\/\/www.theguardian.com\/guardian-live-events\" data-link-name=\"in body link\">theguardian.live<\/a><\/em><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35743\/Israel-Used-AI-To-Identify-37-000-Hamas-Targets.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10901],"class_list":["post-55785","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinegovernmentcyberwarisraelterror"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Israel Used AI To Identify 37,000 Hamas Targets 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Israel Used AI To Identify 37,000 Hamas Targets 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-04T14:12:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\/0_285_5151_3091\/master\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Israel Used AI To Identify 37,000 Hamas Targets\",\"datePublished\":\"2024-04-04T14:12:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/\"},\"wordCount\":2321,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\\\/0_285_5151_3091\\\/master\\\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264\",\"keywords\":[\"headline,government,cyberwar,israel,terror\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/\",\"name\":\"Israel Used AI To Identify 37,000 Hamas Targets 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\\\/0_285_5151_3091\\\/master\\\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264\",\"datePublished\":\"2024-04-04T14:12:14+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\\\/0_285_5151_3091\\\/master\\\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\\\/0_285_5151_3091\\\/master\\\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/israel-used-ai-to-identify-37000-hamas-targets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,cyberwar,israel,terror\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentcyberwarisraelterror\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Israel Used AI To Identify 37,000 Hamas Targets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Israel Used AI To Identify 37,000 Hamas Targets 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/","og_locale":"en_US","og_type":"article","og_title":"Israel Used AI To Identify 37,000 Hamas Targets 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-04-04T14:12:14+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\/0_285_5151_3091\/master\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Israel Used AI To Identify 37,000 Hamas Targets","datePublished":"2024-04-04T14:12:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/"},"wordCount":2321,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\/0_285_5151_3091\/master\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264","keywords":["headline,government,cyberwar,israel,terror"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/","url":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/","name":"Israel Used AI To Identify 37,000 Hamas Targets 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\/0_285_5151_3091\/master\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264","datePublished":"2024-04-04T14:12:14+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\/0_285_5151_3091\/master\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/5e2b277c72ab2d1978b8a795b09cd8b3215d93f6\/0_285_5151_3091\/master\/5151.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=80a6607fe59176c3d1673e18aea5a264"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/israel-used-ai-to-identify-37000-hamas-targets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,cyberwar,israel,terror","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentcyberwarisraelterror\/"},{"@type":"ListItem","position":3,"name":"Israel Used AI To Identify 37,000 Hamas Targets"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55785"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55785\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}