mouthporn.net
#persona management – @h4x0r3d on Tumblr
Avatar

through h4x0r3d's eyes

@h4x0r3d / h4x0r3d.tumblr.com

+-------------------------------+ .:[h4x0r3d@Hackerzlair]:. +-------------------------------+ .:[Links]:. > KOPIMI > HACKER EMBLEM > DATALOVE! > CASCADIA > ABOUT.ME #CYBERWHALEWARRIOR #DGR +-------------------------------+
+-------------------------------+
Avatar

As environmentalists began ratcheting up pressure against Canada's tar sands three years ago, one of the world's biggest strategic consulting firms was tapped to help the North American oil industry figure out how to handle the mounting activism. The resulting document, published online by WikiLeaks, offers another window into how oil and gas companies have been scrambling to deal with unrelenting opposition to their growth plans.

The document identifies nearly two-dozen environmental organizations leading the anti-oil sands movement and puts them into four categories: radicals, idealists, realists and opportunists—with how-to's for managing each. It also reveals that the worst-case scenario presented to industry about the movement's growing influence seems to have come to life.

The December 2010 presentation by Strategic Forecasting, or Stratfor, a global intelligence firm based in Texas, mostly advised oil sands companies to ignore or limit reaction to the then-burgeoning tar sands opposition movement because "activists lack influence in politics." But there was a buried warning for industry under one scenario: Letting the movement grow unopposed may bring about "the most significant environmental campaign of the decade."

"This worst-case scenario is exactly what has happened," partly because opposition to tar sands development has expanded beyond nonprofit groups to include individual activists concerned about climate change, said Mark Floegel, a senior investigator for Greenpeace. "The more people in America see Superstorm Sandys or tornadoes in Chicago, the more they are waking up and joining the fight."

[View the documents at Inside Climate News]

Since the presentation was prepared, civil disobedience and protests against the tar sands have sprung up from coast to coast. The movement has helped delay President Obama's decision on the Keystone XL pipeline—designed to funnel Canada's landlocked oil sands crude to refineries on the Gulf Coast—and has held up another contentious pipeline in Canada, the Northern Gateway to the Pacific Coast.

The Power Point document, titled "Oil Sands Market Campaigns," was recently made public by WikiLeaks, part of a larger release of hacked files from Stratfor, whose clients include the Departments of Homeland Security and Defense, Lockheed Martin, Raytheon and the American Petroleum Institute, the oil industry lobby. It appears to have been created for Calgary-based petroleum giant Suncor Energy, Canada's largest oil sands producer.

The company told InsideClimate News that it did not hire Stratfor and never saw such a presentation. Suncor is mentioned 11 times in the document's 35 pages and all of Stratfor's advice seems to be directed at the energy company. For example, one slide says, "Campaign ends quickly with a resolution along the lines Suncor had wanted." In several emails released by WikiLeaks, Stratfor employees discuss a $14,890 payment Suncor owes the company for two completed projects, though no details were provided.

The presentation is the latest in a series of revelations that suggest energy companies—which for most of their history seemed unfazed by activists—have been looking for ways to dilute environmentalists' growing influence.

Earlier this year, TransCanada, the Canadian energy company behind the Keystone XL, briefed Nebraska law enforcement authorities on how to prosecute demonstrators protesting the 1,200-mile project. In 2011, Range Resources, an oil and gas company, allegedly hired combat veterans with experience in psychological warfare to squash opposition of natural gas drilling.

"The Stratfor presentation isn't a complete surprise," said Scott Parkin, a senior campaigner for the Rainforest Action Network and volunteer organizer for Rising Tide North America, both grassroots environmental groups. "As opposition has grown, coal, oil and gas companies are all starting to put more money into responding—from surveillance to protection to public relations."

Who Was Targeted?

For each of Stratfor's categories of environmental activist—radicals, idealists, realists and opportunists—the presentation explains how their campaigns are structured and how the fossil fuel industry could deal with them.

Three grassroots organizations—Rising Tide North America, Oil Change International and the Indigenous Environmental Network—were labeled radicals. Greenpeace and the Rainforest Action Network were classified as a cross between radicals and idealists. Sierra Club, the nation's largest environmental group, Amnesty International and Communities for a Better Environment, among others, were labeled idealists. Several mainstream environmental groups, including the National Wildlife Federation, World Wildlife Fund, Natural Resources Defense Council and Ceres, a nonprofit that organizes businesses, investors and public interest groups, were called realists.

It then lays out tactics the groups would use to push for change. They include holding demonstrations outside annual meetings and marketing events, generating fear of oil spills and other environmental disasters, targeting CEOs and their families, collaborating with other green groups, and splitting the fossil fuel industry on the issue by praising companies working with activists and publicly shaming those that aren't.

The presentation says that while environmental groups are publicly fighting to stop the expansion of the oil sands, their "real demand" is for fossil fuel companies to adopt a "global code of conduct"—a set of best practices not required by law, but that take into consideration things like greenhouse gas reduction policies and human rights.

The Power Point also describes all the ways fossil fuel companies like Suncor could choose to react to green groups' campaigns, such as limiting contact with the organizations, intentionally delaying negotiations, developing its own environmental initiatives to overshadow activists' demands, or simply not responding. It provides the pros and cons of each public relations decision, as well as the best- and worst-case outcomes for each.

For example, Stratfor said that choosing not to respond could be useful because in 2010, "activists are not stopping oil sands' growth and they have no power in Alberta or Ottawa. Chance of success with U.S. government is slim." The best outcome from a no-response strategy, according to the presentation, is that green "groups move to fracturing [natural gas fracking] or some other venue to press for the first major code of conduct."

Stratfor would not answer questions about the presentation because it has a policy not to comment on any of the WikiLeaks documents.

Several environmental groups named in the Stratfor presentation said they weren't surprised by the consulting firm's assessment of their work, but were disappointed, especially by its assumption that all they wanted was a code of conduct.

"The environmental community has been very united in saying that we need to stop tar sands expansion and clean up the mess already made there," said Susan Casey-Lefkowitz, director of the Natural Resources Defense Council's international program. "That's the only real path forward if we're going to protect not only the health of communities on the ground in the boreal forests near the tar sands region, but also around the world from the impacts of climate change. We're not looking for a code of conduct."

For many, the leaked presentation provided proof that their work was having an impact, boosting their confidence to keep protesting.

"Knowing that groups like Stratfor are targeting us, surveying us, and also analyzing us shows how powerful these movements have become," said Parkin of the Rainforest Action Network and Rising Tide North America. "Obviously this wasn't meant for public consumption, but this doesn't intimidate us. If anything, it emboldens us. It encourages us to push harder."

Avatar

It was announced on Wednesday morning that Barrett Brown, a man who became a very public talking head for AnonOps (the brain trust that is arguably the cortex of the hacktivist group Anonymous, even though theretechnically isn’t one) is facing up to 100 years in jail for three separate indictments. Two of the indictments—the threatening of an FBI officer in a YouTube video and the concealing of evidence—do not seem worthy of such a harsh sentence, considering a man in Houston recieved only 42 months for threatening to blow up an FBI building, and a former dentist got 18 months for threatening to kill an FBI agent. The third, however, pertains to Barrett Brown's pasting of a link in an Anonymous IRC chat room to a document full of credit card numbers and their authentication codes that was stolen from the security company Stratfor, in the midst of a hack that released over five million internal emails. Those emails were published to Wikileaks. Some writers have rightfully raised their concerns about the legalities behind sharing a link that points to stolen material (which is why I have not linked to those five million emails) and whether or not that should be an indictable offense. However, Barrett’s work and research into Stratfor tells a much more complicated and disturbing story than a pile of stolen Visa cards.

It’s obvious by looking at the most recent posts on Barrett Brown’s blog that while he is highly interested in Stratfor, it wasn’t the credit card information that motivated him. When those five million emails leaked, a product called TrapWire, which was created by a company called Abraxas, was revealed to the public at large. And it caused a media shitstorm. In 2005, the founder of Abraxas and former head of the CIA’s European division, Richard Helms, described TrapWire as software that is installed inside of surveillance camera systems that is, “more accurate than facial recognition” with the ability to “draw patterns, and do threat assessments of areas that may be under observation from terrorists.” As Russia Today reported, one of the leaked emails, allegedly written by Stratfor’s VP of Intelligence, Fred Burton, stated that TrapWire was at “high-value targets” in “the UK, Canada, Vegas, Los Angeles, NYC.

TrapWire has since largely been dismissed as nothing to “freak out” over, and that hopefully is the case. However, far beyond what the surveillance software itself can or can’t do, the revelation that TrapWire exists has caused a chain reaction of discoveries that have seemingly revealed a mob of very powerful cybersecurity firms.

Barrett Brown was doing some very serious investigating into a company called Cubic from San Diego, that was alleged to own TrapWire as a subsidiary of their firm. This is an allegation that they officially denied. However, these tax filings from 2010 that Barrett uncovered clearly state that Cubic had in fact merged with Abraxas Corporation. If you click through and take a look, you can see that Richard Helms’s name is right there on the top of the first page.

Alongside Abraxas and Cubic on those tax filings is another company called Ntrepid. According to Florida State’s records of corporations, Richard Helms is the director of that company. In 2011, Barrett’s work helped lead the Guardian to their report that Ntrepid won a $2.76 million-dollar contract from Centcom (U.S. Central Command), to create “online persona management” software, also known as “sockpuppetry.” To break it down in plain English, online persona management was created to populate social networks with a bunch of fake and believable social media personas to “influence internet conversations and spread pro-American propaganda.”

Ntrepid also has a product they call Tartan, that’s detailed in this internal presentation hosted by the Wall Street Journal. In Ntrepid’s own parlance, they describe Tartan as a program that can “Analyze illicit organizations and less structured social networks by identifying: Ranks of influence within human networks… [and can] end the use of [online] aliases.” Clearly they are looking to dismantle the smoke and mirrors that groups like Anonymous maintain, by hanging out in chatrooms where they do not need to identify themselves officially, with many private communications happening at once. This creates a difficult-to-penetrate den, where people can easily hide online. Evidently, Ntrepid is seeking to pull all of that apart with Tartan.

Corporate info on Tartan.

In another document on Ntrepid letterhead, titled “Tartan Influence Model: Anarchist Groups,” Tartan is positioned as a software tool that can help combat domestic protestors who operate in “an amorphous network of anarchist and protest groups” and suggests that these groups are prone to violence. They name Occupy Wall Street and Occupy D.C. as part of the problem, and have “built Occupy networks through online communication with anarchists.” By identifying the threat of anarchistic, supposedly violent protestors, Tartan sells its services by saying their software “identifies the hidden relationships among organizers of seemingly unrelated movements… To mitigate the ability of anarchists to incite violence… Law enforcement must identify the complex network of relationships among anarchist leaders.” So, beyond taking apart movements that exist solely online, Tartan is looking to come out and crush real world protest movements as well.

A lot of this information and the connections between it all would not be easy to figure out were it not for Barrett Brown. For one, Barrett started ProjectPM, a wiki that is completely dedicated to piecing together all of this information about surveillance companies in the United States. He even got on the phone with a representative at Cubic to tell them that their company was full of liars and that they do in fact own TrapWire. Without Barrett Brown, tons of this research would likely have gone unearthed. Besides a few journalists, not many people have been looking into this information. The one other group that does is called Telecomix, the guys who are famous for supplying dial-up internet lines to areas of the world with oppressive dictatorships, and who I interviewed about the Gaza conflict here. They operate the Bluecabinet Wiki, and they worked very closely with Barrett Brown to uncover more information about the network of cybersecurity firms.

I talked to one of the volunteers at Telecomix, who strongly believes in the work that Barrett did to connect all of these very confusing dots: “I haven't seen reporters really taking a hard look at what Barrett Brown, the investigative journalist, was researching and where it leads to. His discovery that TrapWire = Abraxas and that there is CIA involvement is very important.  Do you know in Berlin right now a game was started to destroy surveillance cameras in public places? Barrett apparently was reading through the emails of HBGary and Stratfor, linking the data to the specific surveillance companies and contractors… It is an extremely time consuming task.”

Barrett Brown was not a hacker. He did not infiltrate any systems, nor did he appear to know how to do anything of the sort (he did try to take down the Mexican drug cartels in 2011, but that is a whole other story). Barrett was an investigative journalist who has been published in the GuardianVanity Fair,Huffington Post, and Business Week. He closely (perhaps too closely) aligned himself with Anonymous, and dug into some very serious, complicated, and high-level issues pertaining to the future of America’s cyberwar conquests. In light of recent news that the Pentagon wants 4,000 new “hackers for cyber command,” it’s clear that the US’ infrastructure for private cyber defense companies is only growing, and their motives are oftentimes confusing and frightening.

Clearly there is so much more to the Stratfor leak than a bunch of credit card numbers—and the truth behind it all, along with Barrett Brown’s possible century-long jail sentence—is a scary prospect for journalists, privacy advocates, and internet activists alike. As Barrett Brown himself said regarding the leak of Stratfor emails and the credit card numbers within them that some hackers from Anonymous used to donate money to charities: “Much of the media has focused on the fact that some participants in the attack chose to use obtained customer credit card numbers to make donations to charitable causes. Although this aspect of the operation is indeed newsworthy, and, like all things, should be scrutinized and criticized as necessary, the original purpose and ultimate consequence of the operation has been largely ignored.”

Avatar

Over the past couple of weeks, the controversy surrounding the case against Barrett Brown—the journalist charged with three crimes, including spreading stolen credit card information that was encrypted within leaked emails from the security company Stratfor—has been stirring.

Last week, as I noted in my interview with Barrett from prison, Barrett’s mother plead guilty to her charge of obstructing evidence: she hid his computers from the FBI. Late last night, the news broke through the “Free Barrett Brown” Twitter account that Brown’s Wiki, ProjectPM, which is described on the project’s Twitter page as being, “Dedicated to research of government corruption, sitting in bubble baths drinking wine,” was being subpoenaed by the Department of Justice.

ProjectPM is an online compendium where Barrett and his fellow researchers share information they've been gathering about the intelligence industry in the United States. The Department of Justice is suing the company’s hosting provider, CloudFlare. While ProjectPM appeared to have gone down on Wednesday, it seems the site is back up. This kind of spotty connection has been very common for the site over the past few months. Even Googling ProjectPM does not yield any results that point to the site.

Screenshot from Wednesday of ProjectPM error message

That said, certain articles on the site are available through Google Cache. One of the more disturbingly intriguing articles available is on Persona Management, the software developed by intelligence companies to develop phony online identities that can be used to manipulate others and disseminate propaganda. The article details a conversation—allegedly discovered through stolen internal emails, between Aaron Barr the former CEO of the security company HBGary and the former CEO of Mantech—where Aaron is demonstrating a primitive fake persona meant to “represent an intelligence contracting employee and USAF veteran, on Facebook and Twitter.” ProjectPM also claims that Aaron Barr and HBGary were out to “infiltrate Anonymous.”

Another article about Persona Development is even more concerning. The article details a PDF supposedly taken from a correspondence between Aaron Barr and Robert Frisbie that describes the tiers of fake personas and how believable they can actually become. It states that the “most detailed character[s]” also known as a “Level 3” are “required to conduct human-to-human direct contact likely in-person to satisfy some more advanced exercise requirements.

This character must look, smell, and feel 100 percent real at the most detailed level. This character will need to be associated with a real company, hold a real position with that company and have all the technical and business artifacts associated with the position and organization. The trick here is while the persona needs to be real, the actual person may not be working in this role 100 percent of the time. In these cases there are still tricks that can be used to more rapidly age or update accounts. One such trick is to build outward facing accounts such as twitter, YouTube, or blogs with generic names.”

If ProjectPM goes down, there is a similar site out there operated by the hacktivist group Telecomix. They run a Wiki called Bluecabinet that serves as a counterpart to Barrett’s own ProjectPM. I spoke to a volunteer for Bluecabinet, before the Department of Justice’s subpoena against ProjectPM, who described the differences between the two research projects to me: “Barrett Brown came to the Bluecabinet IRC mostly to discuss specific companies. He said that he liked Telecomix and Bluecabinet because we were more mature. But, both ProjectPM and Bluecabinet are concerned about the militarization of the internet and abuse of technology by governments that target the public, especially information activists.”

While Telecomix continues to do the same type of work as Barrett Brown, through their Bluecabinet Wiki, they do not seem discouraged by the punishment that Barrett is facing: “Barrett Brown was obviously targeted. He was outspoken and stood out as a journalist activist. The US government’s prosecution of information activists is so extreme, I'm concerned that they would create a honeypot or entrap me or other researchers. Obviously someone was monitoring Barrett in the IRC chatroom and documenting what links to data he posted. But his arrest has not slowed down the volunteer work of Bluecabinet at all. It has just made us more careful.”

ProjectPM’s lawyer, Jason Flores-Williams, has already launched a “Motion to Intervene and Quash Subpeona” and they have also published a press release online. In it, the Department of Justice’s subpoena is compared to the censorship in China: “The Department of Justice is abusing its subpoena power to invade lives, threaten freedoms and destroy people for simply exploring the truth about their government. Like China, they are trying to suppress and control the free flow of information and ideas.”

As reported yesterday in the Dallas News, the US Attorney’s office has requested that the motion is dismissed. According to the office, Flores-Williams is not “licensed to practice law in Texas and he failed to explain why it was not possible to confer with the government.” So far, there has been no response from the judge.

While this legal battle wages on, Barrett Brown will be sitting in jail for a full year before he even sees a judge. So far, ProjectPM has served as an online monument to Barrett’s work that has survived beyond his isolation from the real world, but if the Department of Justice succeeds in its case to take the Wiki down, that all may be lost.

Avatar

Corporate hacker Aaron Barr draws inspiration from Maxim magazine for his fake persona army.

Earlier this year, ThinkProgress obtained 75,000 private emails from the defense contractor HBGary Federal via the hacktivist group called Anonymous. The emails led to two shocking revelations. First, that an assortment of private military firms collectively called “Team Themis” had been tapped by Bank of America to conduct a cyber war against reporters sympathetically covering the Wikileaks revelations. And second, that late in 2010, the same set of firms began work separately for the U.S. Chamber of Commerce, a Republican-aligned corporate lobbying group, to develop a similar campaign of sabotage against progressive organizations, including the SEIU and ThinkProgress.

In presentations obtained by ThinkProgress from the e-mail dump detailing the tactics potentially used against progressives, HBGary Federal floated the idea of using “fake insider personas” to infiltrate left-leaning groups critical of the U.S. Chamber of Commerce’s policies. As HBGary Federal executive Aaron Barr described in several emails, his firm could work with partner companies Palantir and Berico Technologies to manipulate fake online identities, using networks like Facebook, to gain access to private information from his targets. Other presentations are more specific and describe efforts to use social media to hack computers and find vulnerabilities among even the families of people who work at organizations critical of the Chamber.

In one email from the dump, Barr discusses a fake persona he created called “Holly Weber.” She would be born in Portland in 1984, attend Reynolds High School, and work for Lockheed Martin after a stint in the Air Force. Earlier this week, Twitter users actually identified the phony account. Before it was taken down, ThinkProgress snagged screen shots of the fake persona’s Facebook and LinkedIn accounts. (Barr also described his strategy for pretending to be teenagers online). View a screenshot of the fake account below:

Profile for "Holly Weber," a fake identity created by defense contractors to manipulate their targets

Barr, who sold his illicit talents to the highest bidder, appears to be drawing on Maxim for inspiration. A Maxim covergirl named Holly Weber was also born in 1984. Unlike Barr’s creation, the Maxim one is real.

Hunton and Williams, the law firm representing the U.S. Chamber of Commerce, had been immersed in talks with HBGary Federal, Palantir, and Berico to deliver on a $2 million deal to move forward with the hacking plot against the Chamber’s critics. However, after Anonymous leaked HBGary’s emails and a few reporters picked up on the story, the Chamber distanced itself from the deal. The emails show that HBGary Federal had also worked to sell “persona management” solutions to the U.S. government for cyber intelligence work.

[- edit: for more links / info check out @phracker -]

Avatar

Sock Puppet Planet: The Secret State's Quest for 'Persona Management Software' by Tom Burghardt l Antifascist Calling... Not since AT&T whistleblower Marc Klein's 2006 revelations that U.S. telecommunications giants were secretly collaborating with the government to spy on Americans, has a story driven home the point that we are confronted by a daunting set of invisible enemies: the security and intelligence firms constellating the dark skies of the National Security State. As echoes from last month's disclosures by the cyber-guerrilla collective Anonymous continue to reverberate, leaked HBGary emails and documents are providing tantalizing insight into just how little daylight there is between private companies and the government. The latest front in the ongoing war against civil liberties and privacy rights is the Pentagon's interest in "persona management software." A euphemism for a suite of high-tech tools that equip an operative--military or corporate, take your pick--with multiple avatars or sock puppets, our latter day shadow warriors hope to achieve a leg up on their opponents in the "war of ideas" through stealthy propaganda campaigns rebranded as "information operations." A Pervasive Surveillance State The signs of a pervasive surveillance state are all around us. From the "persistent cookies" that track our every move across the internet to indexing dissidents already preemptively detained in public and private data bases: threats to our freedom to speak out without harassment, or worse, have never been greater. As constitutional scholar Jack Balkin warned, the transformation of what was once a democratic republic based on the rule of law into a "National Surveillance State," feature "huge investments in electronic surveillance and various end runs around traditional Bill of Rights protections and expectations about procedure." "These end runs," Balkin wrote, "included public private cooperation in surveillance and exchange of information, expansion of the state secrets doctrine, expansion of administrative warrants and national security letters, a system of preventive detention, expanded use of military prisons, extraordinary rendition to other countries, and aggressive interrogation techniques outside of those countenanced by the traditional laws of war." Continuing the civil liberties' onslaught, The Wall Street Journal reported last week that Barack Obama's "change" regime has issued new rules that "allow investigators to hold domestic-terror suspects longer than others without giving them a Miranda warning, significantly expanding exceptions to the instructions that have governed the handling of criminal suspects for more than four decades." The Journal points out that the administrative "revision" of long-standing rules and case law "marks another step back from [Obama's] pre-election criticism of unorthodox counterterror methods." Also last week, The Raw Story revealed that the FBI has plans to "embark on a $1 billion biometrics project and construct an advanced biometrics facility to be shared with the Pentagon." The Bureau's new biometrics center, part of which is already operating in Clarksburg, West Virginia, "will be based on a system constructed by defense contractor Lockheed Martin." "Starting with fingerprints," The Raw Story disclosed, the center will function as "a global law enforcement database for the sharing of those biometric images." Once ramped-up "the system is slated to expand outward, eventually encompassing facial mapping and other advanced forms of computer-aided identification." The transformation of the FBI into a political Department of Precrime is underscored by moves to gift state and local police agencies with electronic fingerprint scanners. Local cops would be "empowered to capture prints from any suspect, even if they haven't been arrested or convicted of a crime." "In such a context," Stephen Graham cautions in Cities Under Siege, "Western security and military doctrine is being rapidly imagined in ways that dramatically blur the juridical and operational separation between policing, intelligence and the military; distinctions between war and peace; and those between local, national and global operations." This precarious state of affairs, Graham avers, under conditions of global economic crisis in the so-called democratic West as well as along the periphery in what was once called the Third World, has meant that "wars and associated mobilizations ... become both boundless and more or less permanent." Under such conditions, Dick Cheney's infamous statement that the "War on Terror" might last "decades" means, according to Graham, that "emerging security policies are founded on the profiling of individuals, places, behaviours, associations, and groups." But to profile more effectively, whether in Cairo, Kabul, or New York, state security apparatchiks and their private partners find it necessary to squeeze ever more data from a surveillance system already glutted by an overabundance of "situational awareness." "Last October," Secrecy News reported, "the DNI revealed that the FY2010 budget for the National Intelligence Program (NIP) was $53.1 billion. And the Secretary of Defense revealed that the FY2010 budget for the Military Intelligence Program (MIP) was $27.0 billion, the first time the MIP budget had been disclosed, for an aggregate total intelligence budget of $80.1 billion for FY 2010." This excludes of course, the CIA and Pentagon's black budget that hides a welter of top secret and above Special Access Programs under a dizzying array of code names and acronyms. In February, Wired disclosed that the black budget "appears to be about $56 billion, the same as last year," but this "may only be the tip of an iceberg of secret funds." While the scandalous nature of such outlays during a period of intense economic and social attacks on the working class are obvious, less obvious are the means employed by the so-called "intelligence community" to defend an indefensible system of exploitation and corruption. Which brings us back to the HBGary hack. "Operation MetalGear" While media have focused, rightly so, on the sleazy campaign proposed to Bank of America and the U.S. Chamber of Commerce by the high-powered law firm and lobby shop Hunton & Williams (H&W) to bring down WikiLeaks and tar Chamber critics, the treasure trove of emails leaked by Anonymous also revealed a host of Pentagon programs pointed directly at the heart of our freedom to communicate. In fact, The Tech Herald revealed that while Palantir and Berico sought to distance themselves from HBGary and Hunton & William's private spy op, "in 2005, Palantir was one of countless startups funded by the CIA, thanks to their venture funding arm, In-Q-Tel." "Most of In-Q-Tel's investments," journalist Steve Ragan wrote, "center on companies that specialize in automatic collection and processing of information." In other words Palantir, and dozens of other security start-ups to the tune of $200 million since 1999, was a recipient of taxpayer-funded largess from the CIA's venture capitalist arm for products inherently "dual-use" in nature. "Palantir Technologies," The Tech Herald revealed, was "the main workhorse when it comes to Team Themis' activities." In proposals sent to H&W, a firm recommended to Bank of America by a Justice Department insider, "Team Themis said they would 'leverage their extensive knowledge of Palantir's development and data integration environments' allowing all of the data collected to be 'seamlessly integrated into the Palantir analysis framework to enhance link and artifact analysis'." Following the sting of HBGary Federal and parent company HBGary, Anonymous disclosed on-going interest and contract bids between those firms, Booz Allen Hamilton and the U.S. Air Force to develop software that will allow cyber-warriors to create fake personas that help "manage" Pentagon interventions into social media platforms like Facebook, Twitter and blogs. As Ragan points out, while the "idea for such technology isn't new," and that "reputation and persona management techniques have been used by the government and the private sector for years," what makes these disclosures uniquely disturbing are apparent plans by the secret state to use the software for propaganda campaigns that can just as easily target an American audience as one in a foreign country. While neither HBGary nor Booz Allen secured those contracts, interest by HBGary Federal's disgraced former CEO Aaron Barr and others catering to the needs of the militarist state continue to drive development forward. Dubbed "Operation MetalGear", Anonymous believes that the program "involves an army of fake cyber personalities immersed in social networking websites for the purposes of manipulating the mass population via influence, crawling information from major online communities (such as Facebook), and identifying anonymous personalities via correlating stored information from multiple sources to establish connections between separate online accounts, using this information to arrest dissidents and activists who work anonymously." As readers recall, such tools were precisely what Aaron Barr boasted would help law enforcement officials take down Anonymous and identify WikiLeaks supporters. According to a solicitation (RTB220610) found on the FedBizOpps.Gov web site, under the Orwellian tag "Freedom of Information Act Support," the Air Force is seeking software that "will allow 10 personas per user, replete with background, history, supporting details, and cyber presences that are technically, culturally and geographacilly [sic] consistent." We're informed that "individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries." Creepily, "personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information." Aiming for maximum opacity, the RFI demands that the licence "protects the identity of government agencies and enterprise organizations." An "enterprise organization" is a euphemism for a private contractor hired by the government to do its dirty work. The proposal specifies that the licensed software will enable "organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization." While Barr's premature boasting may have brought Team Themis to ground, one wonders how many other similar operations continue today under cover of the Defense Department's black budget. Corporate Cut-Outs Following up on last month's revelations, The Guardian disclosed that a "Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an 'online persona management service' that will allow one US serviceman or woman to control up to 10 separate identities based all over the world." That firm, a shadowy Los Angeles-based outfit called Ntrepid is devoid of information on its corporate web site although a company profile avers that the firm "provides national security and law enforcement customers with software, hardware, and managed services for cyber operations, analytics, linguistics, and tagging & tracking." According to Guardian reporters Nick Fielding and Ian Cobain, Ntrepid was awarded a $2.76M contract by CENTCOM, which refused to disclose "whether the multiple persona project is already in operation or discuss any related contracts." Blurring corporate lines of accountability even further, The Tech Herald revealed that Ntrepid may be nothing more than a "ghost corporation," a cut-out wholly owned and operated by Cubic Corporation. A San Diego-based firm describing itself as "a global leader in defense and transportation systems and services" that "is emerging as an international supplier of smart cards and RFID solutions," Cubic clocks in at No. 75 on Washington Technology's list of 2010 Top Government Contractors. Founded by Walter J. Zable, the firm's Chairman of the Board and CEO, Cubic has been described as one of the oldest and largest defense electronics firms on the West Coast. Chock-a-block with high-level connections to right-wing Republicans including Darrell Issa, Duncan Hunter and Dan Coates, during the 2010 election cycle Cubic officers donated some $90,000 to Republican candidates, including $25,000 to the National Republican Congressional Committee and some $30,000 to the National Republican Senatorial Committee, according to the Center for Responsive Politics' OpenSecrets.org. With some $1 billion in 2009 revenue largely derived from the Defense Department, the company's "Cyber Solutions" division "provides specialized cyber security products and solutions for defense, intelligence and homeland security customers." The RFI for the Air Force disclosed by Anonymous Ragan reports, "was written for Anonymizer, a company acquired in 2008 by intelligence contractor Abraxas Corporation. The reasoning is that they had existing persona management software and abilities." In turn, Abraxas was purchased by Cubic in 2010 for $124 million, an acquisition which Washington Technology described as one of the "best intelligence-related" deals of the year. As The Tech Herald revealed, "some of the top talent at Anonymizer, who later went to Abraxas, left the Cubic umbrella to start another intelligence firm. They are now listed as organizational leaders for Ntrepid, the ultimate winner of the $2.7 million dollar government contract." Speculation is now rife that since "Ntrepid's corporate registry lists Abraxas' previous CEO and founder, Richard Helms, as the director and officer, along with Wesley Husted, the former CFO, who is an Ntrepid officer as well," the new firm may be little more than an under-the-radar front for Cubic. Amongst the Security Services offered by the firm we learn that "Cubic subsidiaries are working individually and in concert to develop a wide range of security solutions" that include: "C4ISR data links for homeland security intelligence, surveillance and reconnaissance missions;" a Cubic Virtual Analysis Center which promises to deliver "superior situational awareness to decision makers in government, industry and nonprofit organizations," human behavior pattern analysis, and other areas lusted after by securocrats. The Guardian informs us that the "multiple persona contract is thought to have been awarded as part of a programme called Operation Earnest Voice (OEV), which was first developed in Iraq as a psychological warfare weapon against the online presence of al-Qaida supporters and others ranged against coalition forces." "Since then," Fielding and Cobain wrote, "OEV is reported to have expanded into a $200m programme and is thought to have been used against jihadists across Pakistan, Afghanistan and the Middle East." While CENTCOM's then-commander, General David Petraeus told the Senate Armed Services Committee last year that the program was designed to "counter extremist ideology and propaganda," in light of HBGary revelations, one must ask whether firms involved in the dirty tricks campaign against WikiLeaks have deployed versions of "persona management software" against domestic opponents. While we cannot say with certainty this is the case, mission creep from other "War on Terror" fronts, notably ongoing NSA warrantless wiretapping programs and Defense Department spy ops against antiwar activists, also involving "public-private partnerships" amongst security firms and the secret state, should give pause.    

Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly and Global Research, an independent research and media group of writers, scholars, journalists and activists based in Montreal, he is a Contributing Editor with Cyrano's Journal Today. His articles can be read on Dissident Voice, The Intelligence Daily, Pacific Free Press, Uncommon Thought Journal, and the whistleblowing website WikiLeaks. He is the editor of Police State America: U.S. Military "Civil Disturbance" Planning, distributed by AK Press and has contributed to the new book from Global Research, The Global Economic Crisis: The Great Depression of the XXI Century.

You are using an unsupported browser and things might not work as intended. Please make sure you're using the latest version of Chrome, Firefox, Safari, or Edge.
mouthporn.net