SMRs and AMRs

Sunday, February 20, 2011

Plan Solicited By Chamber of Commerce Lawyers Included Malware Hacking Of Activist Computers

from ThinkProgress

Last Thursday, ThinkProgress revealed that lawyers representing the U.S. Chamber of Commerce, one of the most powerful trade associations for large corporations like ExxonMobil and CitiGroup, had solicited a proposal from a set of military contractors to develop a surreptitious campaign to attack the Chamber’s political opponents, including ThinkProgress, the Change to Win labor coalition, SEIU, StopTheChamber.com, MoveOn.org, U.S. Chamber Watch and others. The lawyers from the Chamber’s longtime law firm Hunton and Williams had been compiling their own data set on some of these targets. However, the lawyers sought the military contractors for assistance.

As ThinkProgress has reported, the proposals — created by military contractors Palantir, Berico Technologies, and HBGary Federal, collectively known as “Team Themis” — were discussed at length with the Chamber’s lawyers over the course of several months starting in October of 2010. The core proposals called for snooping on the families of progressive activists, creating phony identities to penetrate progressive organizations, creating bots to “scrape” social media for information, and submitting fake documents to Chamber opponents as a false flag trick to discredit progressive organizations.

In addition to the Team Themis plans that ThinkProgress and other outlets have reported on, a closer look at the proposals show that the firms had planned to use exploits to steal information from the Chamber’s opponents, or worse. On November 2, HBGary Federal executive Aaron Barr sent John Woods, a lawyer at Hunton and Williams representing the Chamber, two documents discussing tactics for assisting the Chamber. One presentation boasted of HBGary Federal’s capabilities in “Information Operations,” a military contractor term for offensive data extraction techniques typically reserved for use against terrorist groups. The slide includes sections on “Vulnerability Research/Exploit Development” and “Malware Analysis and Reverse Engineering.”

(More here.)

0 Comments:

Post a Comment

<< Home