Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Abraxas and Trapwire: the technology and personnel revealed
#1
link: http://storify.com/bendoernberg/test-post
TrapWire: "See Something, Say Something"...To The CIA?

New Stratfor emails released by WikiLeaks indicate that TrapWire, a defense contractor owned and operated by ex-CIA operatives, sits at the heart of American intelligence. Everything from incidents on military base to calls to NYC's "See Something, Say Something" are routed through TrapWire.
  • [Image: sub_img_top_1.jpg][Image: www.trapwire.com]
    Trapwire
    [URL="http://stats.storify.com/record/click?sid=5023f9c9613d98f955003eab&redirect=http://www.trapwire.com/images/sub_img_top_1.jpg"]11 hours ago
    [/URL]





  • I. The Bottom Line
    II. Introduction
    III. What Does TrapWire Do?
    IV. Who Uses TrapWire?
    V. Who/What Is
    TrapWire?
    VI. Stratfor and TrapWire's Troubling Revolving Doors
  • [B]UPDATE: Some WikiLeaks documents offline as of 8:30am, reportedly as a result of ongoing denial of service attacks.[/B]

  • [Image: 4cd7a702-1b01-4f1f-beee-09d7db0cd6fa_normal.png]
    Yes, WikiLeaks revealed a whole bunch of documents on #Trapwire, no, you can't read them easily, because of the current DDOS attack.

    [URL="http://twitter.com/"]
    [/URL]
    WikiLeaks
    [URL="http://stats.storify.com/record/click?sid=5023f9c9613d98f955003eab&redirect=http://twitter.com/wikileaks/status/233844463955480577"]6 hours ago
    [/URL]

    ReplyRetweet


  • ----------------------------------------------------------------------------------------------------------------
  • [B]I. The Bottom Line[/B]

  • According to new Stratfor emails released by WikiLeaks:

  • Reports submitted to "See Something, Say Something" in NYC and Las Vegas and "iWatch" in DC and LA are collected and processed by a private company (TrapWire) run by ex-CIA operatives.
  • TrapWire collects and cross-references surveillance reports from around the world, including: from the LAPD, DC Police, US Marine Corps, Las Vegas Police Department, and Scotland Yard.
  • TrapWire threat detection software is integrated with surveillance cameras at locations around the world, including 500 deployments in the NYC subway system and at the London Stock Exchange.
  • [B]II. Introduction[/B]

  • According to internal emails from global intelligence firm Stratfor obtained and newly released by WikiLeaks, TrapWire's surveillance analysis system seems to be near the center of the intelligence world. "Designed to provide a simple yet powerful means of collecting and recording suspicious activity reports," it collects information from and shares information with local police departments, the Department of Homeland Security, the FBI, and in some cases private businesses such as Las Vegas casinos.
  • TrapWire, run by ex-CIA operatives, is a software program that seeks to prevent terrorist attacks by recognizing patterns in activity. The hope, according to Stratfor Vice President of Intelligence Fred Burton, is that, "a suspect conducting surveillance of the NYC subway can also be spotted by TrapWire conducting similar activity at the DC subway." There are at least 500 TrapWire-connected surveillance cameras in the New York subway system, according tothis blog post by Mr. Burton.
  • It's in place at the White House and the London Stock Exchange. If you "see something, say something" in a New York subway, your "suspicious activity report" (SAR) goes through TrapWire. TrapWire is used by the DC Police, the LAPD, and the Las Vegas Police Department. It's in place at Fort Meade, and at over 60 Las Vegas casinos.
  • Suspicious activity reports (SAR's) generated by TrapWire systems are distributed to local law enforcement agencies, local partner corporations (in some circumstances), and to the local Department of Homeland Security (DHS) fusion center, as well as to a national database used by DHS fusion centers nationwide as well as the FBI.
  • According to a leaked email from TrapWire's Director of Business Development, all of the information provided by its corporate, national, and international clients "feed a centralized database", and TrapWire attempts to make connections between events in different locations. This means that while TrapWire's clients only have access to relevant and nearby reports, the company has access to everything submitted by its partner law enforcement entities and reported by citizens.
  • TrapWire's goal: when a casino camera spots something suspicious, or a Las Vegas resident 'sees something' and 'says something', that information is quickly in the hands of nearby resorts, the Las Vegas Police Department, DHS, and the FBI. The TrapWire company itself also has access to all suspicious activity reports, whether they come from a New York City citizen's phone call or directly from the White House.
  • In a 2007 white paper, TrapWire says, "it does not capture, store, or share any sensitive or personally identifiable information." It is unclear how TrapWire defines sensitive information, as the company is unquestionably in control of an enormous amount of valuable intelligence data from around the world. Given the extraordinarily close ties between the company, its employees, and the CIA, concerns about civil liberties implications of TrapWire's system and access seem well warranted.
  • [B]III. What Does TrapWire Do?[/B]

  • TrapWire has three distinct components:

    1. TrapWire Critical Infrastructure is installed at sensitive locations, such as the White House and the London Stock Exchange, to analyze security footage to "detect patterns of behavior indicative of pre-operational planning." The software integrates with surveillance cameras "to capture photographs or video evidence of suspicious activity."

    2. TrapWire Community Member operates New York's and Las Vegas' "See Something Say Something" campaigns, as well as the iWatch citizen reporting programs in DC and Los Angeles (promotional video below). Information obtained from citizen reports is compared to reports from other cities and analyzed, then forwarded to law enforcement and the local DHS fusion center.

  • Mayor iwatchla (English) PSA
    [URL="http://youtube.com/"]
    [/URL]
    lapdonline1
    [URL="http://stats.storify.com/record/click?sid=5023f9c9613d98f955003eab&redirect=http://www.youtube.com/watch?v=C7RPunf-JDY"]2 years ago
    [/URL]





  • 3. TrapWire Law Enforcement provides coordination and information sharing for law enforcement agencies, including the sharing of information obtained through TrapWire's other two services. For instance, according to Emergency Management Magazine, in Las Vegas TrapWire operates "a citywide database linking surveillance systems of most resorts and the fusion center
  • When a suspicious activity report (SAR) is made by a TrapWire system, for instance when a security camera spots something or a citizen makes a report on iWatch.dc.gov, that information is meant to spread quickly. According to congressional testimony (below, p. 5) from DCPD chief Cathy Lanier, a DC TrapWire SAR is automatically forwarded to Washington's local Department of Homeland Security (DHS) fusion center, where it is analyzed. When DHS analysts verify that incidents "meet the established standards for suspicious activity reporting," they are added to a network accessible to all DHS fusion centers nationwide, and "are forwarded to the FBI's eGaurdian system."

  • undefined
    [Image: www.hsgac.senate.gov]
    Senate


  • [B]IV. Who Uses TrapWire?[/B]

Read next page
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply
#2

Abraxas and Trapwire: the technology and personnel revealed

POSTED BY ANONYMOUS â‹… AUGUST 11, 2012 â‹… 3 COMMENTS
FILED UNDER ABRAXAS, ASSANGE, TRAPWIRE
[Image: wpid-abraxastrapwiretrademark.png?w=750]
TrapWire is a secret global surveillance system, founded in 2004 and run by ex-CIA chiefs, with clients all over the world. It's significance is that it is being used for all sorts of surveillance, including everyday protests. The existence of TrapWire was only made known a few days ago, thanks to documents published by Wikileaks (and hacking of Stratfor docs by Anonymous). It is now believed that the recent cyber attacks on the Wikileaks sites were in retaliation for the exposure of Trapwire, which is both a product and a company (a subsidiary of the Abraxas Corporation). Here, Darker Net provides a) an introduction to the TrapWire technology, b) details of how that technology works and c) the people who run TrapWire AND Abraxas. Oh, and then there's the mysterious green and blue badgers (!!!) see below…
For hackers, here is the TrapWire operating console.A. IntroductionAccording to Richard Helms, the notorious ex-CIA Director and founder of Abraxas in 2001, TrapWire was designed to share threat information and establish patterns of data that could be used to predict attacks. "It can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists," he said. "The application can do things like type' individuals so if people say medium build,' you know exactly what that means from that observer."A leaked email from Fred Burton, Stratfor's vice president for intelligence, states that the TrapWire network is now covering most North American and British high-value targets (HVT.) "I knew these hacks when they were GS-12′s at the CIA. God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients," he wrote."….tell me that more than 50 percent of the National Clandestine Service (NCS) the heart, brains and soul of the CIA has been outsourced to private firms such as Abraxas , Booz Allen Hamilton, Lockheed Martin and Raytheon. "These firms recruit spies, create non-official cover identities and control the movements of CIA case officers. They also provide case officers and watch officers at crisis centers and regional desk officers who control clandestine operations worldwide. As the Los Angeles Times first reported, more than half the workforce in two key CIA stations in the fight against terrorism Baghdad and Islamabad, Pakistan is made up of industrial contractors, or green badgers,' in CIA parlance. "Intelligence insiders say that entire branches of the NCS have been outsourced to private industry. These branches are still managed by U.S. government employees (blue badgers') who are accountable to the agency's chain of command. But beneath them, insiders say, is a supervisory structure that's controlled entirely by contractors; in some cases, green badgers are managing green badgers from other corporations." R.J. Hillhouse, July 8, 2007, Washington Post.TrapWire is also linked to the National Suspicious Activity Reporting (NSI) Initiative, a program designed to help aggregate reports of suspicious activity around the USA. One email from TrapWire states "TrapWire SAR reports are fed directly/automatically into the National SAR Initiative" as well as "the FBI's eGuardian system if/when there's confirmed nexus to terrorism or major crimes (which is happening frequently)." The email goes on "our networks in LA, Vegas and DC all support See Something Say Something (S4 as I call it)." Further, Over the past few years, several cities around the U.S. have implemented websites allowing the public to report suspicious activity, including Washington D.C., Houston and even the U.S. Army. These activities are part of a larger program called iWatch, which also feeds into TrapWire according to a leaked email.A copy of the TrapWire brochure can be downloaded here. A white paper on TrapWire can be downloaded here.B. The TrapWire technologyThe prevention of terrorist attacks on critical infrastructure requires the ability to detect various discreet but identifiable indicators of pre-attack preparations. Only by uncovering such attack preparations can we take actions designed to deter or intercept a terrorist strike before it begins. While international terrorist organizations are using increasingly sophisticated methods, their modus operandi does contain a critical vulnerability: meticulous pre-attack preparations require the terrorists to approach a target facility on multiple occasions to identify physical and procedural vulnerabilities, probe for weaknesses and conduct practice missions. For example, the terrorists planning the Khobar Towers attack in Saudi Arabia reportedly surveilled the facility on 40 occasions. Terrorists will typically surveil multiple facilities prior to selecting an appropriately vulnerable target. Therefore, as the number of facilities on the Trap Wire network increases, so does the probability of detecting pre-attack preparations. Trap Wire is specifically designed to exploit this vulnerability by combining deep counterterrorism experience, proven counter-surveillance techniques, unique sensor systems, and data mining capabilities to detect attack preparations and allow security personnel to deter or intercept terrorist operations.TrapWire dramatically increases the ability to detect pre-attack preparations and to take appropriate action to detect, deter and intercept terrorist attacks. A visual monitor of the entire system-a map with dynamic status indicators for each entity connected to the Trap Wire network- facilitates the ability of decision makers to absorb vast quantities of information quickly and efficiently. The dynamic status indicators show the threat level at each facility and highlight those that have moved to a higher threat level over the preceding 24 hours. Security officials can thus focus on the highest priorities first, taking a proactive and collaborative approach to defense against attacks. The information collected by Trap Wire can also be shared with law enforcement agencies to assist in their counterterrorism efforts.The basic premise behind the TrapWire system is as follows: Through the systematic reporting of suspicious events and the correlation of those events with other event reports for that facility and for related facilities across the network, terrorist surveillance operations can be identified, appropriate countermeasures can be employed to deter attacks, and steps can be taken to apprehend the perpetrators. The TrapWire system provides the following capabilities: A mechanism for a facility's personnel to record suspicious activity data in a structured format;
A mechanism to identify and link related events following human review;
The ability for a facility's Chief Security Officer (CSO) to identify threat trends at his/her facility (increasing or decreasing) and to drill down into the specific event reports that generated those threats;
Alerts to the CSO of events that do not affect the threat score but may nevertheless be of interest;
The ability to notify a facility of a changing threat level within its industry or geographical location;
A mechanism to correlate external events such as watch list events for suspected terrorists or stolen vehicles with other observed event data already within the system;
The ability to correlate events occurring at different facilities by related individuals, and to notify all affected facilities of the increased threat to their facility based on this related activity;
A mechanism to reduce the system-calculated threat level at a facility, based upon the time since the last threatening event; and
Notifications, alerts, and possible action recommendations based on a particular site's security plan, implemented via a set of rules that act upon event information.
For more see http://www.trapwire.com/trapwire.htmlC. Current Abraxas and Trapwire management1. TrapwireDan Botsch is one of the founders of the project. He was with the CIA for more than a decade, working on Russian and Eastern European affairs.
Michael Maness is Trapwire's business development director. He was with the CIA for two decades, working on counterterrorism and security operations in the Middle-East, the Balkans and Europe.
Michael K. Chang, is TrapWire's director of operations. He was with the CIA for around 12 years, also on counterterrorism and a close friend of Helms.
2. Abraxas CorporationRodney G. Smith, President
Smith leads the sales and business development activities of Abraxas. Drawing on a distinguished career leading highly specialized organizations to remarkable success, Smith has for more than four years brought that same success and mission focus to Abraxas where he drives revenue and earnings opportunities across each of the Abraxas products and services. A former local and federal prosecutor and criminal justice policy advisor during the Reagan Administration, Smith capped a remarkable career in the National Security community where he last led two operational divisions. Smith holds a Bachelor's degree cum laude from Dartmouth College and a Juris Doctor from Boston University. He is a combat veteran of the United States Marine Corps.
Katherine M. Green, Senior Vice President
Green brings more than 27 years of operational and leadership experience in the National Security community to Abraxas Corporation. Her experience ranges from niche operational efforts to service as the Executive Director for one of the National Security community's largest issue-based Centers. With extensive experience in operations and resource management, Green brings in-depth understanding of how to effectively leverage and mesh the two disciplines. Green holds a Bachelor of Arts degree from Oklahoma State University in Stillwater.
Basil "Bill" Trikas, Vice President Technical Services
Trikas has 34 years intelligence community experience and knowledge of technical systems, operational tradecraft, deployment methodologies, and integrated learning solutions. He brings to Abraxas extensive experience leading technical, operational, and analytical organizations in support of the global intelligence community. Trikas served in critical roles shaping the strategic intelligence workforce directing recruiting and diversity outreach, learning and employee development, leadership development, language training, and historical studies. Trikas holds a degree in Electronic Engineering Technology. He is also a graduate of the Intelligence Community Senior Leadership Program, the Intelligence Community Senior Intelligence Fellows Program, and the Harvard Senior Managers in Government program.
Matthew Broderick, Vice President Defense and Homeland Security
Broderick brings extensive operational and leadership experience to Abraxas leveraging three years as the DHS Director of Operations, a career in the US Marine Corps at every level of troop command, earning the rank of Brigadier General, and significant private sector experience responsible for 1100 employees generating in excess of $100M net sales and marketing revenue. Mr. Broderick is a graduate of Marine Corps Amphibious Warfare School, the Armed Forces Staff College, the Naval War College and Worcester State College.
John Etgen, Vice President Maryland Operations
Etgen has over 25 years of national security service in the industry, government, and the military. He is an accomplished leader in business execution and astutely skilled in strategic planning, opportunity identification, capture management, and program execution. Prior to joining Abraxas Corporation, Etgen was a Department Manager at Applied Signal Technology and Director for Business Development for the Titan Corporation. Prior to entering private industry, Mr. Etgen served in a number of technical and management positions at the National Security Agency. Etgen began his career in 1982 enlisting in the United States Air Force as a Morse Systems technician and proudly serving until 1989. He has a Bachelors of Science degree from University Maryland and is a certified Program Manager.
Barry McManus, Vice President Training and Education
McManus served 26 years in the intelligence community as a leading expert in deception detection, behavioral assessment, interviewing, and interrogations. He served for more than 10 years as a CIA Chief Polygraph examiner and interrogator, working against terrorists, hostile intelligence services, and other high threat targets. He has conducted extensive research on the uses of the polygraph and developed sophisticated interview and interrogation techniques. McManus has developed and implemented training programs within the FBI, DHS, and the commercial financial arena in behavioral assessment, interviewing and elicitation in diverse cultures for law enforcement and intelligence organizations to include computer web-based training. McManus earned a BA in Sociology at Loyola University, Baltimore, MD; an MA in Organizational and Security Management at Webster University, St. Louis, MO; and will complete his Doctorate of Arts in Higher Education from George Mason University in Fairfax, VA in spring 2011. McManus was also recognized as an Oxford scholar and attended the prestigious Christ Church College at Oxford University.
John F. Weiland, Director Abraxas Engineering
John Weiland is a leading designer of Applications Specific Integrated Circuits (ASICs), joining Abraxas from Intrinsix Federal Systems and previously Westinghouse Electric Corporation. Weiland is a recognized leader on ASIC design tools and methodologies and has spent his career designing cutting edge chips and assemblies. A Westinghouse Lamme Scholarship recipient, Weiland pursued advanced studies in project management and artificial intelligence at the MIT Center for Advanced Engineering Studies before directing his skills to design of trusted solutions for the National Security community. Weiland holds a Bachelor of Science in Engineering and a BA in Mathematics from Swarthmore College, a MS in Electrical Engineering from the University of Maryland.
See also:
http://publicintelligence.net/unravelling-trapwire/
[URL="http://storify.com/bendoernberg/test-post"]http://storify.com/bendoernberg/test-post
https://darkernet.wordpress.com/2012/08/...-revealed/[/URL]
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply
#3
BREAKING NEWS PEOPLE - apparent #trapwire gov coverup in realtime!! it looks like the government is scrubbing Suspicious Activity Report related GOV sites and dumping their DNS entries. However the boxes are STILL ONLINE, if you use /etc/hosts on osx/unix you can STILL get in and mirror the files. i got 40MB+ off one site and 100+MB off the other.
IIR.com is a very sketchy org, one of these quasi governmental orgs that sets up tracking systems in the US.
you can still get it with adding /etc/hosts entries:
199.44.41.191 nsi.ncirc.gov
199.44.41.59 ncirc.gov
on UNIX
wget -m --tries=5 "http://ncirc.gov"
and
wget -m --tries=5 "http://nsi.ncirc.gov"
archived NOW BITCHEZ
*****
LETS HAS THE ARCHIVES I GOT with WGET. these are not necessarily the full files on these webservers but they are everything which the WGET mirroring spider could grab.
MD5 (ncirc.gov.zip) = d94b716f9b62c9bf5c65ca92bb566e86
FILE http://hongpong.com/files/ncirc/ncirc.gov.zip 85.7MB
MD5 (nsi.ncirc.gov.zip) = 0b23e1bb048cce2a499f5ec9476b30c5
FILE http://hongpong.com/files/ncirc/nsi.ncirc.gov.zip 34.3MB
DNS INFO SEE http://dnshistory.org/browsedomains/ncirc.gov.
DNS History - Domain Browser
Domain: ncirc.gov. (view subdomains / view in browser)
Added: 2009-12-29 Last Checked: 2010-10-16
PageRank: 6
What links here by: CNAME / NS / MX / PTR
View all domains starting with ncirc.*.
SOA - (history)
2010-10-16 -> 2010-10-16
MName: MRFGTM.iir.com
RName: hostmaster.iir.com
Serial: 18
Refresh: 10800
Retry: 3600
Expire: 604800
Minimum TTL: 60
NS - (history)
2010-05-16 -> 2010-10-16: talgtm.iir.com.
2010-05-16 -> 2010-10-16: mrfgtm.iir.com.
MX - (history)
2010-05-16 -> 2010-10-16: 10 -> janus.iir.com.
FOR more infos on the TRAPWIRE program situation - >>
Unravelling TrapWire: The CIA-Connected Global Suspicious Activity Surveillance System | Public Intelligence
Abraxas and Trapwire: the technology and personnel revealed « Darker Net

http://hongpong.com/archives/2012/08/12/...wn-dns-not
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply
#4

TrapWire and Stratfor are business partners documentary evidence

POSTED BY DARKERNET â‹… AUGUST 15, 2012 â‹… LEAVE A COMMENT
FILED UNDER ABRAXAS, CUBIC, TRAPWIRE
[Image: wpid-istock000011792920small.jpg?w=750]Stratfor, the private Intelligence-gathering company whose emails were hacked by Anonymous then published by Wikileaks, didn't just comment on TrapWire via its emails: in August 2009 it joined with the TrapWire project via a partnership deal with Abraxas Applications. And here is thedocument to prove it. The deal explicitly states that Stratfor will supply intelligence directly into TrapWire on an ongoing basis. To see detailed analyses of Stratfor's business relationship with TrapWire (and the consequent conflict of interest) clickhere and here.So there you have it. Another piece in the jigsaw. This story gets bigger and bigger…In Australia, Greens Senator, Scott Ludlam, tried to ask a question in the Senate about whether TrapWire was deployed in Australia. He was not allowed to (the Senate voted not to answer questions on this matter). Senator Ludlam's office later issued a statement explaining that the Senator will be pursuing the matter via other channels of inquiry.Also, a representative of Cubic Corporation has posted a comment on the Darker Net article, saying "SAN DIEGO, Calif. August 13, 2012 Cubic Corporation (NYSE: CUB) acquired Abraxas Corporation on December 20, 2010. Abraxas Corporation then and now has no affiliation with Abraxas Applications now known as TrapWire, Inc."Some background explanation is needed…Today, TrapWire software is owned by TrapWire Inc., a Reston, VA company. But it wasn't always. Abraxas Corporation created TrapWire under its subsidiary firm, Abraxas Applications Inc.. Abraxas Corporation trademarked the TrapWire software in a filing with the U.S. PTO in 2006. Abraxas Corporation is now owned by Cubic Corporation, which bought the firm in November 2010 for $124 million in cash. According to one report, Cubic acquired Abraxas Corporation after TrapWire was reorganised as a separate entity and that one of the terms of this acquisition was to "cause the corporate name of Abraxas Applications, Inc. to be changed to a name that does not include Abraxas' or any variation thereof." Also, according to a March 2007 article in the Washington Business Journal "Abraxas Corp., a risk-mitigation technology company, has spun out a software business to focus on selling a new product. The spinoff called Abraxas Applications will sell TrapWire, which predicts attacks on critical infrastructure by analyzing security reports and video surveillance". And the article continues: "Abraxas Corp. previously won contracts to test TrapWire…"Further insight is provided by Public Intelligence (renowned for its accuracy): "A proprietary white paper produced by TrapWire, formerly called Abraxas Applications, describes the product as "a unique, predictive software system designed to detect patterns of pre-attack surveillance." In an interview from 2005 with the Northern Virginia Technology Council, the CEO of Abraxas Corporation, Richard "Hollis" Helms, says the goal of TrapWire is to "collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists… The new company [Abraxas Applications] also can tap into Abraxas' [Corporation] work with defense and intelligence agencies and the connections of Abraxas founder and CEO Richard Hollis Helms, who owns both companies."So can Cubic Corporation legitimately claim not to own Abraxas Applications (which runs TrapWire)? If we go strictly by purchase dates, yes though it's common practice for a company, when acquiring another, to relinquish one part that might cause embarrassment so that on paper at least there is no longer any connection, even though some of the personnel between those companies are swapped around.Also, we should not lose sight of the range of services Cubic Corporation does admit to these are mostly defence systems and military training as well as transport smart systems and even interests in credit card management. A bizarre mix that in itself should be of concern. For example, Cubic is listed as the organisational leader for Ntrepid, a shadowy organisation that "provides national security and law enforcement customers with software, hardware, and managed services for cyber operations, analytics, linguistics, tagging and [online] tracking". Ntrepid's corporate registry in turn lists Abraxas' previous CEO and founder, Richard Helms, as a director and officer, along with Wesley Husted, the former CFO. Moreover, some of the top people at Anonymizer, who later moved to Abraxas, initially left Cubic to start another intelligence firm but are now listed as organisational leaders for Ntrepid. All very circular, to say the least…Posted from the darker net via Android.https://darkernet.wordpress.com/2012/08/...-evidence/
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply
#5
Breaking: Trapwire surveillance linked to Anonymizer and transport smart cards
POSTED BY DARKERNET â‹… AUGUST 14, 2012 â‹… 10 COMMENTS
[Image: art-trapwire-620x349.jpg?w=300&h=168]Anonymizer, the company that brings you free anonymous email facilities, called nyms, as well as similar secure services used by activists all over the world, is actually owned by Cubic Corporations, the parent company that owns Abraxis, which in turn owns Trapwire. So, it's possible, if not probable that all those activists around the world who believe their emails are safe may well be sending messages that go straight into Trapwire, the surveillance system that monitors activists. This could be lifted straight out of a political conspiracy movie but it isn't. Furthermore, Cubic Corporation runs transport smart cards around the world, including USA, Australia and London (Oyster card): a link with Trapwire too?The above info has actually been available for some time, but it is only thanks to the information about Trapwire and Abraxas, hacked from Stratfor files by Anonymous and published by Wikileaks, that the full picture is starting to emerge.1. AnonymizerRe. Anonymizer, this was acquired by Abraxas in 2008. Two years later, Cubic acquired Abraxas for $124 million in cash. Cubic internal communications explain that the RFI for Cubic's persona software' was actually written for Anonymizer. Quote from Richard "Hollis" Helms (former CIA and then founder of Abraxas): "I am also pleased to announce that Lance Cottrell, the Founder and Chief Technology Officer of Anonymizer, will become our Chief Scientist and continue to pursue his advocacy of privacy for people around the world. Bill Unrue, Anonymizer's CEO, will assume the position of President of Anonymizer which will operate as a wholly owned subsidiary of Abraxas Corporation. Bill will continue to pursue Anonymizer's goals to provide proprietary technologies and complementary capabilities that offer unique, multi-layered identity protection that enhances the traditional network perimeter defenses of consumers, corporations and government agencies."2. Transportation smart cardsA. Australia:
In 2010 Cubic Corporation signed a $370 million contract with the NSW Government to provide Sydney's electronic ticketing system for public transport. It was also awarded a $65 million contract to provide services to NSW's CityRail. It also runs the Brisbane "go card" system. It operates in Australia as Cubic Transportation with offices in Sydney, Brisbane and Perth. In 2008 it also opened a defence subsidiary based in Queensland, Cubic Defence Australia, run by Mark Horn.
B. UK
Cubic designed, developed and installed the Oyster Card system for London's Underground and buses.
C. Other
In 1972, Cubic acquired the first Automatic Fare Collection (AFC) system for Chicago's Illinois Central Gulf Railroad. By the late 1970s, Cubic had installed AFC systems for the Hong Kong Mass Transit Railway Corporation and the Eastern Suburbs Railway in Sydney. Soon came the Bay Area Rapid Transit (BART) system in San Francisco, the Washington Metropolitan Area Transit Authority and the Pennsylvania Port Authority Transit Company AFC system.
Cubic Corporations offices:
WASHINGTON, D.C. Crystal Gateway One, Suite 1102 1235 Jefferson Davis Hwy. Arlington, VA 22202 703-415-1600 703-415-1608 Fax
ORLANDO, FL 12000 Research Parkway Suite 408 Orlando, FL 32826 407-273-5500 407-275-0200 Fax
SHALIMAR, FL 60 Second St., Suite 105 Shalimar, FL 32579 850-609-1600 850-609-0100 Fax
LONDON Derwent House Kendal Avenue Park Royal London W3 OXA UK
Cubic Corporation Board of Directors:
Walter J. Zable: Chairman; Walter C. Zable: Vice- Chairman; Robert D. Weaver: Director; Robert S. Sullivan: Director; Richard Atkinson: Director; Raymond E. Peet: Director; Robert T. Monagan: Director; Raymond L. DeKozan: Director; Gerald R. Dinkel: Vice-Presiden;t Mark A. Harrison: Vice-President; Daniel A. Jacobsen: Vice-President; Kenneth Kopf: Vice-President; Bernard A. Kulchin: Vice-President; John A. Minteer: Vice-President; John D. Thomas: Vice-President; Richard A. Johnson: Corporate Executive; William L. Hoese: Secretary; William W. Boyle: Chief Financial Officer.
Cubic Corporation IP addresses (via Anonymous):208.86.144.37 ca.trapwire.net
208.86.144.37 access.trapwire.net
208.86.144.37 demo.trapwire.net
208.86.145.176 cert.trapwire.net
208.86.144.37 lv.trapwire.net
208.86.144.40 smtp.trapwire.net
208.86.144.37 training.trapwire.net
208.86.144.37 west.trapwire.net
208.86.144.37 http://www.trapwire.net
See also:
http://wiki.echelon2.org/wiki/Cubic_Corporation
http://www.dailymail.co.uk/news/article-...ds-newsxml
http://darkernet.wordpress.com/2012/08/1...-revealed/
http://www.theage.com.au/technology/tech...2448z.html
Posted from the darker net via Android.
https://darkernet.wordpress.com/2012/08/...art-cards/

Share this:

  • [url=http://darkernet.wordpress.com/2012/08/14/breaking-trapwire-surveillance-linked-to-anonymizer-and-transport-smart-cards/?share=twitter&nb=1][/url]




"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply
#6
Examine and Measure Influence in Relationships
Tartan is agent-based, influence modeling software that aids in
the visualization and quantification of relationships within social
networks. While other Social Network Analysis (SNA) tools
emphasize the obvious connections through simple link analysis,
Tartan takes a different approach using mathematical algorithms to
discover "hidden" networks, quantify influence, and identify lessvisible group dynamics.
Analyze and Identify:
Ranks of influence within human
networks
Key voices within populations
Interlocutors, messengers, and others
with key access
Hidden or missing relationships
The use of aliases
Emerging leaders and new key
influencers
Applications:
National Security: deconstruct illicit
organizations, identify powerful
influencers, and uncover hidden
networks
Federal Law Enforcement:
investigate and infiltrate drug cartels
and gangs
Politics: analyze voting influence and
power cells
Business: analyze and predict the
outcome of M&A or executive
successions


Tartan removes the bias inherent in most SNA software applications
by using data-driven quantification techniques, rather than
subjective relationship qualifiers, to:
Identify key decision-makers using deference modeling
techniques
Expose hidden connections between individuals
Predict the re-configuration of networks when individuals are
removed from the model
Identify coalitions and rivalries

How It Works
Import your research. Multi-browser Tartan
Bookmarklet sends web pages directly to Tartan for
processing.
Tartan's built-in text extractor automatically identifies
and pulls out relevant data from documents, including
named individuals and geographic locations.
Point and click to define relationship
characteristics, including deference, meeting
frequency, strength, kinship, and more.
Tartan's proprietary analysis engine generates an
interactive, visual model that illustrates relationship
dynamics.
Algorithms quantify attributes of each agent, such
as degree of centrality and influence, and highlight
hidden networks.
Simulate and analyze the reconfiguration of
networks when specific agents are removed.


http://tartanmetrics.com/images/Tartan_2..._Sheet.pdf
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  List of Technology Critics Matt Grantham 4 31,324 12-08-2019, 01:18 PM
Last Post: Anton Alfredo
  The Voice of God Technology Lauren Johnson 0 6,323 19-02-2018, 06:18 PM
Last Post: Lauren Johnson
  "Holodeck" Technology only a few years away!~~! Peter Lemkin 3 5,706 13-07-2014, 05:01 AM
Last Post: Peter Lemkin
  Wireless Technology: A Looming Healthcare Crisis Tracy Riddle 2 4,589 08-12-2013, 02:43 PM
Last Post: Tracy Riddle
  Seeing through walls - old technology, but announced as new at MIT Peter Lemkin 0 3,000 09-02-2013, 10:55 AM
Last Post: Peter Lemkin
  Suppressed technology: Growing cars from the soil Adele Edisen 1 3,829 26-06-2012, 06:24 PM
Last Post: Keith Millea
  Secret Data and Keystroke-Logging Software Revealed on Millions of Smartphones Magda Hassan 0 2,504 01-12-2011, 12:46 AM
Last Post: Magda Hassan
  Cia threat tracking technology fascinating and creepy . Bernice Moore 0 2,762 29-11-2011, 01:54 PM
Last Post: Bernice Moore
  Data on 4.6 million active and retired military personnel stolen (SAIC) Ed Jewett 0 2,728 01-10-2011, 07:46 AM
Last Post: Ed Jewett
  To Catch a Thief: Invisible DNA body spray technology may soon be installed at a business near you Ed Jewett 0 3,027 24-10-2010, 05:36 AM
Last Post: Ed Jewett

Forum Jump:


Users browsing this thread: 1 Guest(s)