Undercover reporters recorded a group of secret cyber influence specialists as they presented their services. These include using disinformation campaigns, fake intelligence, hacks and extortion to promote the interests of their clients. The group, which calls itself Team Jorge, claims to have worked on dozens of presidential elections around the world. Its services sell for millions of dollars.
The Israeli-based secret group uses advanced hacking technologies as well as the AIMS tool to create fake accounts and distribute fake content, including through artificial intelligence. The experts of the StoryKillers project and the Bulgarian partner BIRD.BG also found a Bulgarian connection that is still being studied. What is known so far:
- Reporters were able to verify Jorge Team’s claims of access to message accounts of important political goals and the deployment of social media campaigns orchestrated through fake accounts.
- The Jorge team appears to have interfered in last year’s Kenyan presidential election, which was hit by a disinformation campaign.
- The secret group includes people with experience in Israeli security services.
“This is our experience… to harm the logistics of the opponents, to intimidate them, to create such an atmosphere that no one goes to the elections,” a member of Team Jorge said in July 2022 in a video chat with reporters. The undercover investigation is the work of journalists Gur Megiddo (TheMarker), Frédéric Métezeau (Radio France) and Omer Benjacob (Haaretz). They are part of the investigation, called Story Killers, coordinated by Forbidden Stories and involving more than 100 journalists from 30 media organizations, including OCCRP. Forbidden Stories is an international consortium of investigative journalists who pursue the work of journalists who have been killed or work under threat. BIRD.BG is the Bulgarian partner in the project.
$15 million for a presidential campaign
In several calls and one face-to-face meeting, team members – led by a man calling himself “Jorge” – described “intelligence and influence” services they said they could provide for their clients. They say they have worked on “33 campaigns at the presidential level” – 27 of them “successful”. Their tactics include hacking, falsifying extortion material, spreading misinformation, deploying false information, physically interrupting elections, and deploying targeted social media campaigns. Reporters were able to confirm that some of these tactics were used. The Jorge team appears to have gained unauthorized access to Telegram and Gmail accounts of high-ranking government officials and deployed botnet campaigns on social media. Evidence reviewed by reporters suggests that the group interfered in at least two presidential elections. 
Hacking Kenya
During one of the recorded presentations on Zoom, Tal Hanan showed a screen with a Telegram account and clicked on the contacts and private chats of Kenyan political adviser Dennis Itumbi. This live demonstration took place at the end of July 2022, at a critical moment in Kenya’s presidential election campaign. Itumbi was the digital strategist of William Ruto, vice president of the East African nation at the time, who would be elected president in weeks. Local media described Itumbi as Ruto’s “right hand”. Hannan showed proof that not only could she read Itumbi’s private chats and files — including an internal survey related to the upcoming election — but that he could even pose as Itumbi by sending messages from his account. Hannan began a conversation from Itumbi’s account with a prominent Kenyan businessman and sent a text that simply read: “11.” This message was meaningless, its purpose was only a demonstration of his ability to control the account. But the Jorge Team claims to have sent falsified messages to military commanders and government ministers, all in an attempt to influence events and wreak havoc among high-level targets. “I’ll usually wait for him to see it and then delete it. Why? Because I want to create confusion,” Hannan said. In the case of the Itumbi demonstration, Hannan accidentally deleted the text message only for the sender. Subsequently, reporters had the opportunity to contact the businessman who received it and confirm that the mysterious message was indeed sent. 
Breakthrough of communications
“I know that in some countries they believe that Telegram is very safe,” Hannan said in the Zoom demonstration. “So, behold, I will show you how safe it is… So this is also a minister of some country, I can go [and] I can check all his calls.” Hannan also showed the Gmail account of Mozambique’s agriculture minister, Celso Correa, who confirmed to reporters that the email address and content appeared to be his. During the presentation, the folders from the minister’s personal Google drive were also visible. Crucial for hacking email accounts and messaging services such as Telegram is SS7 /Signaling System 7/*, an international standard “protocol” for mobile phone communications, which should ensure that a call or SMS sent by one user is transferred to the correct number of the intended recipient. It was introduced in the 80s, in the early days of digital security and encryption, so it contains flaws that can allow third parties to impersonate a specific user and receive their messages and calls. This is what Hannan claims his team can do. He told undercover reporters that Team “Jorge” went directly to a telecommunications service provider in the country where they worked and installed a physical device that allowed his team to insert fake commands through SS7 into the system. This tricks the telecom operator into sending an SMS to authenticate the fake target account, allowing Team Jorge to read their target’s messages and even send messages. Although the loopholes are common knowledge and most telecommunications service providers have put countermeasures in place, some operators still maintain vulnerable networks.
Nothing in Israel, nothing against Mr. Putin, and careful in the U.S.
Jorge’s team said two-thirds of the presidential campaigns they have been involved in have been in Africa, but their advertising materials also include countries in Europe, Latin America, Southeast Asia and the Caribbean. Hanan’s brother, Zohar, said at a meeting in December that there were only three tasks that Team Jorge would not take: Nothing in Israel (“We don’t want to poop where we sleep.”); no U.S. politics at the party level (they claim to have declined an invitation to help elect former U.S. President Donald Trump); and “nothing against Mr. Putin”. 

Credit: Screenshot of a presentation from an undercover recording
Team Jorge’s presentation showing a DDOS attack in the 2014 referendum
AIMS: The Influence Platform
Team Jorge’s technology toolkit also includes an “influence platform” called Advanced Impact Media Solutions, or AIMS, which Hanan claims to have sold to the intelligence services of more than 10 countries. The AIMS software is designed to create compelling avatars for social media campaigns. Avatars or bots use stolen photos of real people, work on any social media platform, and can be linked to functioning Amazon and Bitcoin accounts. They also seem to have a longstanding presence online, including Gmail accounts and banal comments to celebrity videos on YouTube, to give investigators the impression that they are real people. “We imitate human behavior,” Hannan told undercover reporters. Most online accounts require phone number and email address verification to prevent bots like those implemented by AIMS. But there are websites created specifically to allow one-time SMS confirmation services for 50 cents or less. Many accounts — such as Gmail and WhatsApp — can be registered with “verified” phone numbers. The Jorge team appears to be using a service called SMSpva.com to verify phone numbers. SMSpva.com did not respond to a request for comment. 
Credit: Screenshot of a presentation from an undercover recording. Shannon Aiken’s profile in AIMS: her data is fake, but the image was stolen from a real person.
Local proxies – the fuel of disinformation
AIMS also relies on residential proxies that redirect internet traffic from bots through people’s homes so that it looks authentic. This makes it difficult for social media platforms to identify a coordinated disinformation campaign. As one expert who consulted the Story Killers project emphasized, residential proxies are “absolutely necessary” in the disinformation industry because they allow for the creation of hard-to-detect bots and can simulate activity from a specific region. This is difficult to prevent because IP addresses used by residential proxies are usually also used by real people. Specifically, participants in a disinformation campaign could buy residential proxies and use them to massively create fake accounts that appear to be linked to real accounts because they use real IP addresses. In the data presented by Team Jorge, the project experts and the Bulgarian partner BIRD.BG found links to sites based in Bulgaria. They are still being studied within a separate publication. Analysis by reporting partners Le Monde and the Guardian identified groups of avatars, including those seen in Hannan’s presentations, that appear to have been used for coordinated Twitter campaigns. Reporters found more than 1,700 Twitter accounts linked to 21 AIMS-related campaigns, whose networks produced tens of thousands of tweets. At a December face-to-face meeting with undercover reporters, Team “Jorge” showed off a new AIMS capability: artificial intelligence tools to generate fake news using certain keywords, tone, and topic. “One operator can have about 300 profiles,” Zohar Hanan said during the demonstration. “So within two hours, the whole country will start relaying the message, the narrative that I want.”
Avatar for Lukashenko Close Up
An avatar campaign seen on Team Jorge’s computer during the commercial presentation of services was found to promote the activities of Alexander Zingman, a businessman close to authoritarian Belarusian President Alexander Lukashenko. In March 2021, Zingman was arrested in the Democratic Republic of Congo for alleged arms trafficking, but was later released. In October of that year, OCCRP revealed how Zingman and another friend of the Belarusian president had used shell companies to hide a lucrative gold mining deal with Zimbabwe’s state mining company. The previous year, AIMS avatars promoted favorable stories about Zingman and his business in a coherent and automated campaign. Some were used to draw attention to his rival Vitaly Fishman. Journalists identified 35 more avatars linked to the Jorge Team through a defamation lawsuit in the U.S., which Fishman won. Zingman’s lawyer said his client had never worked with companies involved in disinformation campaigns, and in fact he himself had been a victim of a similar scheme.
It’s not PR, it’s intelligence.
Tal Hanan served in the Israeli special forces as an explosives expert, according to his online biography. He is listed as the CEO of at least two Israeli companies, Tal Sol Energy and Demoman International Ltd., an intelligence firm listed on the Israeli Defense Ministry’s website. 
***
Разследващата журналистика е разузнаването на гражданите. BIRD се финансира от дарения. Ние не публикуваме реклами. Не получаваме държавни субсидии. Не разчитаме на грантове. Финансирането чрез малки дарения от читатели е гаранция за нашата независимост. Включете се, за да продължим да разкриваме злоупотреби и да държим отговорни властимащите. Използваме Вашите пари за хонорари на журналистите, командировки, изграждане и поддръжка на нашите информационни системи, такси за фирмени и имотни регистри у нас и по света, придобиване на техника и специално оборудване, осигуряване на нашата безопасност и други важни работни мисии. Важно: Ако дарявате всеки месец това ще ни даде възможност да планираме и организираме нашата работа. Благодарим Ви! Нас ни има, защото Вас Ви има!
👇 Станете редовен дарител. Това е изключително важно за предвидимост на приходите и планирането на работата ни.
Внимание! Ако не виждате бутона PayPal продължете на тази страница.
Или сканирайте този QR код.

Revolut

Crypto
BTC:
bc1q8asgyunzwue3esm7p6nj8yv7umcppssktjv6e7

Lightning network:
modularself83@walletofsatoshi.com

Epay
С банков превод
България:
Титуляр на сметката: Фондация ЩИТ
IBAN: BG59 ESPY 4004 0025 3704 02
BIC: ESPYBGS1
Чужбина:
Account owner: Assoc. DRJI
Owner address: 16 bvd. Saint Germain, 75005 Paris
IBAN: FR76 1820 6002 0665 0617 8570 619
BIC: AGRIFRPP882
Плащанията за BIRD през банкова сметка в лева, през Epay.bg, EasyPay и B-Pay се поддържат от нашия партньор, Фондация ЩИТ, ЕИК 205723669
This post is also available in:
Български (Bulgarian)



You must be logged in to post a comment.