It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by JacKatMtn
It looks like the roaches are scattering.. 2 of the 3 firms outed by the release of the emails have cut ties with HBGary Federal, and trying to profess their disgust with the companies plans..
Bank of America and the Chamber of Commerce basically pulled the "We didn't know" card..
I remember something about BoA back a few weeks ago assembling their own crew to handle the fallout from an expected Wikileaks release of some information about a major bank. Could this group of security firms have been their crew?
Could the plan ..
By hacking into the groups’ servers, the goal was to “discredit, confused, shame, combat, infiltrate, fracture,” the adversarial groups, according to the three firms’ proposal.
...be part of what Cass Sunstein implied last year when he wanted the Government to use it's resources to infiltrate websites?
While the folks who obtained this information will be investigated, found, arrested and prosecuted, shouldn't there be a new investigation surrounding the leaked information?
I think so, but I would have to agree with Glenn Greenwald when he writes..
“Cyberattacks are ‘crimes’ only when undertaken by those whom the government dislikes, but are perfectly permissible when the government itself or those with a sympathetic agenda unleash them,”
www.securitynewsdaily.com
(visit the link for the full news article)
By 11:30pm on the evening of December 2, Barr had cranked out a PowerPoint presentation. It called for "disinformation," "cyber attacks," and a "media campaign" against WikiLeaks.
What could HBGary Federal do?
Computer Network Attack/Exploitation
Influence and Deception Operations
Social Media Collection, Analysis, Exploitation
Digital Media Forensic Analysis
The short version: It proposed services to clients like a law firm working with Bank of America and the U.S. Chamber of Commerce that included cyberattacks and misinformation campaigns, phishing emails and fake social networking profiles, pressuring journalists and intimidating the financial donors to clients’ enemies including WikiLeaks, unions and non-profits that opposed the Chamber.
I’ve written earlier about HBGary’s proposal to Bank of America’s law firm, in partnership with fellow security firms Palantir and Berico Technologies, to weaken WikiLeaks with cyberattacks and false documents as well as tracing and threatening its donors and supporters. But new information surfaced Monday about other shady approaches the firm suggested. As part of the company’s pitch to the U.S. Chamber of Commerce, HBGary Federal’s Barr offered tactics like mining Classmates.com for information about a target individual’s friends, then building fake Facebook pages to gain access to subject’s personal details. He and Hoglund also discussed using spear phishing, a technique that typically plants malicious software on a user’s machine with a carefully spoofed email message.
Bank of America, the Chamber of Commerce, Palantir and Berico have all since released statements that say they’ve ended their relationship or never had a formal relationship with the company.
By Dan Horn The Cincinnati Enquirer Jesse Tuttle, a computer hacker better known as 'Hackah Jak.' (Joseph Fuqua II photo) | ZOOM | Jesse Tuttle was sure he had made a good deal two years ago when he agreed to help the government safeguard sensitive computer systems against hackers, thieves and terrorists. For Tuttle, a computer hacker known around the world as "Hackah Jak," it was the chance of a lifetime. The deal would help him avoid prosecution on computer hacking charges and would pay him to do something he loves: search the Internet for vulnerable computer systems. If he found one, he says, he wrote a report about it for the FBI in Cincinnati. "He is a genius with computers," says Tuttle's lawyer, Firooz Namei. "He was basically the eyes and ears of the FBI on this world that no one knows exists." But Tuttle's Internet sleuthing ended in May, when Hamilton County sheriff's deputies charged the 23-year-old Camp Dennison man with breaking into the county's computer network and accused him of storing child pornography on his home computer. Tuttle says his work with federal authorities explains everything, and that he was arrested because one government agency didn't know what another was doing. But the FBI isn't talking and county officials stand by Tuttle's arrest. Tuttle's case is the product of an intensifying cyber war between hackers and law enforcement officials around the world. It's a high-tech war with high stakes.
Originally posted by JacKatMtn
Originally posted by soficrow
...That's the whole idea behind Wikileaks and Anonymous - to expose the crimes perpetrated by our lofty leaders - so they can be held accountable.
Agreed, but if I remember correctly evidence obtained illegally is inadmissible in court? If that is the case, how do these exposed crimes/conspiracies ever end with justice?
Originally posted by Hefficide
reply to post by JacKatMtn
I would think that, while the hacked data is inadmissible, now that the information contained therein is public domain, that could be used as probable cause for obtaining warrants which probably will lead to other evidence, such as computers, data records, etc.
~Heff
Originally posted by Gorman91
reply to post by JacKatMtn
Anonymous is legion. They don't forgive and they don't forget. They are the evil of humanity re purposed for good.
Something new all together.
You can say that some will be arrested and persecuted, but it's not going to stop them. It's quite literally its own demi-religion. Those arrested are like the suicide bombers. The cause doesn't stop because they died for it.
The American government fails to see the true issue at hand if they think they can shot a gun at anonymous and it will die. It's a hoard. You're a democracy that governs them. You do not fight them. You recognize your slave master and do what it says, or you are dead.edit on 16-2-2011 by Gorman91 because: (no reason given)
Originally posted by JacKatMtn
reply to post by Hefficide
I don't think so... the wikileaks stuff may be more legal considering the whistleblower aspect..
Anonymous admitting that they acquired the data illegally (hacking), makes it inadmissible IMO..
Now if anonymous was smart.. and not so ready to boast of discoveries like this, could have leaked it anonymously to media, wikileaks, cryptome etc.. and it may have been a different story.
Maybe some calls for Congress to open an investigation? I wonder if the government could actually be investigated by it's own agencies using the same provisions of the Patriot Act they use on the citizens?
I still think the oath our soldiers take says that I will support and defend the Constitution of the United States against all enemies, foreign and domestic;
Wouldn't those security firms fall under the domestic? wouldn't their exposed plans be domestic cyberterrorism?
Doesn't seem a stretch to think so..
Originally posted by Hefficide
reply to post by SilentKillah
Corporate records are not considered "classified". They are simply private documents, and are subject to fourth amendment protections and legalities.
~Heff