The companies watching your every move, and the journalist jailed for exposing them [VIDEO]

Support us and go ad-free

To offer cyber protection, we need to understand cyber intrusion (i.e. hacking). And US journalist Barrett Brown was researching the companies that practise both. Until, that is, he was sent to jail.

On 6 March 2012, Brown’s home was raided by the FBI and his laptop seized. He was eventually sentenced to 63 months in jail. On 29 November 2016, Brown was released on parole. And to celebrate, WikiLeaks published a searchable database of 60,000 emails from HBGary (one of the cyber-intelligence contractors Brown had investigated).

For the next two years, Brown will only be able to use a computer that’s authorised and regularly examined by the Probation Service.

But what exactly are the authorities so afraid of?

Revelations about a shadow CIA?

After defence lawyers had argued that the most controversial charge (the re-posting of a hyperlink) would violate Brown’s First Amendment rights, the prosecution agreed to drop it, as well as some lesser charges. The hyperlink in question went to a website that contained hacked material from private intelligence firm Stratfor (later published by WikiLeaks). The material proved how Stratfor was engaged in global intelligence-gathering. Including, controversially, the monitoring of political activists on behalf of big businesses.

The material also showed how Stratfor CEO Fred Burton had revealed that a secret Grand Jury had issued a sealed indictment for WikiLeaks founder Julian Assange: “Not for Pub — We have a sealed indictment on Assange. Pls protect.” In addition, Burton said: “Assange is going to make a nice bride in prison. Screw the terrorist. He’ll be eating cat food forever…” And there was much more.


In February 2011, hacktivists raided the computer systems of HBGary and HBGary Federal (the latter provides services and tools to the US Government), releasing 70,000 emails.

Read on...

Support us and go ad-free

Via his ProjectPM wiki (a website allowing for collaborative changes), Brown investigated the activities of these companies. He soon came upon a project called Team Themis. HBGary Federal – part of HBGary (later rebranded as CounterTack) – had set this up in partnership with two other companies – Palantir and Berico. Their objective was to identify and target threats, including WikiLeaks, as indicated in this presentation [pdf, page 14].

Fake everything

Brown examined other projects, some of which he’d identified via researchers at Telecomix’s Blue Cabinet wiki. These included the following:

– Persona management. This is about the creation of online identities for propaganda, disinformation, or surveillance purposes. Ntrepid – a subsidiary of Cubic Corporation (a global leader in defense, transportation systems, and radio frequency identification (RFID) solutions) – provided such a service via a $2.76m contract to Centcom (part of America’s National Security Agency). Other specialists in persona management included the US Air Force [pdf] and Abraxas, an intelligence contractor purchased by Cubic.

– Anonymizer. This is an encrypted email service, used by thousands of political activists around the world. Until, that is, the exposure of its owner, Abraxas (many of Anonymizer’s users would have been unaware their activities could be compromised).

– Tartan. This is a threat-modelling facility which identifies and targets poltical activists and their networks. Its owner is Ntrepid. Bloggers @not_me, Asher Wolf, and DarkerNet (website closed) were the first to discover it.

And then came Trapwire

Trapwire is a global surveillance system developed by Abraxas Applications (a subsidiary of Abraxas Corporation). It has links to the National Suspicious Activity Reporting Initiative (NSI), a programme designed to help aggregate reports of suspicious, as well as political activity around the US.

The Texas Department of Public Safety, which operates the Texas Fusion Center and whose assistant director of intelligence was Stratfor’s Fred Burton, had purchased TrapWire to police the border with Mexico. Congressional testimony indicated that the Washington DC Police Department was also part of a TrapWire trial.

As details of Trapwire emerged (raising suspicions that its facilities had links to mass transportation systems in the US, Australia and the UK), Anonymous staged a campaign [archive] to destroy as many of its cameras as possible.

Back to the future

In addition to all this, there is a growing number of intelligence companies that offer cyber protection and related services.

For example, Protection Group International (PGI) is a UK-based company that boasts Mi:fusion, which allows clients to “harvest a vast majority of open source feeds, including web content, social media and news sources”. One of PGI’s executive members is a former deputy director of British intelligence agency GCHQ.

There’s also Endgame Systems – a company listed on Barrett Brown’s arrest warrant. One Endgame product is Bonesaw, a threat detection service that enables customers to remotely take over any computer to see what’s inside.

Cyber war

Meanwhile, the cyberspace war between government agencies (and their commercial partners [pdf]) and the general populace continues. As with any war, there are casualties. And Barrett Brown was one of them. But his research will no doubt continue.

The question is: Where exactly is the line between (legalised) hacking and protection?

Get Involved!

Donate to Barrett Brown’s $890,250 fines and restitution costs to Stratfor.

– In March 2012, authorities arrested activist Jeremy Hammond and charged him with the Stratfor hack. His conviction for ‘computer misuse crimes’ came in November 2013. The sentence was 10 years in jail. You can donate to Jeremy Hammond’s campaign here.

– Support the work of the Courage Foundation.

– Read more about Barrett Brown’s investigative work at ProjectPM.

– Finally, search the HBGary emails (published by WikiLeaks on 29 November 2016).

Featured image via Flickr Creative Commons

Support us and go ad-free

We need your help to keep speaking the truth

Every story that you have come to us with; each injustice you have asked us to investigate; every campaign we have fought; each of your unheard voices we amplified; we do this for you. We are making a difference on your behalf.

Our fight is your fight. You’ve supported our collective struggle every time you gave us a like; and every time you shared our work across social media. Now we need you to support us with a monthly donation.

We have published nearly 2,000 articles and over 50 films in 2021. And we want to do this and more in 2022 but we don’t have enough money to go on at this pace. So, if you value our work and want us to continue then please join us and be part of The Canary family.

In return, you get:

* Advert free reading experience
* Quarterly group video call with the Editor-in-Chief
* Behind the scenes monthly e-newsletter
* 20% discount in our shop

Almost all of our spending goes to the people who make The Canary’s content. So your contribution directly supports our writers and enables us to continue to do what we do: speaking truth, powered by you. We have weathered many attempts to shut us down and silence our vital opposition to an increasingly fascist government and right-wing mainstream media.

With your help we can continue:

* Holding political and state power to account
* Advocating for the people the system marginalises
* Being a media outlet that upholds the highest standards
* Campaigning on the issues others won’t
* Putting your lives central to everything we do

We are a drop of truth in an ocean of deceit. But we can’t do this without your support. So please, can you help us continue the fight?

The Canary Support us

Comments are closed