Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Hacked Emails from HBGary Reveal Disturbing Public-Private Partnership to Spy on Web Users (New)

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
Hissyspit Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-22-11 02:45 PM
Original message
Hacked Emails from HBGary Reveal Disturbing Public-Private Partnership to Spy on Web Users (New)
Edited on Wed Jun-22-11 02:50 PM by Hissyspit
Source: Guardian UK

A sinister cyber-surveillance scheme exposed

Hacked emails from security contractor HBGary reveal a disturbing public-private partnership to spy on web users


Barrett Brown
guardian.co.uk, Wednesday 22 June 2011 19.39 BST

In February 2011, the hackers' collective Anonymous released 70,000 emails from security contractor HBGary, which revealed that CEO Aaron Barr had offered the firm's services to mount cyber-attacks against WikiLeaks and others on behalf of corporate clients. Photograph: Getty Images

- snip -

Last February, three of these firms – HBGary Federal, Palantir and Berico, known collectively as Team Themis – were discovered to have conspired to hire out their information war capabilities to corporations which hoped to strike back at perceived enemies, including US activist groups, WikiLeaks and journalist Glenn Greenwald. That such a dangerous new dynamic was now in play was only revealed due to a raid by hackers associated with the Anonymous collective, resulting in the dissemination of more than 70,000 emails to and from executives at HBGary Federal and its parent company HBGary.

After having spent several months studying those emails and otherwise investigating the industry depicted therein, I have revealed my summary of a classified US intelligence programme known as Romas/COIN, as well as its upcoming replacement, known as Odyssey. The programme appears to allow for the large-scale monitoring of social networks by way of such things as natural language processing, semantic analysis, latent semantic indexing and IT intrusion. At the same time, it also entails the dissemination of some unknown degree of information to a given population through a variety of means – without any hint that the actual source is US intelligence. Scattered discussions of Arab translation services may indicate that the programme targets the Middle East.

- snip -

The significance of this programme to the public is not limited to its potential for abuse by facets of the US intelligence community, which has long been proverbial for misusing other of its capabilities. Perhaps the most astonishing aspect is the fact that the partnership of contracting firms and other corporate entities that worked to obtain the contract was put into motion in large part by Aaron Barr, the disgraced former CEO of HBGary Federal who was at the centre of Team Themis's conspiracy to put high-end intelligence capabilities at the disposal of private institutions. As I explain further in the linked report, this fact alone should prompt increased investigation into the manner in which this industry operates and the threats it represents to democratic institutions.

Read more: http://www.guardian.co.uk/commentisfree/cifamerica/2011/jun/22/hacking-anonymous



http://www.dailykos.com/story/2011/06/22/987679/-The-Nature-of-Romas-COIN?via=blog_481394

WED JUN 22, 2011 AT 02:30 PM EDT

The Nature of Romas/COIN

bybarrettbrown

Although the relatively well-known military contractor Northrop Grumman had long held the contract for Romas/COIN, such contracts are subject to regular recompetes by which other companies, or several working in tandem, can apply to take over. In early February, HBGary Federal CEO Aaron Barr wrote the following e-mail to Al Pisani, an executive at the much larger federal contractor TASC, a company which until recently had been owned by Northrop and which was now looking to compete with it for lucrative contracts:

"I met with Bob Frisbie the other day to catch up. He is looking to expand a capability in IO related to the COIN re-compete but more for DoD. He told me he has a few acquisitions in the works that will increase his capability in this area. So just a thought that it might be worth a phone call to see if there is any synergy and strength between TASC and ManTech in this area. I think forming a team and response to compete against SAIC will be tough but doable." IO in this context stands for “information operations,” while COIN itself, as noted in an NDA attached to one of the e-mails, stands for “counter intelligence.” SAIC is a larger intelligence contractor that was expected to pursue the recompete as well.

Pisani agreed to the idea, and in conjunction with Barr and fellow TASC exec John Lovegrove, the growing party spent much of the next year working to create a partnership of firms capable of providing the “client” - a U.S. agency that is never specified in the hundreds of e-mails that follow – with capabilities that would outmatch those being provided by Northrop, SAIC, or other competitors.

Several e-mails in particular provide a great deal of material by which to determine the scope and intent of Romas/COIN. One that Barr wrote to his own e-mail account, likely for the purpose of adding to other documents later, is entitled “Notes on COIN.” It begins with a list of entries for various facets of the program, all of which are blank and were presumably filled out later: “ISP, Operations, Language/Culture, Media Development, Marketing and Advertising, Security, MOE.” Afterwards, another list consists of the following: “Capabilities, Mobile Development, Challenges, MOE, Infrastructure, Security.” Finally, a list of the following websites is composed, many of which represent various small companies that provide niche marketing services pursuant to mobile phones.
Printer Friendly | Permalink |  | Top
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-22-11 02:58 PM
Response to Original message
1. In my business, the Network Security business....
this was a huge topic of conversation.

I spoke with my CEO about the Anonymous attack on HB Gary and he said.... "you don't swat at a Hornets nest" which is exactly what the HBGary CEO did when he loudly pronounced he was going after Anonymous.

Great piece on how it went down:

It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.

When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary's servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced. As an added bonus, a second site owned and operated by Greg Hoglund, owner of HBGary, was taken offline and the user registration database published.
http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars
Printer Friendly | Permalink |  | Top
 
fascisthunter Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-22-11 03:19 PM
Response to Reply #1
2. awesome
Printer Friendly | Permalink |  | Top
 
frylock Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-22-11 05:05 PM
Response to Reply #1
5. hoglund had to BEG anonymous to call off the dogs..
what an excellent moment that was!
Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-22-11 07:53 PM
Response to Reply #5
6. Yes it was
the hackers in my company loved it... he was a fool for doing what he did.
Printer Friendly | Permalink |  | Top
 
xchrom Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-22-11 03:38 PM
Response to Original message
3. Recommend
Printer Friendly | Permalink |  | Top
 
Tempest Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-22-11 04:18 PM
Response to Original message
4. Hackers will always have the upper hand

Without a set organization structure, and the passion to expose wrongdoing, groups like Anonymous and Lutz will always win.
Printer Friendly | Permalink |  | Top
 
JackRiddler Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-22-11 10:50 PM
Response to Original message
7. File another one under "while you talked about Weiner" - or on DU, Hamsher!
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-23-11 01:00 AM
Response to Original message
8. New? Not seeing it.
All the things mentioned in this are kind of old hat, or recent variants on old standards....

Printer Friendly | Permalink |  | Top
 
snot Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-23-11 10:57 AM
Response to Original message
9. K&R'd
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri May 03rd 2024, 05:07 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC