Israeli hackers pop up to recruit Palestinian spies


July 10, 2015
Sarah Benton


The pop-up invitation to spy, in Arabic, Richard Silverstein screenshot, see 2nd item.

1-800-mossad

By Nicola Perugini, LRB blog
July 03, 2015

In a cafe in Ramallah recently, an interesting page in Arabic popped up on my computer while I was reading the news. ‘The chance of your life’, it said. There were scrolling photomontages of a man with an earpiece, an intelligence room, an aerial picture of a targeted assassination; wads of dollars; a handshake, between two piles of passports; a man wearing a hoodie, his face obscured, in a virtual tunnel of binary numbers. I carried on reading:

Do you have any information? We can help you!
[Call] 1-800-800-319
Who We Are
Our responsibility towards the two peoples [Israelis and Palestinians] is to preserve security and safety. We want to ensure a life of dignity and freedom for all.
Our goal is to fight all forms of terrorism and violence, and to promote peace. We have considerable capabilities, most importantly our human resources.
What We Request
You have the chance to earn a lot of money if you will provide us with information about:
1. Terrorist activities
2. Tunnels under borders
3. Planned attacks
4. Hostages and missing people

I called the 1-800 number, only to get a message in Hebrew telling me I had reached voicemail. Is Mossad slipping or am I missing something?

Comments on “1-800-mossad”
Geoff Roberts says:
6 July 2015 at 10:24 am

You’ll be in their files now if you weren’t already. My take is that some bright young member thought it would be a good way to trawl for suspicious persons. In terrorspeak, ‘suspicious’ means anybody who utters criticism of Israel’s policies and who is therefore (sic) an extremist – and we all know how dangerous extremists are.


For a Good Time, Call 1-800 SHINBET!

By Richard Silverstein, Tikun Olam,
July 04, 2015

Nicola Perugini, a good friend (online) and co-author with Neve Gordon of numerous articles and a new book on the Israel-Palestine conflict, was sitting in a Ramallah cafe recently.  He was working on his laptop when the page he was viewing was replaced by the image displayed [above].  It is a recruitment page for the Israeli Shin Bet, asking for Palestinians who want to earn big bucks and keep the world safe (for Israel), to contact the phone number listed.

Nicola published this story at the London Review of Books, where it was titled with the misnomer, 1-800 MOSSAD.  Of course, the Mossad doesn’t recruit Palestinian spies.  The Shin Bet does.  So it should more aptly be titled, 1-800 SHINBET.  Interestingly, Israel domestic security service, like the Israeli government, does not recognize Palestinian sovereignty.  It considers Palestine part of Israel.

[English translation of recruitment page, see above]

The original domain, Helpmegaza.com, has been taken down.  A domain name which suggests there’s a personal profit (“Help me”) to be made from exploiting Gaza is supremely ironic.  Here’s the Domain Tools website info which indicates the page is registered in Petah Tikvah.  It has a robot.txt page ensuring it isn’t web crawled nor archived in the Wayback Machine.  Apparently, it has been recruiting Palestinian spies in Gaza and the West Bank for two years.  Note also, that the Mossad maintains a similar site seeking informers to betray Hezbollah commanders.

Some of the Gaza domain registration information is obviously fake.  But one intriguing bit stands out.  The technical registration information is for a high-tech center in Haifa, which houses some of the world’s major corporations doing business in Israel.  The company listed is Omega Advanced Technology Center MATAM (telephone 972-4-8560514).  I haven’t found any other reference to the company except this one.  It’s perfectly credible that Unit 8200 would be operating at MATAM as well.  Or that it would contract this work to one of the companies in this center.

Either whoever did this job was very sloppy or MATAM/Omega is part of the hoax as well.

It’s unlikely the Shin Bet itself performed the technical measures necessary to serve this page on Nicola’s laptop.  More likely this little feat was engineered by those tech whizzes in Unit 8200, the IDF’s SIGINT outfit.  I’m guessing that it has either engineered a backdoor into the Palestinian ISP; or that it’s figured out a way to inject web pages as Palestinians surf the web.  Of course, it’s also possible they were personally targeting Nicola himself, though I doubt in this case their efforts are that individualized.

© Copyright JFJFP 2024