Luke Rudkowski interviews Jason Hammond, the twin brother of the alleged hacker of S stratfor Jeremy Hammond.
To find out more about Jeremy Hammond check out http://freehammond.com/
Luke Rudkowski got a chance to speak with Andy Bichlbaum, 1/2 of the Yes Men, at a press conference for hacktivist Jeremy Hammond. Andy is an artist, activist, film maker, and the co-creator of the infamous Yes Men. The December 2011 hack of Stratfor revaeled that Andy was being followed and surveilled by Stratfor at the request of Dow Chemical for his work with the Yes Men to support the victims of the 1984 Bhopal gas disaster.
It looks like Anonymous’ strategy of focusing more on the impact and dissemination of already leaked information, rather than continuing to go for quantity, is really starting to pay off. Analysis of Stratfor leaks reveals that former senior intelligence officers have installed a detailed surveillance system “more accurate than facial recognition technology” across America. Working from a secretive base in North Virginia, Abraxas has developed a programmed called “Trapwire.”
Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.
According to a press release dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be “analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”
“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”
Some are theorizing that the recent DDoS attacks on WikiLeaks may be from Stratfor or a related shadowy organization. Perhaps this widespread espionage points to an invisible cyber-war already taking place across the web:
At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.
On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.