<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>spy Archives - Iran News Daily</title>
	<atom:link href="https://irannewsdaily.com/tag/spy/feed/" rel="self" type="application/rss+xml" />
	<link>https://irannewsdaily.com/tag/spy/</link>
	<description></description>
	<lastBuildDate>Tue, 05 Nov 2024 22:17:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.4</generator>

<image>
	<url>https://irannewsdaily.com/wp-content/uploads/2020/04/cropped-iranlogo-32x32.png</url>
	<title>spy Archives - Iran News Daily</title>
	<link>https://irannewsdaily.com/tag/spy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Three Spies Sentenced to Death for Role in Iranian Nuclear Scientist Assassination</title>
		<link>https://irannewsdaily.com/2024/11/three-spies-sentenced-to-death-for-role-in-iranian-nuclear-scientist-assassination/</link>
					<comments>https://irannewsdaily.com/2024/11/three-spies-sentenced-to-death-for-role-in-iranian-nuclear-scientist-assassination/#respond</comments>
		
		<dc:creator><![CDATA[mahla]]></dc:creator>
		<pubDate>Tue, 05 Nov 2024 22:17:50 +0000</pubDate>
				<category><![CDATA[important news]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Nuclear]]></category>
		<category><![CDATA[spy]]></category>
		<guid isPermaLink="false">https://irannewsdaily.com/?p=151519</guid>

					<description><![CDATA[<p>TEHRAN (Iran News) Speaking at a press conference on Tuesday, Asghar Jahangir said the Zionist regime has been involved in activities to identify and assassinate Iranian scientists. He noted that the Iranian security forces have been monitoring the “elements of espionage” in different provinces and have arrested eight people in the northwestern province of West Azarbaijan. The [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2024/11/three-spies-sentenced-to-death-for-role-in-iranian-nuclear-scientist-assassination/">Three Spies Sentenced to Death for Role in Iranian Nuclear Scientist Assassination</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="lead"></h3>
<div class="story" data-readmoretitle="Read more">
<p><em>TEHRAN (<a href="https://www.irannewsdaily.com/">Iran News</a>)</em> Speaking at a press conference on Tuesday, Asghar Jahangir said the Zionist regime has been involved in activities to identify and assassinate Iranian scientists.</p>
<p>He noted that the Iranian security forces have been monitoring the “elements of espionage” in different provinces and have arrested eight people in the northwestern province of West Azarbaijan.</p>
<p>The spokesman said three of the arrestees stood trial for spying for the Zionist regime and have been sentenced to death after being convicted of transferring the equipment -under the guise of smuggling alcoholic drinks into Iran- used in the assassination of Fakhrizadeh.</p>
<p>Mohsen Fakhrizadeh, a senior nuclear and defense scientist, was assassinated in a small city east of Tehran on November 27, 2020.</p>
<p>A ranking IRGC commander said after the incident that a smart satellite-controlled machine gun using artificial intelligence had been used in the assassination attack.</p>
</div>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2024/11/three-spies-sentenced-to-death-for-role-in-iranian-nuclear-scientist-assassination/">Three Spies Sentenced to Death for Role in Iranian Nuclear Scientist Assassination</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://irannewsdaily.com/2024/11/three-spies-sentenced-to-death-for-role-in-iranian-nuclear-scientist-assassination/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Former US Army Member Arrested for Spying for Russia</title>
		<link>https://irannewsdaily.com/2020/08/former-us-army-member-arrested-for-spying-for-russia/</link>
					<comments>https://irannewsdaily.com/2020/08/former-us-army-member-arrested-for-spying-for-russia/#respond</comments>
		
		<dc:creator><![CDATA[reporter 1222]]></dc:creator>
		<pubDate>Sat, 22 Aug 2020 08:15:20 +0000</pubDate>
				<category><![CDATA[international]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[Army member]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[spionage]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[US Army]]></category>
		<guid isPermaLink="false">https://irannewsdaily.com/?p=116062</guid>

					<description><![CDATA[<p>TEHRAN (Iran News) – A former member of the US Army was arrested on Friday for conspiring with Russian intelligence operatives to provide them with United States national defense information, the US Department of Justice said in a press release on Friday. &#8220;According to court documents, from December 1996 to January 2011, Peter Rafael Dzibinski [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2020/08/former-us-army-member-arrested-for-spying-for-russia/">Former US Army Member Arrested for Spying for Russia</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TEHRAN (<a href="https://irannewsdaily.com/" target="_blank" rel="noopener noreferrer">Iran News</a>) – A former member of the US Army was arrested on Friday for conspiring with Russian intelligence operatives to provide them with United States national defense information, the US Department of Justice said in a press release on Friday.</p>
<div class="story" data-readmoretitle="Read more">
<p dir="LTR">&#8220;According to court documents, from December 1996 to January 2011, Peter Rafael Dzibinski Debbins, 45, a former member of the US Army, allegedly conspired with agents of a Russian intelligence service. During that time, Debbins periodically visited Russia and met with Russian intelligence agents,&#8221; the Department of Justice said, TASS reported.</p>
<p dir="LTR">&#8220;In 2008, after leaving active duty service, Debbins disclosed to the Russian intelligence agents classified information about his previous activities while deployed with the Special Forces. Debbins also provided the Russian intelligence agents with the names of, and information about, his former Special Forces team members so that the agents could evaluate whether to approach the team members to see if they would cooperate with the Russian intelligence service,&#8221; according to the press release.</p>
<p dir="LTR">If convicted, Debbins faces a maximum penalty of life in prison.</p>
</div>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2020/08/former-us-army-member-arrested-for-spying-for-russia/">Former US Army Member Arrested for Spying for Russia</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://irannewsdaily.com/2020/08/former-us-army-member-arrested-for-spying-for-russia/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CIA Used Crypto AG to Spy on Nations: Reports</title>
		<link>https://irannewsdaily.com/2020/02/cia-used-crypto-ag-to-spy-on-nations-reports/</link>
					<comments>https://irannewsdaily.com/2020/02/cia-used-crypto-ag-to-spy-on-nations-reports/#respond</comments>
		
		<dc:creator><![CDATA[reporter 1222]]></dc:creator>
		<pubDate>Wed, 12 Feb 2020 09:29:10 +0000</pubDate>
				<category><![CDATA[international]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Crypto AG]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[spy]]></category>
		<guid isPermaLink="false">https://irannewsdaily.com/?p=105962</guid>

					<description><![CDATA[<p>TEHRAN (Iran News) – The CIA and German intelligence spied on the secret communications of governments around the world for decades in a covert partnership, controlling Crypto AG company and installing backdoor vulnerabilities in its products. Founded during the Second World War, the Swiss cryptography firm, Crypto AG, has provided top-of-the-line devices for encoding communications [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2020/02/cia-used-crypto-ag-to-spy-on-nations-reports/">CIA Used Crypto AG to Spy on Nations: Reports</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="lead">TEHRAN (<a href="https://irannewsdaily.com/" target="_blank" rel="noopener noreferrer">Iran News</a>) – The CIA and German intelligence spied on the secret communications of governments around the world for decades in a covert partnership, controlling Crypto AG company and installing backdoor vulnerabilities in its products.</p>
<p>Founded during the Second World War, the Swiss cryptography firm, Crypto AG, has provided top-of-the-line devices for encoding communications to some 120 countries. Starting in 1970, however, the CIA and then-West Germany’s foreign intelligence service, the BND, secretly bought and controlled the company, using its devices to eavesdrop on enemies and allies alike, according to a joint investigation by the Washington Post and German public broadcaster ZDF, based on a classified internal CIA history.</p>
<p>First dubbed “Thesaurus” and later renamed to “Rubicon,” the CIA hailed the decades-long operation as the “intelligence coup of the century” in its classified history, RT reported.</p>
<p>Foreign governments were paying good money to the US and West Germany for the privilege of having their most secret communications read by at least two&#8230; foreign countries.</p>
<p>Though the intelligence agencies formed a relationship with the firm soon after World War II, they would step up their role in 1970 following a $5 million deal to take over the company. From there, the agencies controlled virtually every part of Crypto AG’s operations, ranging from hiring decisions, directing sales targets, and designing its high-tech encryption devices – with secret backdoors accessible only to them, of course.</p>
<p>The company’s clients, none of whom were ever made aware of the intelligence agency involvement, included Iran, various Latin American governments, India, Pakistan and even the Vatican. Throughout the 1980s, some 40 percent of all diplomatic cables and other government transmissions analyzed by the US National Security Agency (NSA) ran through Crypto AG’s devices, suggesting the agencies drew a vast amount of material from the eavesdropping operation.</p>
<p>The CIA ran a victory lap over the apparent success of Rubicon in its 96-page history, gloating:</p>
<p>Imagine the idea of the American government convincing a foreign manufacturer to jimmy equipment in its favor… Talk about a brave new world.</p>
<p>While both China and the former Soviet Union were distrustful of Crypto AG and never made use of its products during Rubicon’s Cold War heyday, the compromised devices were used to gather intelligence during a number of high-profile geopolitical events.</p>
<p>Crypto AG made millions of dollars throughout the nearly 50-year operation, with the profits split between the two agencies. While the BND reportedly used some of the funds to finance its own field operations, the CIA leveraged its proceeds to buy up competing for cryptography firms, apparently hoping to corner the market and funnel sales into Crypto.</p>
<p>The BND bowed out of the arrangement in 1993 over what the CIA termed a “storm of publicity,” after a Crypto employee was imprisoned in Iran. The CIA, however, simply bought up the BND’s share afterward and kept the operation running until 2018 when it is thought to have sold off the company’s assets. By then, the firm’s prominence had waned with the rise of cheaper internet encryption technology, although it remains unclear whether the CIA ever entirely cut ties with the company.</p>
<p>The company’s current owners – who since rebranded the firm as Crypto International – have denied any knowledge of involvement with intelligence agencies, however.</p>
<p>“We at Crypto AG International have never had any relationship with the CIA or BND – and please quote me,” company chairman Andreas Linde told the Post.</p>
<p>“If what you are saying is true, then absolutely I feel betrayed, and my family feels betrayed, and I feel there will be a lot of employees who will feel betrayed as well as customers.”</p>
<p>The Swiss government, meanwhile, ordered an investigation into the alleged decades-long intelligence-gathering operation on Tuesday.</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2020/02/cia-used-crypto-ag-to-spy-on-nations-reports/">CIA Used Crypto AG to Spy on Nations: Reports</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://irannewsdaily.com/2020/02/cia-used-crypto-ag-to-spy-on-nations-reports/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Vulnerability Uses SIM Card to Spy on People’s Phones Globally</title>
		<link>https://irannewsdaily.com/2019/09/new-vulnerability-uses-sim-card-to-spy-on-peoples-phones-globally/</link>
					<comments>https://irannewsdaily.com/2019/09/new-vulnerability-uses-sim-card-to-spy-on-peoples-phones-globally/#respond</comments>
		
		<dc:creator><![CDATA[reporter 1222]]></dc:creator>
		<pubDate>Sun, 15 Sep 2019 09:51:03 +0000</pubDate>
				<category><![CDATA[Society]]></category>
		<category><![CDATA[People’s Phones Globally]]></category>
		<category><![CDATA[sIM CART]]></category>
		<category><![CDATA[spy]]></category>
		<guid isPermaLink="false">https://irannewsdaily.com/?p=98793</guid>

					<description><![CDATA[<p>In a few cases, your SIM card may pose more of a security risk than your phone&#8217;s software. AdaptiveMobile Security researchers say they&#8217;ve discovered a new vulnerability, nicknamed Simjacker, that&#8217;s being used to surveil people&#8217;s devices by an unnamed surveillance company. The technique sends SMS messages containing instructions for an old S@T Browser app supported [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2019/09/new-vulnerability-uses-sim-card-to-spy-on-peoples-phones-globally/">New Vulnerability Uses SIM Card to Spy on People’s Phones Globally</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="story" data-readmoretitle="Read more">
<p>In a few cases, your SIM card may pose more of a security risk than your phone&#8217;s software. AdaptiveMobile Security researchers say they&#8217;ve discovered a new vulnerability, nicknamed Simjacker, that&#8217;s being used to surveil people&#8217;s devices by an unnamed surveillance company. The technique sends SMS messages containing instructions for an old S@T Browser app supported on some carriers&#8217; SIM cards. Where S@T was originally intended to launch browsers, play sounds or otherwise trigger common actions on phones, Simjacker uses it to obtain location info and IMEI numbers that are later sent to an &#8220;accomplice device&#8221; (again using SMS) that records the data, Engadget reported.</p>
<p>Crucially, the approach is silent. While it does use SMS, you won&#8217;t get notifications. An intruder can obtain frequent updates without giving away their activity. The exploit is also device-agnostic, and has been used against iPhones, numerous brands of Android phones and some SIM-equipped Internet of Things devices.</p>
<p>And it&#8217;s not just a theoretical exercise. The surveillance company has reportedly been using Simjacker in 30-plus countries (mainly in the Middle East, North Africa, Asia and eastern Europe) for a minimum of two years. While most targets were &#8216;only&#8217; checked a few times per day over long stretches of time, a handful of people were targeted hundreds of times over the space of a week &#8212; 250 in the case of the most prominent target. It&#8217;s not believed to be a mass surveillance campaign, but AdaptiveMobile also hasn&#8217;t said whether this was being used for tracking criminals or more nefarious purposes, like spying on political dissidents. The company is mounting a &#8220;highly sophisticated&#8221; operation, AdaptiveMobile said.</p>
<p>It should be possible for networks to thwart these attacks. Simjacker is sending code rather than everyday text, so it should be feasible to block the code. It may be difficult to coordinate that response, though, when the affected countries have a total population of a billion. And while you&#8217;re not likely to be targeted by this particular organization, there&#8217;s nothing precluding a similarly capable attacker from launching a wider campaign. It may be a long while before you can assume your SIM isn&#8217;t a potential weakness.</p>
<div class="clearfix"></div>
</div>
<div class="share-box"></div>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2019/09/new-vulnerability-uses-sim-card-to-spy-on-peoples-phones-globally/">New Vulnerability Uses SIM Card to Spy on People’s Phones Globally</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://irannewsdaily.com/2019/09/new-vulnerability-uses-sim-card-to-spy-on-peoples-phones-globally/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Moscow Likely behind Hack on German government, Spy Chief Says</title>
		<link>https://irannewsdaily.com/2018/04/moscow-likely-behind-hack-on-german-government-spy-chief-says/</link>
					<comments>https://irannewsdaily.com/2018/04/moscow-likely-behind-hack-on-german-government-spy-chief-says/#respond</comments>
		
		<dc:creator><![CDATA[reporter 1222]]></dc:creator>
		<pubDate>Wed, 11 Apr 2018 15:45:11 +0000</pubDate>
				<category><![CDATA[international]]></category>
		<category><![CDATA[GERMANY]]></category>
		<category><![CDATA[moscow]]></category>
		<category><![CDATA[spy]]></category>
		<guid isPermaLink="false">https://irannewsdaily.com/?p=25574</guid>

					<description><![CDATA[<p>Germany&#8217;s head of domestic intelligence said on Wednesday there was a &#8220;high likelihood&#8221; that the Russian government was behind a cyber attack on German computer networks, although he conceded it was difficult to be 100-percent certain. Hans-Georg Maassen told reporters that German authorities carefully monitored the attack after it was discovered in December, and it [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2018/04/moscow-likely-behind-hack-on-german-government-spy-chief-says/">Moscow Likely behind Hack on German government, Spy Chief Says</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="lead">Germany&#8217;s head of domestic intelligence said on Wednesday there was a &#8220;high likelihood&#8221; that the Russian government was behind a cyber attack on German computer networks, although he conceded it was difficult to be 100-percent certain.</h3>
<div class="story">
<p>Hans-Georg Maassen told reporters that German authorities carefully monitored the attack after it was discovered in December, and it had not caused any damage, Reuters reported.</p>
<p>He said there was no evidence to link it to APT28, the Russian hacking group blamed for a May 2015 attack on the German lower house of parliament and the US Democratic National Committee ahead of the 2016 US election.</p>
<p>However, Maassen said the attack was considered an &#8220;advanced persistent threat (APT)&#8221;, a phrase used by experts to describe a cyber attack so sophisticated and complex that it can only be carried out by a government entity.</p>
<p>&#8220;We perceived it as a cyber attack with a Russian origin,&#8221; Maassen said. &#8220;A 100-percent attribution &#8230; that the perpetrator is in Moscow and that it&#8217;s a government agency is not possible, but we can talk about a high likelihood.&#8221;</p>
<p>He said a so-called &#8220;false flag&#8221; operation, aimed at intentionally misleading authorities about which country was to blame, could not be completely excluded, but he added: &#8220;We assume it had a Russian origin.&#8221;</p>
<p>Germany&#8217;s federal prosecutor&#8217;s office is also investigating the incident as a possible case of espionage. Sources briefed on the incident said it was first detected in December but may have begun as much as a year earlier.</p>
<p>The Russian government has dismissed the suggestion that Russian hackers were behind the cyber attack.</p>
<p>A German Interior Ministry spokesman last month said the affected IVBB computer network was used to exchange documents labeled &#8220;for government use only,&#8221; but did not carry highly classified documents.</p>
<div class="clearfix"></div>
</div>
<div class="share-box"></div>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2018/04/moscow-likely-behind-hack-on-german-government-spy-chief-says/">Moscow Likely behind Hack on German government, Spy Chief Says</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://irannewsdaily.com/2018/04/moscow-likely-behind-hack-on-german-government-spy-chief-says/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Death penalty upheld for Mossad spy: Tehran prosecutor</title>
		<link>https://irannewsdaily.com/2017/12/death-penalty-upheld-mossad-spy-tehran-prosecutor/</link>
					<comments>https://irannewsdaily.com/2017/12/death-penalty-upheld-mossad-spy-tehran-prosecutor/#respond</comments>
		
		<dc:creator><![CDATA[reporter 1222]]></dc:creator>
		<pubDate>Tue, 26 Dec 2017 04:51:24 +0000</pubDate>
				<category><![CDATA[domestic]]></category>
		<category><![CDATA[spy]]></category>
		<guid isPermaLink="false">https://irannewsdaily.com/?p=18591</guid>

					<description><![CDATA[<p>TEHRAN – The Supreme Court has approved the death sentence against an Iranian researcher for spying for Israel’s Mossad spy agency, Tehran Prosecutor Abbas Jafari-Dolatabadi confirmed on Monday. Ahmad Reza Jalali, who has been in prison since April 2016, was shown on national TV earlier this month confessing to providing information to Mossad about Iranian [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2017/12/death-penalty-upheld-mossad-spy-tehran-prosecutor/">Death penalty upheld for Mossad spy: Tehran prosecutor</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="summary"><strong>TEHRAN – The Supreme Court has approved the death sentence against an Iranian researcher for spying for Israel’s Mossad spy agency, Tehran Prosecutor Abbas Jafari-Dolatabadi confirmed on Monday.</strong></p>
<p>Ahmad Reza Jalali, who has been in prison since April 2016, was shown on national TV earlier this month confessing to providing information to Mossad about Iranian military and nuclear scientists, including two who were assassinated in 2010.</p>
<p>The convict had admitted that he had eight meetings with Mossad’s agents and that he had received money in exchange, Jafari-Dolatabadi told a meeting of judiciary officials, IRNA reported.</p>
<p>The prosecutor said Jalali had passed information to Mossad agents about projects related to the Defense Ministry and the Atomic Energy Organization of Iran (AEOI), including information about the AEOI plants, the ministry’s plans and blueprints of important buildings belonging to the ministry and the AEOI.</p>
<p>He had also provided Mossad with the names and information of top executives of the AEOI and the Defense Ministry, Jafari-Dolatabadi said, adding that according to Jalali’s confessions, he had used flash memories to gather information from the individuals’ computers.</p>
<p>“Most of the information provided by the aforementioned person included complete and documented information about thirty top figures working on research, military, defense and nuclear projects, including the two martyred [scientists] Ali Mohammadi and [Mohammad] Shahriari,” he remarked.</p>
<p>The convict was given money and Swedish citizenship for himself and his family in exchange for the information, he added.</p>
<p>The prosecutor also said Jalali’s death sentence was upheld by Supreme Court on December 2, 2017.</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2017/12/death-penalty-upheld-mossad-spy-tehran-prosecutor/">Death penalty upheld for Mossad spy: Tehran prosecutor</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://irannewsdaily.com/2017/12/death-penalty-upheld-mossad-spy-tehran-prosecutor/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
