|Jeremy Hammond was sentenced to 10 years in prison for his involvement in hacking Stratfor's secure systems and supplying Wikileaks with emails proving that corporations, the US government, as well as Police Departments and other agencies, are paying Stratfor to spy on, infiltrate and manipulate activist organizations. |
Hammond is in prison until 2020; Hector "Sabu" Monsegur, informant and shill for the FBI, and Stratfor still free
|Barrett Brown, journalist, activist and author, was sentenced to 63 months in prison and ordered to pay $890,250 in fines and restitution as part of his sentence|
"George Friedman founded Stratfor in 1996"...The story goes .....but what they don't say, anywhere on their large website, is that they spy on and gather information on activists to be given to governments and corporate clients.Stratfor spied on activists - On Occupy; on Anonymous; on Wikileaks. They spy on anyone for a buck.At Christmas, 2011, Jeremy Hammond, a young political activist, web developer and musician from Chicago, along with a number of other activists (in the UK and Ireland) broke through the security of Stratfor's computer systems, retrieving evidence of that spying - emails and client credit card information - then left a message for the CIA wanna-bes...something that made George Friedman hopping mad (for a "security" and "intelligence" firm, not great PR)By February 27, 2012, those emails began to be released on Wikileaks via their "The Global Intelligence Files" pageEmails about Occupy, Anonymous, Wikileaks and the information collection and discussions with Banks (CitiBank for one), with governments around the world and with other clients.......What Jeremy and friends did was exactly what whistleblowers have done for decades, but Jeremy was arrested and put in jail, denied bail, had his commissary privileges taken away, his phone privileges suspended for 6 months and has been repeatedly held in solidarity confinement - now held for a yearHis compadres of Operation Antisec were arrested in other countries - those convicted outside of the US, got 16 months or less.Jeremy, after being threatened with a lifetime of legal problems, charges all over the country and a potential of decades in prison, pleaded guilty to one count under the Computer Fraud and Abuse Act . After his plea, he made the following statement:
Today I pleaded guilty to one count of violating the Computer Fraud and Abuse Act. This was a very difficult decision. I hope this statement will explain my reasoning. I believe in the power of the truth. In keeping with that, I do not want to hide what I did or to shy away from my actions. This non-cooperating plea agreement frees me to tell the world what I did and why, without exposing any tactics or information to the government and without jeopardizing the lives and well-being of other activists on and offline.
During the past 15 months I have been relatively quiet about the specifics of my case as I worked with my lawyers to review the discovery and figure out the best legal strategy. There were numerous problems with the government’s case, including the credibility of FBI informant Hector Monsegur. However, because prosecutors stacked the charges with inflated damages figures, I was looking at a sentencing guideline range of over 30 years if I lost at trial. I have wonderful lawyers and an amazing community of people on the outside who support me. None of that changes the fact that I was likely to lose at trial. But, even if I was found not guilty at trial, the government claimed that there were eight other outstanding indictments against me from jurisdictions scattered throughout the country. If I had won this trial I would likely have been shipped across the country to face new but similar charges in a different district. The process might have repeated indefinitely. Ultimately I decided that the most practical route was to accept this plea with a maximum of a ten year sentence and immunity from prosecution in every federal court.
Now that I have pleaded guilty it is a relief to be able to say that I did work with Anonymous to hack Stratfor, among other websites. Those others included military and police equipment suppliers, private intelligence and information security firms, and law enforcement agencies. I did this because I believe people have a right to know what governments and corporations are doing behind closed doors. I did what I believe is right.
I have already spent 15 months in prison. For several weeks of that time I have been held in solitary confinement. I have been denied visits and phone calls with my family and friends. This plea agreement spares me, my family, and my community a repeat of this grinding process.
I would like to thank all of my friends and supporters for their amazing and ongoing gestures of solidarity. Today I am glad to shoulder the responsibility for my actions and to move one step closer to daylight.
1) Team ThemisTeam Themis is a consortium of firms, made up of HBGary, Palantir, Berico, and Endgame Systems, that was apparently set up to provide offensive intelligence capabilities against certain enemies on behalf of the law firm Hunton & Williams, who was working at the behest of Bank of America and the U.S. Chamber of Commerce. The plans—discovered in emails pilfered by Anonymous from HBGary, which were drawn up but never acted upon—consisted of disinformation efforts against WikiLeaks and its supporters (including Glenn Greenwald) and other activists involved in criticizing the Chamber of Commerce.Some of the methods proposed, which could feasibly be described as a dirty-tricks campaign using false documents to sow distrust, border upon the criminal. The affair made the news and resulted in calls for an investigation that never materialized, which is not surprising considering that the Department of Justice (DOJ) set the affair in motion by recommending Hunton & Williams to Bank of America, who were then concerned that WikiLeaks possessed information belonging to them. In the end a single Palantir employee was placed on leave pending a review of his actions, and later allowed to return.2) Romas/COINRomas/COIN was a sophisticated campaign of mass surveillance and data mining targeted at Arab countries, which was unveiled in an exclusive Project PM report during 2011. The report was picked up by Raw Story and one other outlet, and it resulted in an article by Brown in the Guardian and a segment on Russia Today featuring confirmatory comments from Lt. Col. Anthony Shaffer. But otherwise it didn’t get much traction.Most striking was the revelation that companies like Apple and Google were team partners in this effort. While its exact nature and scope is unknown, mobile phone applications were believed to constitute a major component of the program. The contract for Romas/COIN was set to be replaced by a successor, codenamed Odyssey, which is quite possibly being used today to monitor, deceive, and manipulate whole populations.3) “Persona Management”The capability of persona management entails “the use of software by which to facilitate the use of multiple fake online personas, or ‘sockpuppets,’ generally for the use of propaganda, disinformation, or as a surveillance method by which to discover details of a human target via social interactions.” The United States Air Force (USAF) was revealed on the General Services Administration’s Federal Business Opportunities website to have requested bids from contractors for the opportunity to work on this class of software. It’s a high priority for DARPA (Defense Advanced Research Projects Agency), and U.S. Central Command (CENTCOM) has admitted to using similar capabilities—including psychological operations on U.S. senators—abroad, under Operation Earnest Voice, to increase support for wars.There are two very concerning aspects to this. One: the possibility that fake social media profiles, replete with supporting biographical details, could be deployed against Americans, which is against the law. Second: the possibility of a future in which you never know whether you’re communicating with a live person or a software abstraction, and a world where governments control narratives and wield an intense grip upon trends and topics via whole armies of these things. Let’s just say it’s scary.4) TrapWireBrown played a central role in the media coverage of TrapWire, a mass video surveillance system developed by Abraxas Corporation that was revealed last year. TrapWire’s marketing material boasts the ability to predict terrorist attacks. The emails, which came out of Stratfor and were published by WikiLeaks, showed that a network of closed-circuit television (CCTV) cameras had been installed in most major American cities, the feeds of which were fed into a system designed to detect patterns of suspicious behavior.Brown demonstrated how the New York Times got TrapWire wrong by arguing its fears were overstated (based on the word of an unnamed and unquoted DHS official) and underplayed its significance by dismissing its own marketing claims. He also detailed how articles about TrapWire were scrubbed from Australian newspapers at the behest of Cubic Corporation, who argued they were not connected to TrapWire, even though they had purchased the company that created it, Abraxas, two years earlier.5) Cubic CorporationAnd what about Cubic, a large company primarily serving the defense sector and its other wholly owned subsidiary, Ntrepid? In 2011, Ntrepid won a $2.76 million contract for persona management from CENTCOM mentioned earlier. Ntrepid also has an interesting product called Tartan, an investigation software with the ability to find hidden relationships within groups, analyze and identify ranks of influence, and locate key voices. Tartan’s own brochures suggest its potential for deployment against anarchist and protest groups; Occupy Wall Street is mentioned specifically.Cubic also sells a product of dubious trustworthiness called Anonymizer, a proxy tool intended to make Internet activity untraceable, while developing other solutions to investigate, track, and analyze groups of people who are communicating over social media websites. In summary, Ntrepid’s software is intended to help one pick apart organizations, allowing you to discover who is most influential within them, and even uncover the identities of people trying to remain anonymous. Its potential value to law enforcement investigations can’t be understated.6) Endgame SystemsAnother focus of Brown’s research was Endgame Systems—a company named on his search warrant. Endgame conducts vulnerability research that gets used in cyber-warfare. Their premiere product, Bonesaw, is an offensive cyber-targeting application with a map displaying the locations and addresses of most Internet-connected computers and devices around the world, providing situational awareness and a platform from which to launch operations against adversaries and threats.Endgame is also involved in the sale of zero-day exploits—e.g., weaknesses that can be used to attack and infiltrate systems. They were particularly secretive about the company’s involvement in Team Themis and purposely kept a low profile during the discussions. As one employee told another in an internal email according to this WIRED article, “We don’t ever want to see our name in a press release.” Like other companies, such as VUPEN, that sell exploits to governments, Endgame’s vulnerability research and experience with cyber-weapons has secured them a prominent role in the U.S. cyber-security arena.7) Qorvis CommunicationsThe public relations firm Qorvis has had certain interactions with the Kingdom of Bahrain that begat a few scandals. Qorvis was reportedly hired by the Bahraini regime to engage in “reputation management”—essentially monitoring the media and manipulating the press to promote a specific perception of the Kingdom while silencing critical voices. This is particularly troubling in view of the human rights situation in Bahrain: There have been violent crackdowns by security forces against demonstrators, and activists are frequently targeted with attacks or censorship by the regime. Actions by Qorvis are suspected to include a coordinated barrage of vicious social media attacks against Maryam al-Khawaja, a Bahraini human rights activist, when she gave a speech at the Oslo Freedom Forum in 2011.8) Booz Allen HamiltonLet’s not forget Booz Allen Hamilton, another entity Brown was looking into. A major U.S. intelligence contractor with offices in Virginia, Booz Allen Hamilton was found by Project PM to have an unspecified ‘project’ potentially related to disrupting Anonymous and WikiLeaks. No more details about that have been forthcoming, no doubt due to the firm’s intense culture of secrecy.Booz Allen is best known as the company that whistle-blower Edward Snowden was briefly employed by as a systems administrator, under contract to the NSA, during which he used his broad access to obtain documents revealing secret surveillance programs. The current Director of National Intelligence, James Clapper, who lied to Congress, was a former executive at Booz. It’s been reported that Booz Allen has experienced conflicts of interest and has a history of overbilling, while 99 percent of the company’s revenue comes from the federal government. As the author of that report notes, the firm merits closer scrutiny.9) Palantir TechnologiesPalantir Technologies is a major player in this field who is of great interest to Brown and Project PM. Palantir, known as a “darling of the intelligence and law enforcement communities”, was founded with a boatload of money from In-Q-Tel, the CIA’s venture capital firm, and PayPal cofounder Peter Thiel. It’s led by the eccentric Alex Karp. Palantir was also involved in Team Themis, and even apologized to Greenwald for it—but what we know of its work speaks to the company’s expertise in dealing with large datasets.Palantir’s self-titled flagship product is able to sift through extremely large amounts of data while providing advanced search and discovery capabilities: think things like telephone calls, bank transaction records, emails, text messages, etc. Of course, it’s wildly profitable and boast many customers, chief among them our nation’s counterterrorism and cyber analysts. Palantir claims to have built-in privacy controls, but that isn’t necessarily very reassuring since abuses and violations do happen.10) Berico Technologies and HBGaryBerico Technologies, another firm implicated in Team Themis, develops fancy tools and infrastructure that are used in data visualization and analysis to assist signals intelligence (SIGINT) missions. After the Themis scandal broke, the company issued a statement that it does “not condone or support any effort that proactively targets American firms, organizations or individuals” and broke off ties with HBGary. For its part, HBGary does a lot of malware detection and also claims to have offensive cyber capabilities (more zero-day exploits).HBGary Federal, however, is mostly perceived as a joke today—in no small part due to the foolish efforts of one executive, Aaron Barr, to identify the leadership structure of Anonymous. This attempt backfired in spectacular fashion, with the company’s servers being hacked and email spools leaked. Barr had no choice but to resign, and several firms attempted to distance themselves from him and HBGary after they were compromised.11) Strategic Forecasting, Inc.Strategic Forecasting, Inc. was hacked by AntiSec in association with Anonymous at the end of 2011 and had thousands of emails stolen. The emails are now continually being published by WikiLeaks as the Global Intelligence Files. Stratfor’s wide-ranging spying activities were later exposed, “including surveillance of Bhopal activists at the behest of Dow Chemical, of PETA on behalf of Coca-Cola, and of Occupy Wall Street under contract to the U.S. Department of Homeland Security.” Those facts are less surprising and perplexing than the fact that notorious hacker Sabu was working for the FBI when Stratfor was hacked, and indeed provided the servers used to dump the data by Jeremy Hammond; add to that the fact that Sabu tried to sell the data to Julian Assange as part of a failed sting in which the FBI thought an American company was apparently expendable in its effort to nab the founder of WikiLeaks. Don’t even mention that Brown was indicted for identity theft and fraud for pasting a link in a chat room to an archive that contained unencrypted credit card numbers which, by Stratfor CEO George Friedman’s own account, had already been canceled—the FBI, banks and cardholders having been notified weeks beforehand.12) Leonie IndustriesThen there’s Leonie Industries, a federal contracting firm specializing in information operations which it offers to the Department of Defense. In 2012, it was caught in an online smear campaign against a journalist and an editor from USA Today, who were reporting about tax violations and waste at that same company, Leonie Industries. The article basically made the case that the contract between Leonie and the DoD was expensive and ineffective; the Pentagon then launched an investigation into back taxes owed. A calculated disinformation campaign in response to protected press activity is an ominous signal and reminder that journalists and activists are frequently targeted by these contractors. The person responsible apologized and divested themselves of ownership in the company. That shadowy, unseen forces have the ability to launch allegations to discredit perceived enemies at the behest of their clients is no less than absolutely terrifying.13) Gamma InternationalSome who are well-versed in this area might recall Gamma International, the proprietor of the FinSpy/FinFisher spyware that is able to remotely take control of a computer, log keystrokes, copy stored information, and intercept communications. The New York Times reported that this software had been deployed against activists in Bahrain and Egypt. The FinFisher case illustrates the problem very well: here U.K./U.S. firms are actively engaged in selling capabilities to oppressive dictatorships with poor human rights records; tools which can be used to surveil, detain, arrest, torture, or do worse to fellow humans.14) RaytheonLast but far from least, Raytheon was shown earlier this year to have secretly developed a program called Riot that is, according to the Guardian, “capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.” Here we have a military defense contractor—the fifth largest in the world—working on a product that combines social networking, big data, and analytics in ways that could be extremely invasive to the privacy of average, law-abiding citizens. Like TrapWire, Riot boasts predictive powers that might be dangerously misused or just plain wrong. It recalls the concept of pre-crime from the short story/film The Minority Report. Clients of Raytheon are buying into the promise of predictive analytics: techniques from statistics, modeling, machine learning and data mining are being applied to complex human behavior.
Brown—a longtime journalist and activist has written for Vanity Fair, the Onion, and the Guardian—has been the subject of a controversial government witchhunt for more than two years now, stemming from his association with members of the hacker collective Anonymous and his own journalism website known as “Project PM,” which investigated shadowy intelligence contractors like Booz Allen (long before Edward Snowden made them a household name).The FBI relentlessly pursued Brown for his relationship with source and hacker Jeremy Hammond, who last year pled guilty to hacking into Stratfor, the intelligence contractor whose emails were the subject of that notorious link. It’s important to note: the FBI never accused Brown of hacking. (For more on this, read Anonymous expert Biella Coleman in Slate: “Barrett Brown isn’t a hacker, but he’s being punished like one.”)However, the FBI would eventually charge Brown with obstruction of justice and threatening an FBI agent that stemmed from his reaction to their hacking investigation, and also included a charge of “trafficking” in stolen information for merely sharing a hyperlink with his collaborators on Project PM.The hyperlink, which Brown just copied from an Anonymous chatroom into a private Project PM chatroom, led to a trove of the Statfor documents, some which contained newsworthy information, and some which also contained private credentials. In other words, it’s the type of link journalists share between each other and on Twitter all the time.After Brown’s lawyers wrote a blistering legal brief accusing the Justice Department of violating the First Amendment, the government swiftly drop the linking indictment, but Brown eventually had to plead guilty to three lesser charges (including threatening an FBI agent, which Brown freely admitted in court was wrong and stupid).But you’d think that would be the end of trying to punish him for linking. But at the sentencing hearing on Thursday, the Justice Department again brought the hyperlink up, arguing that even though Brown was NOT charged for the linking to a public document, he should still be punished more for his other crimes because it is “relevant conduct.”So instead of being sentenced for just his crimes, Brown—as explained in detail by his defense attorney Marlo Cadeddu—got at least a year more in jail because the judge accepted the argument sharing a hyperlink—his First Amendment right, mind you—should factor into a longer sentence.