background preloader

Stratfor emails reveal secret, widespread TrapWire surveillance system

Stratfor emails reveal secret, widespread TrapWire surveillance system

An Interview with Richard "Hollis" Helms, Founder and CEO, Abraxas Corp. // The Entrepreneur Center @ NVTC Not to be confused with the other Richard Helms (who headed the CIA under Nixon), “Hollis” Helms was with the CIA for nearly 30 years until October 1999, including 12 years overseas in several postings in the Mideast and South Asia. He was also one of the original assignees to its Counter Terrorism Center in the mid-1980s. He started Abraxas Corp. four years ago. Bisnow on Business: This is some retirement – you left the government and became an entrepreneur. So what does Abraxas do exactly? Who would use you for what? What’s the deliverable? Choosing to put your own money up first is a risk. So you don’t believe that early money is like yeast? You really draw from the early entrepreneurial spirit of aviation. You have a product with an intriguing name: TrapWire. Is TrapWire a service or a product, or what does it look like exactly? You were the only employee at the beginning, and now you've grown to over 200. What do you think of advisory boards? Which was? What does Abraxas mean?

why is the company called “abraxas”, why is the boss’s nickname “hollis”, why why why « Niqnaq To tell you the truth, I was having to fill out a Virginia state incorporation form, and I went into the living room and said, “Quick, give me a name. I don’t want to be one of these companies named after myself.” And my daughter was reading a book of mythology. Only later did I realize Abraxas was also the name of a hard rock band, and a Santana album. - “Hollis” Helms (no relation) Stratfor emails reveal secret, widespread TrapWire surveillance systemRussia Today, Aug 10 2012 Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology and have installed it across the US under the radar of most USAians, according to emails hacked by Anonymous. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of DDoS attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails. God Bless USAia.

TrapWire The report which is available as a 3.5MB pdf which places Australia in second place, behind America, but ahead of China in cyber capabilities. The report is written by Tobias Feakin, Jess Woodall and Klée Aiken and published through Australian Strategic Policy Institute, or the ASPI. It reads more like a score card, the same criteria is marked off against each country in a tabulated format. This then gives a ranking from highest to lowest. Throughout the criteria the most common flaw seems to be out dated or poorly maintained infrastructure which is impeding the internet access to a population. Some countries receive high praise for scoring in the eighty percents as others are relegated to “poor” and “disconnected”. What the report fails to highlight is the difference between internet subscriptions and mobile phones connected to the internet, or is this a statistical trick, often used to make things seem more than what they really are…? Like this: Like Loading...

The Gentleperson's Guide To Forum Spies 25 February 2014. Related: GCHQ Full-Spectrum Cyber Effects: 24 February 2014. GCHQ DISRUPTION Operational Playbook: 29 January 2014. (18MB) 4 March 2012. 12 July 2012 The Gentleperson's Guide To Forum Spies A sends: The Gentleperson's Guide To Forum Spies (spooks, feds, etc.) 1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum.. There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. Technique #1 - 'FORUM SLIDING' If a very sensitive posting of a critical nature has been posted on a forum - it can be quickly removed from public view by 'forum sliding.' Technique #2 - 'CONSENSUS CRACKING' 1. 2. 3. 4. 5. 6. 7. 8.

Sinaloa Cartel Operative Jesus Vincente Zambada Niebla Makes Explosive Allegation About Operation ‘Fast and Furious’ A high-ranking Mexican drug cartel operative currently in U.S. custody is making startling allegations that the failed federal gun-walking operation known as “Fast and Furious” isn’t what you think it is. It wasn’t about tracking guns, it was about supplying them — all part of an elaborate agreement between the U.S. government and Mexico’s powerful Sinaloa Cartel to take down rival cartels. The explosive allegations are being made by Jesus Vicente Zambada-Niebla, known as the Sinaloa Cartel’s “logistics coordinator.” He was extradited to the Chicago last year to face federal drug charges. Jesus Vicente Zambada-Niebla (Source: MSNBC) Zambada-Niebla claims that under a “divide and conquer” strategy, the U.S. helped finance and arm the Sinaloa Cartel through Operation Fast and Furious in exchange for information that allowed the DEA, U.S. “Congress won’t get involved in really any criminal case until the trial is over and the smoke has cleared,” he added. “Classified Materials”

Les techniques secrètes pour contrôler les forums et l’opinion publique Attention, c'est du lourd ! Le 12 juillet dernier, le site Cryptome, sorte d'ancêtre à Wikileaks, qui publie des documents que les gouvernements et les sociétés n'aimeraient pas voir sur le net, a mis en ligne le témoignage et les explications techniques d'un ex-agent de Cointelpro. Cointelpro est une organisation US liée au FBI dont la mission était de faire de la désinformation et de foutre le bordel parmi les groupes d'activistes. Officiellement, Cointelpro a disparu en 71, mais l'organisation a juste changé de noms. Maintenant en plus d'infiltrer de manière classique des groupes d'activistes, cette ou ces organisations gouvernementales officient sur Internet pour enterrer les bad buzz et noyer le poisson sur les forums d'activistes. Le 18 juillet, ce témoignage sur Cryptome a été mis en avant sur Slashdot par un contributeur de longue date. Mais peu importe... Techniques pour manipuler les forums sur Internet Technique #1 – " FORUM SLIDING " Technique #2 – " CONSENSUS CRACKING " 1. 1.

Top 5 Stratfor Wikileaks Revelations (So Far) This week, Wikileaks began publishing the first of some five million hacked emails from the private intelligence firm, Stratfor, which cultivates anonymous sources in governments and business in order to provide intelligence assessments on a variety of matters to paying clients. Many of the emails are mundane and not particularly insightful, while others, if accurate, are more revelatory. Based on my readings of all the emails released thus far, here are the five most interesting: #5. Sharif Mobley wasn’t in Al Qaeda, despite media claims. The real story here isn’t so much about Mobley himself, but what it says about the American media. Money quote: “Heard from a very reliable source close to the folks who debriefed Mobely that the dude’s a] bat shit crazy; and b] he's going to die here.” #4. #3. Money quote: “The Mexican government is now paying some $25m for UAVs from Israel. #2. #1. Money quote: “God knows how many years were wasted chasing the sob in the tribal belt.”

Forget PRISM: FAIRVIEW is the NSA's project to "own the Internet" According to Thomas Drake, a former National Security Agency senior executive who blew the whistle on the agency’s reckless spending and spying in 2006, a previously unknown NSA surveillance program known as FAIRVIEW aims to “own the Internet.” Last month, former NSA contractor Edward Snowden leaked a series of PowerPoint slides to the Washington Post and the Guardian revealing that the agency was engaged in a large-scale Internet surveillance program, dubbed PRISM, that collects Americans’ chats, emails, photos, and videos. One of the slides, only later released by the two papers, made reference to a group of additional “upstream” collection programs, including two named FAIRVIEW and BLARNEY, but gave no further details about their function. Drake, who was prosecuted under the Espionage Act for his whistleblowing, explained the upstream programs to the Daily Dot. “Upstream means you get inside the system before it’s in the Internet. Illustration by Fernando Alfonso III

Privacy and Security Fanatic: Rise of the AI Overlord: Machines monitor, automatically detect suspicious behavior When it comes to monitoring CCTV video feeds for suspicious activity, the human brain reportedly overlooks 45% of all activity after 12 minutes. After 22 minutes, the human brain overlooks 95% of all activity. But what if all the 45 - 60 million eye-in-the-sky cameras were connected to computers with artificial intelligence . . . computers with an extraordinary AI brain that can see, learn, get smarter with time, and make decisions on what behavior recognition threats to report in real-time? While TrapWire seems to use "behavioral recognition" to analyze video and camera feeds, a "video camera on its own is dumb." Most video analytics are rule-based logic systems that continually need the rules redefined, can give hundreds of false-alarm alerts, and even miss true threats in real-time. "We are seeing more and more surveillance cameras installed everywhere, and increasingly they are being networked together.

Next Monday at the Supreme Court: Trying to Stop the NSA’s Unconstitutional Overreach The next time you send an email or make a phone call to a friend outside the country, consider this: the National Security Agency could be making a copy of your communication and storing it. What about the Fourth Amendment? According to the government, not only is this practice constitutional, but ordinary federal courts should not even be allowed to rule on it. On October 29th, the ACLU will be at the Supreme Court to argue this very issue in our lawsuit challenging the NSA’s warrantless wiretapping program, which Congress authorized in the FISA Amendments Act of 2008. This unprecedented law allows the NSA to engage in dragnet surveillance of Americans’ international emails and phone calls. Today in an op-ed in Politico, two whistleblowers who worked at the NSA for decades, Bill Binney and J. The plaintiffs in our lawsuit, Amnesty v. Binney and Wiebe conclude by explaining why the courts’ ability to review the law is so important.

US Internet attacks due to corrupt campaign laws – exclusive interview with Anonymous, part 2 Opening Robles: "Can you go into some of the steps that the US Government and other governments have gone to in order to control and censor the flow of information worldwide?" Anonymous: Yes (and No). Best examples: ACTA, SOPA, PIPA, CETA, TRAPWIRE, INDECT (Europe) and and and ... not to forget patriot act and NDAA. The steps are very obvious. False Flag ops by the feds are quite easy to carry out. It’s pretty obvious this is a false flag op to discredit Anonymous and to try control the web - specifically to control the flow of alternative media. In the US politicians are able to get into office through campaign contributions from an industry, then push legislation on their behalf and then retire from their elected positions into their employment. All attacks on the Internet are due to corrupt campaign finance laws in the United States. Robles: "What is the Anonymous position on the media, on copyrights, on file sharing and on content?" Reminder Robles: What about copyrights? We are Legion.

Trapwire « New World News Some flyers made for OpNov5 and OpVendetta – Please use these and spread throughout your local area. Invite anyone who has any issues to air their grievances with their local government. #OpNov5 – Global Day of Protest – Defend Your Freedoms. #OpNov5 Sydney Flyer – OpNov5SydneyFlyer (PDF) #OpNov5 Sydney Flyer ODT (OpenOffice) – OpNov5Sydney(ODT) #OpNov5 Global day of Protest Flyer – Globaldayofprotest(PDF) #OpNov5 Global day of Protest Flyer ODT (OpenOffice) – Globaldayofprotest(ODT) #OpNov5 Australia Wide Flyer (PDF) – OpNov5Australia(PDF) #OpNov5 Australia Wide Flyer ODT (openoffice) – OpNov5Australia(ODT) #OpNov5 “Protect Your Freedoms” Flyer (PDF) – protectyourfreedomflyer(PDF) #OpNov5 “Protect Your Freedoms” Flyer (ODT) – protectyourfreedomflyer(ODT) Paper (Printable) Anon Mask - Print and Use Mask Like this: Like Loading...

Google: Surveillance 'is on the rise' Google received more requests from the U.S. government to hand over user data during the first half of this year than from any other country, according to the search company's biannual "Transparency Report" released on Tuesday. From January to June, Google received nearly 8,000 requests for user data from the U.S. government. The search company said it "fully or partially" compiled with roughly 90 percent of them. That's up from the 5,950 requests for user data that Google received from the U.S. government during the same period a year ago. More than 16,000 Google accounts were specified in the U.S. government's user data requests, according to the report. However, the search company cautioned that the total number of U.S. government requests for user data also tallied requests "issued by U.S. authorities on behalf of other governments pursuant to mutual legal assistance treaties and other diplomatic mechanisms." More from The Hill: ♦ Rep.

Related: