Skip to content

Israeli pilots upload sensitive Iran strike documents to public network: Report

Israeli pilots upload sensitive Iran strike documents to public network: Report The Israeli flag on the uniform of an Israeli army soldier in Israel, accessed on April 19, 2025. (Adobe Stock Photo)
By Newsroom
Apr 22, 2025 12:32 PM

Classified documents from Israel’s elite Air Force Squadron 69, including preparation materials for a potential strike on Iran, were mistakenly uploaded to a non-secured online platform accessible to the public, Israeli media outlet TheMarker reported.

The files, which were managed via the Israeli army’s “Click Portal”—a Microsoft SharePoint-based internal workspace—were intended solely for unclassified data.

However, they included highly sensitive documents such as classified weapons manuals, response protocols for enemy missile attacks, and internal debriefs. Some of the files were uploaded by senior squadron personnel, including the squadron commander.

Israeli pilots upload sensitive Iran strike documents to public network: Report
An Israeli army soldier forces a shop owner to close ahead of a visit by Ultra-Orthodox Jews to the shrine of Atnaeil Ben Kinaz in the city of Hebron in the Israeli-occupied West Bank on April 16, 2025. (AFP Photo)

Files scanned via app with security history

Many of the documents were scanned using CamScanner, a mobile app previously removed from Google’s Play Store in 2019 due to embedded malware that posed a risk of user data leaks.

CamScanner, which is owned by a Chinese company, was also banned by the Indian government over national security concerns.

Among the files uploaded to Click Portal were operational briefings, event schedules, and security drill timetables, including references to alert procedures related to Iranian targets.

Although access was limited to users with Israeli army’s email credentials, the system was accessible globally and did not require military clearance—extending availability to reservists, discharged soldiers, and even pre-enlistment candidates.

Israeli pilots upload sensitive Iran strike documents to public network: Report
Israeli Air Force’s F-15I fighter jets that did the airstrike on Hezbollah leader Hassan Nasrallah, accessed on Sept. 29, 2024. (Handout/Israeli Army)

Critical lapse in information security protocol

The exposure of these documents contradicts the established Israeli army’s information security protocols, which strictly prohibit discussing or handling classified material near mobile devices, let alone scanning such documents via mobile apps.

Security experts speaking to Israeli media outlet cited two core violations: the failure to compartmentalize access within the organization, and the exposure of classified data on a system meant for open communication. “You don’t want this content leaking,” one Israeli army official was quoted saying.

Israeli Air Force's F-16 fighter jet
Israeli Air Force’s F-16 fighter jet landing on Norvenich airbase in Germany on Aug. 17, 2020, accessed on April 3, 2025. (Adobe Stock Photo)

Israeli Air Force shocked by breach

The incident is particularly alarming given Squadron 69’s role in the Israeli Air Force, it was reportedly behind the airstrikes that killed Hezbollah leader Hassan Nasrallah and has been a command track for several top military figures, including current Israeli Air Force chief Tomer Bar.

According to TheMarker, Click Portal pages of both Squadron 69 and Squadron 166 were publicly accessible within the platform, though most other squadrons maintain closed access.

The 166 Squadron of the Israeli Air Force, also known as the Fire Birds Squadron, is an Elbit Hermes 900 UAV squadron based at Palmachim Airbase.

In one weekly briefing, the squadron commander warned explicitly about information security lapses and referenced an espionage incident in another unit.

Israeli pilots upload sensitive Iran strike documents to public network: Report
An Israeli Air Force F-15I fighter jet flight at air show in Tel Aviv, Israel, accessed on April 19, 2025. (Adobe Stock Photo)

Broader systemic concerns with cloud transition

The Click Portal was developed as part of the Israeli army’s broader shift to digital systems under former Israeli Chief of Staff Aviv Kochavi’s multiyear transformation strategy. Intended to improve organizational efficiency and enable remote access, the platform was hosted on a civilian cloud managed by Microsoft.

While the system is designed for basic services like medical appointments and transportation coordination, it has become a routine working environment.

Since COVID-19, usage of the platform expanded significantly, alongside the unauthorized use of it for sensitive operations.

Israeli pilots upload sensitive Iran strike documents to public network: Report
Israeli Chief of Staff Eyal Zamir during his field tour in the occupied Syrian territories on April 20, 2025. (Photo via X / @idfonline)

Israeli army’s response and ongoing investigation

Following reports, the Israeli army removed the documents and launched an investigation led by the head of the Israel Military Information Security Department in cooperation with the Israeli Air Force.

“This is a serious incident that was addressed immediately. The content has been removed. A thorough investigation is underway,” the Israeli army said in a statement.

Last Updated:  Apr 22, 2025 12:32 PM