'I'm an IT worker not an assassin'

Techie's terror after ID 'hijacked' for Hamas hit


An Israel-resident British IT worker has reacted with horror to news that a suspected member of an alleged hit squad used a passport with his details to enter Dubai, before allegedly participating in the assassination of a prominent Hamas official.

UAE authorities reckon 11 "agents with European passports" participated in the murder of Mahmoud Al-Mabhouh in his hotel room on 19 January. The suspects used six British and three Irish passports while two others used French and German travel documents, all of which are thought to be counterfeit.

Melvyn Mildiner - a British national and IT worker who emigrated to Israel nine years ago - was among the individuals whose identity was snatched. Midiner told the Jerusalem Post that he was in bed with pneumonia at the time of the alleged hit.

Mildiner, 31, said the photo of a suspect issued by Dubai authorities looks nothing like him.

"First, clearly it isn't me. It doesn't look like me," he said. "The details are not correct. The date of birth is wrong. I've never been to Dubai. Someone, somewhere decided to use my identity."

The Daily Mail reports Mildiner was left "angry, upset and scared" over his "misidentification" as a possible suspect. "I have my passport. It is in my house, along with the passports of everybody else in my family, and there's no Dubai stamps in it because I've never been to Dubai," he said.

The Mail adds that Mildiner used Twitter to pose queries about iPhone application related queries on the day of Al-Mabhouh's murder. This unnamed Twitter account has since been protected.

Another Brit, Paul Keeley, 42, who has lived in a kibbutz for the last 15 years, said he had not left Israel for the last two years. "When I first heard about this, I immediately looked to make sure my passport was still there and it was," he said.

Michael Barney, 54, a third impersonated Brit, told the Daily Mail that he'd had a quadruple heart bypass and was therefore hardly spy material.

The UK's Foreign and Commonwealth Office has launched an investigation, adding "we believe the passports used were fraudulent." A spokesman for Ireland's Department of Foreign Affairs told the BBC that it was unable to identify any of the three named Irish-passport holding suspects named by Dubai authorities as "being genuine Irish citizens". French authorities say the same thing about the suspect travelling on French papers while German authorities said the passport number supplied to them was either incomplete or wrong.

Al-Mabhouh, 49, who flew in from Syria to Dubai to allegedly buy weapons, was killed by suffocation in a professional hit blamed by Hamas on Israeli agents. The veteran militant was a founding member of Hamas' military wing, and suspected as acting as a conduit for arms shipments between Iran and Arab militants in Gaza. He had reportedly survived three previous assassination attempts.

Police in Dubai have released CCTV footage of suspected members of the hit squad (10 men and one woman), some of who were allegedly wearing disguises, and all of who stayed in the Gulf only one day before flying out to destinations in Europe and Asia. CNN has a detailed description of how Mabhouh's assassination is reckoned to have taken place here.

Israeli authorities have not responded to reports pointing the finger of blame towards Mossad, its feared and highly capable intelligence agency.

If Israeli agents were indeed responsible for the hit then this would be far from the first time Mossad agents have used Western passports on murderous missions, Reuters reports. Israeli agents used forged Canadian passports to enter Jordan in 1997 in a failed attempt to poison Hamas leader Khaled Meshaal, for example.

British authorities received an assurance from Israel it would not use forged British travel documents following a diplomatic protest in 1987, the news agency adds. ®


Other stories you might like

  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading
  • Utility biz Delta-Montrose Electric Association loses billing capability and two decades of records after cyber attack

    All together now - R, A, N, S, O...

    A US utility company based in Colorado was hit by a ransomware attack in November that wiped out two decades' worth of records and knocked out billing systems that won't be restored until next week at the earliest.

    The attack was detailed by the Delta-Montrose Electric Association (DMEA) in a post on its website explaining that current customers won't be penalised for being unable to pay their bills because of the incident.

    "We are a victim of a malicious cyber security attack. In the middle of an investigation, that is as far as I’m willing to go," DMEA chief exec Alyssa Clemsen Roberts told a public board meeting, as reported by a local paper.

    Continue reading

Biting the hand that feeds IT © 1998–2021