Categories

Archives

Follow Us on Twitter

Like us on Facebook!

AltNews.INFO

1 day 19 hours ago

It's becoming all too common.

AltNews.INFO

2 days 15 hours ago

AltNews.INFO shared Hashem Al-Ghaili's video.

Researchers have developed an advanced night vision camera.

Donate to AltNews.INFO

Our BTC Address: 3D5W9V6husNZuhapxGMbRLnwWQDMGoXcwZ

NOTICE: INTELLECTUAL PROPERTY All intellectual property rights to the various posts, materials, and cartoons belong solely to their respective creators. No claim is made here to the intellectual creations of others.

Anonymizer ‘anonymous email’ owned by Trapwire’s Cubic Corporation

Anonymizer 'anonymous email' owned by Trapwire's Cubic Corporation

August 14, 2012 – Beware, Anonymizer, the company that brings you free anonymous email facilities, called nyms, as well as similar secure services used by activists all over the world, is actually owned by Cubic Corporations, the parent company that owns Abraxis, which in turn owns Trapwire. So, it’s possible, if not probable that all those activists around the world who believe their emails are safe may well be sending messages that go straight into Trapwire, the surveillance system that monitors activists. This could be lifted straight out of a political conspiracy movie – but it isn’t. Furthermore, Cubic Corporation runs transport smart cards around the world, including USA, Australia and London (Oyster card): a link with Trapwire too?

The above info has actually been available for some time, but it is only thanks to the information about Trapwire and Abraxas, hacked from Stratfor files by Anonymous and published by Wikileaks, that the full picture is starting to emerge.

1. Anonymizer

Re. Anonymizer, this was acquired by Abraxas in 2008. Two years later, Cubic acquired Abraxas for $124 million in cash. Cubic internal communications explain that the RFI for Cubic’s ‘persona software’ was actually written for Anonymizer. Quote from Richard Helms (former director of CIA during Allende coup and Watergate periods and then founder of Abraxas): “I am also pleased to announce that Lance Cottrell, the Founder and Chief Technology Officer of Anonymizer, will become our Chief Scientist and continue to pursue his advocacy of privacy for people around the world. Bill Unrue, Anonymizer’s CEO, will assume the position of President of Anonymizer which will operate as a wholly owned subsidiary of Abraxas Corporation. Bill will continue to pursue Anonymizer’s goals to provide proprietary technologies and complementary capabilities that offer unique, multi-layered identity protection that enhances the traditional network perimeter defenses of consumers, corporations and government agencies.”

2. Transportation smart cards

A. Australia:

In 2010 Cubic Corporation signed a $370 million contract with the NSW Government to provide Sydney’s electronic ticketing system for public transport. It was also awarded a $65 million contract to provide services to NSW’s CityRail. It also runs the Brisbane “go card” system. It operates in Australia as Cubic Transportation with offices in Sydney, Brisbane and Perth. In 2008 it also opened a defence subsidiary based in Queensland, Cubic Defence Australia, run by Mark Horn.

B. UK

Cubic designed, developed and installed the Oyster Card system for London’s Underground and buses.

C. Other

In 1972, Cubic acquired the first Automatic Fare Collection (AFC) system for Chicago’s Illinois Central Gulf Railroad. By the late 1970s, Cubic had installed AFC systems for the Hong Kong Mass Transit Railway Corporation and the Eastern Suburbs Railway in Sydney. Soon came the Bay Area Rapid Transit (BART) system in San Francisco, the Washington Metropolitan Area Transit Authority and the Pennsylvania Port Authority Transit Company AFC system.

Cubic Corporations offices:

WASHINGTON, D.C. Crystal Gateway One, Suite 1102 1235 Jefferson Davis Hwy. Arlington, VA 22202 703-415-1600 703-415-1608 Fax

ORLANDO, FL 12000 Research Parkway Suite 408 Orlando, FL 32826 407-273-5500 407-275-0200 Fax

SHALIMAR, FL 60 Second St., Suite 105 Shalimar, FL 32579 850-609-1600 850-609-0100 Fax

LONDON Derwent House Kendal Avenue Park Royal London W3 OXA UK

Cubic Corporation Board of Directors:

Walter J. Zable: Chairman; Walter C. Zable: Vice- Chairman; Robert D. Weaver: Director; Robert S. Sullivan: Director; Richard Atkinson: Director; Raymond E. Peet: Director; Robert T. Monagan: Director; Raymond L. DeKozan: Director; Gerald R. Dinkel: Vice-Presiden;t Mark A. Harrison: Vice-President; Daniel A. Jacobsen: Vice-President; Kenneth Kopf: Vice-President; Bernard A. Kulchin: Vice-President; John A. Minteer: Vice-President; John D. Thomas: Vice-President; Richard A. Johnson: Corporate Executive; William L. Hoese: Secretary; William W. Boyle: Chief Financial Officer.

Cubic Corporation IP addresses (via Anonymous):

208.86.144.37 ca.trapwire.net

208.86.144.37 access.trapwire.net

208.86.144.37 demo.trapwire.net

208.86.145.176 cert.trapwire.net

208.86.144.37 lv.trapwire.net

208.86.144.40 smtp.trapwire.net

208.86.144.37 training.trapwire.net

208.86.144.37 west.trapwire.net

208.86.144.37 www.trapwire.net

See also:

http://wiki.echelon2.org/wiki/Cubic_Corporation

http://www.dailymail.co.uk/news/article-2187602/U-S-Government-secretly-spying-using-civilian-security-cameras-say-Wikileaks.html?ito=feeds-newsxml

http://darkernet.wordpress.com/2012/08/11/abraxas-and-trapwire-the-technology-and-personnel-revealed/

http://www.theage.com.au/technology/technology-news/revealed-trapwire-spy-cams-ticket-to-australia-20120813-2448z.html

( via darkernet.wordpress.com )

TRAPWIRE: Wikileaks says Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network

surveillance

Source: Business Insider

TrapWire is watching.

The U.S. cable networks won’t be covering this one tonight (not accurately, anyway), but Trapwire is making the rounds on social media today—it reportedly became a Trending hashtag on Twitter earlier in the day.

Trapwire is the name of a program revealed in the latest Wikileaks bonanza—it is the mother of all leaks, by the way. Trapwire would make something like disclosure of UFO contact or imminent failure of a major U.S. bank fairly boring news by comparison.

And someone out there seems to be quite disappointed that word is getting out so swiftly; the Wikileaks web site is reportedly sustaining 10GB worth of DDoS attacks each second, which is massive.

Anyway, here’s what Trapwire is, according to Russian-state owned media network RT (apologies for citing “foreign media”… if we had a free press, I’d be citing something published here by an American media conglomerate): “Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology—and have installed it across the U.S. under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community.

The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented. The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.”

So: those spooky new “circular” dark globe cameras installed in your neighborhood park, town, or city—they aren’t just passively monitoring. They’re plugged into Trapwire and they are potentially monitoring every single person via facial recognition.

In related news, the Obama administration is fighting in federal court this week for the ability to imprison American citizens under NDAA’s indefinite detention provisions—and anyone else—without charge or trial, on suspicion alone.

So we have a widespread network of surveillance cameras across America monitoring us and reporting suspicious activity back to a centralized analysis center, mixed in with the ability to imprison people via military force on the basis of suspicious activity alone. I don’t see how that could possibly go wrong. Nope, not at all. We all know the government, and algorithmic computer programs, never make mistakes.

Here’s what is also so disturbing about this whole NDAA business, according to Tangerine Bolen’s piece in the Guardian: “This past week’s hearing was even more terrifying. Government attorneys again, in this hearing, presented no evidence to support their position and brought forth no witnesses. Most incredibly, Obama’s attorneys refused to assure the court, when questioned, that the NDAA’s section 1021 – the provision that permits reporters and others who have not committed crimes to be detained without trial – has not been applied by the U.S. government anywhere in the world after Judge Forrest’s injunction. In other words, they were telling a U.S. federal judge that they could not, or would not, state whether Obama’s government had complied with the legal injunction that she had laid down before them. To this, Judge Forrest responded that if the provision had indeed been applied, the United States government would be in contempt of court.”

Stratfor emails reveal secret, widespread TrapWire surveillance system

AFP Photo / Valery Hache

AFP Photo / Valery Hache

Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the PentagonCIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.

The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.

Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks beganreleasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.

On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.

Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the servers of WikiLeaks supporter sites were reported to be dropping upwards of 40 gigabits of traffic per second. On Friday, WikiLeaks tweeted that their own site was sustaining attacks of 10 Gb/second, adding, “Whoever is running it controls thousands of machines or is able to simulate them.”

According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be “analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”

In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.

What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).

“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”

In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product“can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.”

An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.”

Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the “See Something, Say Something” program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.

In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes“God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files onUSASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.

News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.