Abraxas and Trapwire: the technology and personnel revealed - Printable Version +- Deep Politics Forum (https://deeppoliticsforum.com/fora) +-- Forum: Deep Politics Forum (https://deeppoliticsforum.com/fora/forum-1.html) +--- Forum: Science and Technology (https://deeppoliticsforum.com/fora/forum-11.html) +--- Thread: Abraxas and Trapwire: the technology and personnel revealed (/thread-9724.html) |
Abraxas and Trapwire: the technology and personnel revealed - Ed Jewett - 10-08-2012 link: http://storify.com/bendoernberg/test-post TrapWire: "See Something, Say Something"...To The CIA? New Stratfor emails released by WikiLeaks indicate that TrapWire, a defense contractor owned and operated by ex-CIA operatives, sits at the heart of American intelligence. Everything from incidents on military base to calls to NYC's "See Something, Say Something" are routed through TrapWire.
Abraxas and Trapwire: the technology and personnel revealed - Magda Hassan - 12-08-2012 Abraxas and Trapwire: the technology and personnel revealedPOSTED BY ANONYMOUS ⋅ AUGUST 11, 2012 ⋅ 3 COMMENTSFILED UNDER ABRAXAS, ASSANGE, TRAPWIRE TrapWire is a secret global surveillance system, founded in 2004 and run by ex-CIA chiefs, with clients all over the world. It's significance is that it is being used for all sorts of surveillance, including everyday protests. The existence of TrapWire was only made known a few days ago, thanks to documents published by Wikileaks (and hacking of Stratfor docs by Anonymous). It is now believed that the recent cyber attacks on the Wikileaks sites were in retaliation for the exposure of Trapwire, which is both a product and a company (a subsidiary of the Abraxas Corporation). Here, Darker Net provides a) an introduction to the TrapWire technology, b) details of how that technology works and c) the people who run TrapWire AND Abraxas. Oh, and then there's the mysterious green and blue badgers (!!!) see below…For hackers, here is the TrapWire operating console.A. IntroductionAccording to Richard Helms, the notorious ex-CIA Director and founder of Abraxas in 2001, TrapWire was designed to share threat information and establish patterns of data that could be used to predict attacks. "It can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists," he said. "The application can do things like type' individuals so if people say medium build,' you know exactly what that means from that observer."A leaked email from Fred Burton, Stratfor's vice president for intelligence, states that the TrapWire network is now covering most North American and British high-value targets (HVT.) "I knew these hacks when they were GS-12′s at the CIA. God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients," he wrote."….tell me that more than 50 percent of the National Clandestine Service (NCS) the heart, brains and soul of the CIA has been outsourced to private firms such as Abraxas , Booz Allen Hamilton, Lockheed Martin and Raytheon. "These firms recruit spies, create non-official cover identities and control the movements of CIA case officers. They also provide case officers and watch officers at crisis centers and regional desk officers who control clandestine operations worldwide. As the Los Angeles Times first reported, more than half the workforce in two key CIA stations in the fight against terrorism Baghdad and Islamabad, Pakistan is made up of industrial contractors, or green badgers,' in CIA parlance. "Intelligence insiders say that entire branches of the NCS have been outsourced to private industry. These branches are still managed by U.S. government employees (blue badgers') who are accountable to the agency's chain of command. But beneath them, insiders say, is a supervisory structure that's controlled entirely by contractors; in some cases, green badgers are managing green badgers from other corporations." R.J. Hillhouse, July 8, 2007, Washington Post.TrapWire is also linked to the National Suspicious Activity Reporting (NSI) Initiative, a program designed to help aggregate reports of suspicious activity around the USA. One email from TrapWire states "TrapWire SAR reports are fed directly/automatically into the National SAR Initiative" as well as "the FBI's eGuardian system if/when there's confirmed nexus to terrorism or major crimes (which is happening frequently)." The email goes on "our networks in LA, Vegas and DC all support See Something Say Something (S4 as I call it)." Further, Over the past few years, several cities around the U.S. have implemented websites allowing the public to report suspicious activity, including Washington D.C., Houston and even the U.S. Army. These activities are part of a larger program called iWatch, which also feeds into TrapWire according to a leaked email.A copy of the TrapWire brochure can be downloaded here. A white paper on TrapWire can be downloaded here.B. The TrapWire technologyThe prevention of terrorist attacks on critical infrastructure requires the ability to detect various discreet but identifiable indicators of pre-attack preparations. Only by uncovering such attack preparations can we take actions designed to deter or intercept a terrorist strike before it begins. While international terrorist organizations are using increasingly sophisticated methods, their modus operandi does contain a critical vulnerability: meticulous pre-attack preparations require the terrorists to approach a target facility on multiple occasions to identify physical and procedural vulnerabilities, probe for weaknesses and conduct practice missions. For example, the terrorists planning the Khobar Towers attack in Saudi Arabia reportedly surveilled the facility on 40 occasions. Terrorists will typically surveil multiple facilities prior to selecting an appropriately vulnerable target. Therefore, as the number of facilities on the Trap Wire network increases, so does the probability of detecting pre-attack preparations. Trap Wire is specifically designed to exploit this vulnerability by combining deep counterterrorism experience, proven counter-surveillance techniques, unique sensor systems, and data mining capabilities to detect attack preparations and allow security personnel to deter or intercept terrorist operations.TrapWire dramatically increases the ability to detect pre-attack preparations and to take appropriate action to detect, deter and intercept terrorist attacks. A visual monitor of the entire system-a map with dynamic status indicators for each entity connected to the Trap Wire network- facilitates the ability of decision makers to absorb vast quantities of information quickly and efficiently. The dynamic status indicators show the threat level at each facility and highlight those that have moved to a higher threat level over the preceding 24 hours. Security officials can thus focus on the highest priorities first, taking a proactive and collaborative approach to defense against attacks. The information collected by Trap Wire can also be shared with law enforcement agencies to assist in their counterterrorism efforts.The basic premise behind the TrapWire system is as follows: Through the systematic reporting of suspicious events and the correlation of those events with other event reports for that facility and for related facilities across the network, terrorist surveillance operations can be identified, appropriate countermeasures can be employed to deter attacks, and steps can be taken to apprehend the perpetrators. The TrapWire system provides the following capabilities: A mechanism for a facility's personnel to record suspicious activity data in a structured format; A mechanism to identify and link related events following human review; The ability for a facility's Chief Security Officer (CSO) to identify threat trends at his/her facility (increasing or decreasing) and to drill down into the specific event reports that generated those threats; Alerts to the CSO of events that do not affect the threat score but may nevertheless be of interest; The ability to notify a facility of a changing threat level within its industry or geographical location; A mechanism to correlate external events such as watch list events for suspected terrorists or stolen vehicles with other observed event data already within the system; The ability to correlate events occurring at different facilities by related individuals, and to notify all affected facilities of the increased threat to their facility based on this related activity; A mechanism to reduce the system-calculated threat level at a facility, based upon the time since the last threatening event; and Notifications, alerts, and possible action recommendations based on a particular site's security plan, implemented via a set of rules that act upon event information.For more see http://www.trapwire.com/trapwire.htmlC. Current Abraxas and Trapwire management1. TrapwireDan Botsch is one of the founders of the project. He was with the CIA for more than a decade, working on Russian and Eastern European affairs. Michael Maness is Trapwire's business development director. He was with the CIA for two decades, working on counterterrorism and security operations in the Middle-East, the Balkans and Europe. Michael K. Chang, is TrapWire's director of operations. He was with the CIA for around 12 years, also on counterterrorism and a close friend of Helms.2. Abraxas CorporationRodney G. Smith, President Smith leads the sales and business development activities of Abraxas. Drawing on a distinguished career leading highly specialized organizations to remarkable success, Smith has for more than four years brought that same success and mission focus to Abraxas where he drives revenue and earnings opportunities across each of the Abraxas products and services. A former local and federal prosecutor and criminal justice policy advisor during the Reagan Administration, Smith capped a remarkable career in the National Security community where he last led two operational divisions. Smith holds a Bachelor's degree cum laude from Dartmouth College and a Juris Doctor from Boston University. He is a combat veteran of the United States Marine Corps.Katherine M. Green, Senior Vice President Green brings more than 27 years of operational and leadership experience in the National Security community to Abraxas Corporation. Her experience ranges from niche operational efforts to service as the Executive Director for one of the National Security community's largest issue-based Centers. With extensive experience in operations and resource management, Green brings in-depth understanding of how to effectively leverage and mesh the two disciplines. Green holds a Bachelor of Arts degree from Oklahoma State University in Stillwater.Basil "Bill" Trikas, Vice President Technical Services Trikas has 34 years intelligence community experience and knowledge of technical systems, operational tradecraft, deployment methodologies, and integrated learning solutions. He brings to Abraxas extensive experience leading technical, operational, and analytical organizations in support of the global intelligence community. Trikas served in critical roles shaping the strategic intelligence workforce directing recruiting and diversity outreach, learning and employee development, leadership development, language training, and historical studies. Trikas holds a degree in Electronic Engineering Technology. He is also a graduate of the Intelligence Community Senior Leadership Program, the Intelligence Community Senior Intelligence Fellows Program, and the Harvard Senior Managers in Government program.Matthew Broderick, Vice President Defense and Homeland Security Broderick brings extensive operational and leadership experience to Abraxas leveraging three years as the DHS Director of Operations, a career in the US Marine Corps at every level of troop command, earning the rank of Brigadier General, and significant private sector experience responsible for 1100 employees generating in excess of $100M net sales and marketing revenue. Mr. Broderick is a graduate of Marine Corps Amphibious Warfare School, the Armed Forces Staff College, the Naval War College and Worcester State College.John Etgen, Vice President Maryland Operations Etgen has over 25 years of national security service in the industry, government, and the military. He is an accomplished leader in business execution and astutely skilled in strategic planning, opportunity identification, capture management, and program execution. Prior to joining Abraxas Corporation, Etgen was a Department Manager at Applied Signal Technology and Director for Business Development for the Titan Corporation. Prior to entering private industry, Mr. Etgen served in a number of technical and management positions at the National Security Agency. Etgen began his career in 1982 enlisting in the United States Air Force as a Morse Systems technician and proudly serving until 1989. He has a Bachelors of Science degree from University Maryland and is a certified Program Manager.Barry McManus, Vice President Training and Education McManus served 26 years in the intelligence community as a leading expert in deception detection, behavioral assessment, interviewing, and interrogations. He served for more than 10 years as a CIA Chief Polygraph examiner and interrogator, working against terrorists, hostile intelligence services, and other high threat targets. He has conducted extensive research on the uses of the polygraph and developed sophisticated interview and interrogation techniques. McManus has developed and implemented training programs within the FBI, DHS, and the commercial financial arena in behavioral assessment, interviewing and elicitation in diverse cultures for law enforcement and intelligence organizations to include computer web-based training. McManus earned a BA in Sociology at Loyola University, Baltimore, MD; an MA in Organizational and Security Management at Webster University, St. Louis, MO; and will complete his Doctorate of Arts in Higher Education from George Mason University in Fairfax, VA in spring 2011. McManus was also recognized as an Oxford scholar and attended the prestigious Christ Church College at Oxford University.John F. Weiland, Director Abraxas Engineering John Weiland is a leading designer of Applications Specific Integrated Circuits (ASICs), joining Abraxas from Intrinsix Federal Systems and previously Westinghouse Electric Corporation. Weiland is a recognized leader on ASIC design tools and methodologies and has spent his career designing cutting edge chips and assemblies. A Westinghouse Lamme Scholarship recipient, Weiland pursued advanced studies in project management and artificial intelligence at the MIT Center for Advanced Engineering Studies before directing his skills to design of trusted solutions for the National Security community. Weiland holds a Bachelor of Science in Engineering and a BA in Mathematics from Swarthmore College, a MS in Electrical Engineering from the University of Maryland.See also: http://publicintelligence.net/unravelling-trapwire/ [URL="http://storify.com/bendoernberg/test-post"]http://storify.com/bendoernberg/test-post https://darkernet.wordpress.com/2012/08/11/abraxas-and-trapwire-the-technology-and-personnel-revealed/[/URL] Abraxas and Trapwire: the technology and personnel revealed - Magda Hassan - 12-08-2012 BREAKING NEWS PEOPLE - apparent #trapwire gov coverup in realtime!! it looks like the government is scrubbing Suspicious Activity Report related GOV sites and dumping their DNS entries. However the boxes are STILL ONLINE, if you use /etc/hosts on osx/unix you can STILL get in and mirror the files. i got 40MB+ off one site and 100+MB off the other. IIR.com is a very sketchy org, one of these quasi governmental orgs that sets up tracking systems in the US. you can still get it with adding /etc/hosts entries: 199.44.41.191 nsi.ncirc.gov 199.44.41.59 ncirc.gov on UNIX wget -m --tries=5 "http://ncirc.gov" and wget -m --tries=5 "http://nsi.ncirc.gov" archived NOW BITCHEZ ***** LETS HAS THE ARCHIVES I GOT with WGET. these are not necessarily the full files on these webservers but they are everything which the WGET mirroring spider could grab. MD5 (ncirc.gov.zip) = d94b716f9b62c9bf5c65ca92bb566e86 FILE http://hongpong.com/files/ncirc/ncirc.gov.zip 85.7MB MD5 (nsi.ncirc.gov.zip) = 0b23e1bb048cce2a499f5ec9476b30c5 FILE http://hongpong.com/files/ncirc/nsi.ncirc.gov.zip 34.3MB DNS INFO SEE http://dnshistory.org/browsedomains/ncirc.gov. DNS History - Domain Browser FOR more infos on the TRAPWIRE program situation - >>Domain: ncirc.gov. (view subdomains / view in browser) Added: 2009-12-29 Last Checked: 2010-10-16 PageRank: 6 What links here by: CNAME / NS / MX / PTR View all domains starting with ncirc.*. SOA - (history) 2010-10-16 -> 2010-10-16 MName: MRFGTM.iir.com RName: hostmaster.iir.com Serial: 18 Refresh: 10800 Retry: 3600 Expire: 604800 Minimum TTL: 60 NS - (history) 2010-05-16 -> 2010-10-16: talgtm.iir.com. 2010-05-16 -> 2010-10-16: mrfgtm.iir.com. MX - (history) 2010-05-16 -> 2010-10-16: 10 -> janus.iir.com. Unravelling TrapWire: The CIA-Connected Global Suspicious Activity Surveillance System | Public Intelligence Abraxas and Trapwire: the technology and personnel revealed « Darker Net http://hongpong.com/archives/2012/08/12/breaking-feds-iircom-apparently-scrubbing-trapwire-related-websites-down-dns-not Abraxas and Trapwire: the technology and personnel revealed - Magda Hassan - 15-08-2012 TrapWire and Stratfor are business partners documentary evidencePOSTED BY DARKERNET ⋅ AUGUST 15, 2012 ⋅ LEAVE A COMMENTFILED UNDER ABRAXAS, CUBIC, TRAPWIRE Stratfor, the private Intelligence-gathering company whose emails were hacked by Anonymous then published by Wikileaks, didn't just comment on TrapWire via its emails: in August 2009 it joined with the TrapWire project via a partnership deal with Abraxas Applications. And here is thedocument to prove it. The deal explicitly states that Stratfor will supply intelligence directly into TrapWire on an ongoing basis. To see detailed analyses of Stratfor's business relationship with TrapWire (and the consequent conflict of interest) clickhere and here.So there you have it. Another piece in the jigsaw. This story gets bigger and bigger…In Australia, Greens Senator, Scott Ludlam, tried to ask a question in the Senate about whether TrapWire was deployed in Australia. He was not allowed to (the Senate voted not to answer questions on this matter). Senator Ludlam's office later issued a statement explaining that the Senator will be pursuing the matter via other channels of inquiry.Also, a representative of Cubic Corporation has posted a comment on the Darker Net article, saying "SAN DIEGO, Calif. August 13, 2012 Cubic Corporation (NYSE: CUB) acquired Abraxas Corporation on December 20, 2010. Abraxas Corporation then and now has no affiliation with Abraxas Applications now known as TrapWire, Inc."Some background explanation is needed…Today, TrapWire software is owned by TrapWire Inc., a Reston, VA company. But it wasn't always. Abraxas Corporation created TrapWire under its subsidiary firm, Abraxas Applications Inc.. Abraxas Corporation trademarked the TrapWire software in a filing with the U.S. PTO in 2006. Abraxas Corporation is now owned by Cubic Corporation, which bought the firm in November 2010 for $124 million in cash. According to one report, Cubic acquired Abraxas Corporation after TrapWire was reorganised as a separate entity and that one of the terms of this acquisition was to "cause the corporate name of Abraxas Applications, Inc. to be changed to a name that does not include Abraxas' or any variation thereof." Also, according to a March 2007 article in the Washington Business Journal "Abraxas Corp., a risk-mitigation technology company, has spun out a software business to focus on selling a new product. The spinoff called Abraxas Applications will sell TrapWire, which predicts attacks on critical infrastructure by analyzing security reports and video surveillance". And the article continues: "Abraxas Corp. previously won contracts to test TrapWire…"Further insight is provided by Public Intelligence (renowned for its accuracy): "A proprietary white paper produced by TrapWire, formerly called Abraxas Applications, describes the product as "a unique, predictive software system designed to detect patterns of pre-attack surveillance." In an interview from 2005 with the Northern Virginia Technology Council, the CEO of Abraxas Corporation, Richard "Hollis" Helms, says the goal of TrapWire is to "collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists… The new company [Abraxas Applications] also can tap into Abraxas' [Corporation] work with defense and intelligence agencies and the connections of Abraxas founder and CEO Richard Hollis Helms, who owns both companies."So can Cubic Corporation legitimately claim not to own Abraxas Applications (which runs TrapWire)? If we go strictly by purchase dates, yes though it's common practice for a company, when acquiring another, to relinquish one part that might cause embarrassment so that on paper at least there is no longer any connection, even though some of the personnel between those companies are swapped around.Also, we should not lose sight of the range of services Cubic Corporation does admit to these are mostly defence systems and military training as well as transport smart systems and even interests in credit card management. A bizarre mix that in itself should be of concern. For example, Cubic is listed as the organisational leader for Ntrepid, a shadowy organisation that "provides national security and law enforcement customers with software, hardware, and managed services for cyber operations, analytics, linguistics, tagging and [online] tracking". Ntrepid's corporate registry in turn lists Abraxas' previous CEO and founder, Richard Helms, as a director and officer, along with Wesley Husted, the former CFO. Moreover, some of the top people at Anonymizer, who later moved to Abraxas, initially left Cubic to start another intelligence firm but are now listed as organisational leaders for Ntrepid. All very circular, to say the least…Posted from the darker net via Android.https://darkernet.wordpress.com/2012/08/15/trapwire-and-stratfor-are-business-partners-documentary-evidence/ Abraxas and Trapwire: the technology and personnel revealed - Magda Hassan - 15-08-2012 Breaking: Trapwire surveillance linked to Anonymizer and transport smart cards POSTED BY DARKERNET ⋅ AUGUST 14, 2012 ⋅ 10 COMMENTS Anonymizer, the company that brings you free anonymous email facilities, called nyms, as well as similar secure services used by activists all over the world, is actually owned by Cubic Corporations, the parent company that owns Abraxis, which in turn owns Trapwire. So, it's possible, if not probable that all those activists around the world who believe their emails are safe may well be sending messages that go straight into Trapwire, the surveillance system that monitors activists. This could be lifted straight out of a political conspiracy movie but it isn't. Furthermore, Cubic Corporation runs transport smart cards around the world, including USA, Australia and London (Oyster card): a link with Trapwire too?The above info has actually been available for some time, but it is only thanks to the information about Trapwire and Abraxas, hacked from Stratfor files by Anonymous and published by Wikileaks, that the full picture is starting to emerge.1. AnonymizerRe. Anonymizer, this was acquired by Abraxas in 2008. Two years later, Cubic acquired Abraxas for $124 million in cash. Cubic internal communications explain that the RFI for Cubic's persona software' was actually written for Anonymizer. Quote from Richard "Hollis" Helms (former CIA and then founder of Abraxas): "I am also pleased to announce that Lance Cottrell, the Founder and Chief Technology Officer of Anonymizer, will become our Chief Scientist and continue to pursue his advocacy of privacy for people around the world. Bill Unrue, Anonymizer's CEO, will assume the position of President of Anonymizer which will operate as a wholly owned subsidiary of Abraxas Corporation. Bill will continue to pursue Anonymizer's goals to provide proprietary technologies and complementary capabilities that offer unique, multi-layered identity protection that enhances the traditional network perimeter defenses of consumers, corporations and government agencies."2. Transportation smart cardsA. Australia: In 2010 Cubic Corporation signed a $370 million contract with the NSW Government to provide Sydney's electronic ticketing system for public transport. It was also awarded a $65 million contract to provide services to NSW's CityRail. It also runs the Brisbane "go card" system. It operates in Australia as Cubic Transportation with offices in Sydney, Brisbane and Perth. In 2008 it also opened a defence subsidiary based in Queensland, Cubic Defence Australia, run by Mark Horn.B. UK Cubic designed, developed and installed the Oyster Card system for London's Underground and buses.C. Other In 1972, Cubic acquired the first Automatic Fare Collection (AFC) system for Chicago's Illinois Central Gulf Railroad. By the late 1970s, Cubic had installed AFC systems for the Hong Kong Mass Transit Railway Corporation and the Eastern Suburbs Railway in Sydney. Soon came the Bay Area Rapid Transit (BART) system in San Francisco, the Washington Metropolitan Area Transit Authority and the Pennsylvania Port Authority Transit Company AFC system.Cubic Corporations offices: WASHINGTON, D.C. Crystal Gateway One, Suite 1102 1235 Jefferson Davis Hwy. Arlington, VA 22202 703-415-1600 703-415-1608 Fax ORLANDO, FL 12000 Research Parkway Suite 408 Orlando, FL 32826 407-273-5500 407-275-0200 Fax SHALIMAR, FL 60 Second St., Suite 105 Shalimar, FL 32579 850-609-1600 850-609-0100 Fax LONDON Derwent House Kendal Avenue Park Royal London W3 OXA UKCubic Corporation Board of Directors: Walter J. Zable: Chairman; Walter C. Zable: Vice- Chairman; Robert D. Weaver: Director; Robert S. Sullivan: Director; Richard Atkinson: Director; Raymond E. Peet: Director; Robert T. Monagan: Director; Raymond L. DeKozan: Director; Gerald R. Dinkel: Vice-Presiden;t Mark A. Harrison: Vice-President; Daniel A. Jacobsen: Vice-President; Kenneth Kopf: Vice-President; Bernard A. Kulchin: Vice-President; John A. Minteer: Vice-President; John D. Thomas: Vice-President; Richard A. Johnson: Corporate Executive; William L. Hoese: Secretary; William W. Boyle: Chief Financial Officer.Cubic Corporation IP addresses (via Anonymous):208.86.144.37 ca.trapwire.net 208.86.144.37 access.trapwire.net 208.86.144.37 demo.trapwire.net 208.86.145.176 cert.trapwire.net 208.86.144.37 lv.trapwire.net 208.86.144.40 smtp.trapwire.net 208.86.144.37 training.trapwire.net 208.86.144.37 west.trapwire.net 208.86.144.37 http://www.trapwire.netSee also: http://wiki.echelon2.org/wiki/Cubic_Corporation http://www.dailymail.co.uk/news/article-2187602/U-S-Government-secretly-spying-using-civilian-security-cameras-say-Wikileaks.html?ito=feeds-newsxml http://darkernet.wordpress.com/2012/08/11/abraxas-and-trapwire-the-technology-and-personnel-revealed/ http://www.theage.com.au/technology/technology-news/revealed-trapwire-spy-cams-ticket-to-australia-20120813-2448z.htmlPosted from the darker net via Android. https://darkernet.wordpress.com/2012/08/14/breaking-trapwire-surveillance-linked-to-anonymizer-and-transport-smart-cards/ Share this:
Abraxas and Trapwire: the technology and personnel revealed - Magda Hassan - 21-08-2012 Examine and Measure Influence in Relationships Tartan is agent-based, influence modeling software that aids in the visualization and quantification of relationships within social networks. While other Social Network Analysis (SNA) tools emphasize the obvious connections through simple link analysis, Tartan takes a different approach using mathematical algorithms to discover "hidden" networks, quantify influence, and identify lessvisible group dynamics. Analyze and Identify: Ranks of influence within human networks Key voices within populations Interlocutors, messengers, and others with key access Hidden or missing relationships The use of aliases Emerging leaders and new key influencers Applications: National Security: deconstruct illicit organizations, identify powerful influencers, and uncover hidden networks Federal Law Enforcement: investigate and infiltrate drug cartels and gangs Politics: analyze voting influence and power cells Business: analyze and predict the outcome of M&A or executive successions Tartan removes the bias inherent in most SNA software applications by using data-driven quantification techniques, rather than subjective relationship qualifiers, to: Identify key decision-makers using deference modeling techniques Expose hidden connections between individuals Predict the re-configuration of networks when individuals are removed from the model Identify coalitions and rivalries How It Works Import your research. Multi-browser Tartan Bookmarklet sends web pages directly to Tartan for processing. Tartan's built-in text extractor automatically identifies and pulls out relevant data from documents, including named individuals and geographic locations. Point and click to define relationship characteristics, including deference, meeting frequency, strength, kinship, and more. Tartan's proprietary analysis engine generates an interactive, visual model that illustrates relationship dynamics. Algorithms quantify attributes of each agent, such as degree of centrality and influence, and highlight hidden networks. Simulate and analyze the reconfiguration of networks when specific agents are removed. http://tartanmetrics.com/images/Tartan_2.0_Data_Sheet.pdf |