Skip to main content

Here's a story, that like me, you may have mentally filed as "Learn about Later" ...

Well Today, is 'Later' .... for me, anyways.  Takes a few minutes, you may be surprised ...

Despite Denials, New Emails Suggest US Chamber Was Aware Of Private Security Firms' Espionage Work
by Scott Keyes, -- on Feb 14th, 2011

As ThinkProgress laid out last week, the lobbying law firm Hunton & Williams (H&W) served as the go-between  for the Chamber and three private security firms — HBGary, Palantir, and Berico Technologies — who were collectively known as "Team Themis." Emails indicate that three top lawyers at Hunton & Williams — John Woods, Bob Quackenboss, and Richard Wyatt — met on multiple occasions with the Chamber in order to brief them on Team Themis's proposals.

American Chamber of Commerce's Dirty Tricks Plan Leaked by Anonymous -- February 12th, 2011

According to coverage at Firedoglake, last November HBGary, Palantir, and Berico Technologies also put together a plan to work for the U.S. Chamber of Commerce, with the Hunton & Williams law firm acting as an intermediary, presumably for plausible deniability. [Aaron] Barr put together some initial background information on connections between Chamber Watch and the labour movement as part of a proposal for a longer-term intelligence contract, pulling in $250,000-$300,000 per month from the Chamber of Commerce, presumably with the intention of monitoring connections between union officials and Chamber of Commerce critics. Together, these companies referred to themselves as THEMIS.

The initial THEMIS plan, dated November 15, divided work into a preliminary Phase I (cost: $200,000) and a full-scale Phase II (cost: $2 million). The first phase was just getting things moving and performing some preliminary estimates, like preparing "target folders" against the "Top 10" critics of the Chamber of Commerce.

Think Progress suggest Barr began assembling the "target folders," including pictures and personal information of the family members of staffers at the labour groups and anti-Chamber of Commerce groups.

Isn't this what in other contexts, would be called an "Enemies List" ?

Hello Big Brother ...  It must finally be "1984", as Orwell predicted ... just a few decades late ...

Of course, our dedicated staff at dailykos was covering the 'Team Themis' -- Chamber of Commerce cyber-spying story, even as the story was breaking, a few months ago.  Here are a few snippets of their fine analysis ...  

Chamber lobbyist says 'all options on the table' in fight against Obama to keep funding secret
by Meteor Blades for Daily Kos -- Apr 27, 2011

Whatever the mission statement on the wall at Chamber headquarters says in addition to profits over people, the organization's main objective at the moment seems to be burying Americans deep in disinformation. Anything that stands even slightly in the way of that, as the executive order on transparency would do, is bound to be included in that disinformation campaign. Nothing is more inimical to the Chamber's long-term goals than allowing rank-and-file Americans know who is behind so many of the lies of its members. Like the ones about climate change that keep the nation scurrying headlong down a dead-end path.
{ ... Speaking of Transparency -- This just in ...  on May 06, 2011 --  ...}

GOP Warns Obama Not to Issue Executive Order for Government Contractors

Republicans are warning President Obama not to issue an executive order that would require government contractors to disclose their political donations.

And this ... from another early reporter of the 'Team Themis' story ...

HBGary, Themis, bloggers, and traditional media: What a tangled Web
by Joan McCarter for Daily Kos -- Feb 15, 2011

[...] it's a fascinating story, and not just a little disquieting. The Chamber of Commerce, of course, denies any involvement in the scheme, claiming "that HBGary's proposal 'was never discussed with anyone at the Chamber' and that 'the Chamber was not aware of these proposals until HBGary's e-mails leaked.'"
[ leaked emails ...]

And this is just from a small portion of the e-mails that have been read so far. The possibility of the damaging revelations to still come as the e-mails are sifted through seem limitless. But one important revelation to come out so far isn't necessarily that damaging to either the Chamber or BOA or Hunton Williams as much as it is to traditional media. This is revealed in the PowerPoint one of Team Themis -- Palantir -- created  referencing Glenn Greenwald [...]

Here's another PowerPoint explaining "the technology capabilities" that Team Themis, can bring to YOUR Corporate Organization:

Corporate Information Reconnaissance Cell

[ Slide Presentation ]


Team Themis


Develop a corporate information reconnaissance service to aid legal investigations through the open source collection of information on target groups and individuals that appear organized to extort specific concessions through online slander campaigns.


Develop collection solutions for information on individuals and groups of interest

 -- Standardize and store information in common DB for structured analysis

 -- Analyze digital artifacts and social links within common visual framework

 -- Report correlated information in individual and organizational profiles


'Online Slander' ??? ... like,  "The Chamber supports the Off-shoring of American Jobs." ???
[by jamess -- 10/13/2010]

Simply Slanderous!

Here's the Sales Pitch that 'Team Themis' gives to its Corporate clients -- The same "Information Reconnaissance" Plan, which as the leaked emails confirm, the Chamber of Commerce was in the midst of implementing, when this very detailed "ChamberLeaks Scandal" broke ...  forcing the Chamber's many adamant denials ... They know NOTHING!

"Pay no attention, to those Social Media 'infiltrators', behind that invisible Internet curtain ..."

Corporate Information Reconnaissance Cell  (pdf)

November 3, 2010

Berico Technologies, LLC
HBGary Federal, LLC
HBGary Federal, LLC

Submitted to:
Hunton and Williams, LLP  

Berico Technologies -- Be Smarter. Be Faster.

Corporate Information Reconnaissance Cell
Hunton & Williams, LLP

[Pg 2]


Internet based communications, most predominately the growing spectrum of social media platforms, allow people to coordinate and communicate in a highly efficient and collaborative manner, even when vastly geographically distributed. These same services and technologies can also make it difficult to attribute information to specific entities. Anonymizing and misattribution technologies used to mask location and identity have become commonplace. In many cases, people and/or organizations use the inherent insecurity in Internet communications to conduct criminal or unethical activities. This represents a paradigm shift in the capability of individuals and small groups to conduct effective planning and execution of asymmetric operations and campaigns that can have major impacts on large organizations or corporations.

[Pg 5]

Data Collection

Team Themis consistently uses a combination of open source tools and data subscriptions combined with custom data collectors and pre-processors. Our unique methodology for collection is tailored for the social media environment; an iterative process of traditional data collection and social media link and artifact collection and analysis that allows us to link information correlations.

Primary information resources:

1. Background Checks
2. LexisNexis
3. LinkedIn
4. Facebook
5. Twitter
7. Other social media and location services
6. Subject specific sites, blogs, and forums
7. Well crafted search queries to search for digital artifacts
8. Other digital information discovered or given access to during the investigation

Social media encompasses vast amounts of information, much of it potentially ambiguous, so comparative analysis between information sources is key to derive accurate intelligence. The key to successful open source Intelligence, Surveillance, and Reconnaissance (ISR) is to iterate that would not otherwise be apparent. through the lifecycle quickly and accurately for as much complete data collection as possible. We have significant experience in this type of analysis and our methodology has proven out in real operations.

If/when Hunston & Williams LLP needs or desires web-content production, Team Themis will create realistic, useable web content to engage specific audiences for the purpose of gathering relevant, in-depth information. Direct target engagement can provide valuable information that cannot be acquired through other means: the detailed, focused task encompasses persona creation, [...]

[Pg 6]

Data Integration

Team Themis developers and engineers will leverage their extensive knowledge of Palantir's development and data integration environments to integrate all relevant data in one single, robust analytics layer. All of the data collected will be integrated seamlessly into the Palantir analysis framework to enhance link and artifact analysis. The platform's powerful approach to data integration will enable enterprises to unify data schemas, thus allowing analysts to depict and query otherwise disparate pieces of information in a secure and collaborative environment. Thanks to Palantir's sophisticated data integration capabilities, analysts within the CIRC will also be able to ingest both structured and unstructured data and perform real-time entity resolution against user-defined criteria on the fly, culminating with the fusion of multiple data sources and enrichment of single-source data feeds.

Palantir's open and dynamic ontology capability will provide Hunton & Williams LLP the flexibility to store and contextualize all types of data for analysis. Team Themis will work closely with the customer to conceptualize and implement a tailored ontology that considers the specific problem set and maps data into human-oriented models – this approach will drive effective decisionmaking grounded in deep understanding.

By providing high-value context and data enrichment, analysts will be empowered to develop robust link analysis between people, organizations, and/or other digital artifacts that will begin to form trends and allow statistical analysis. Team Themis will also develop specific helpers to further automate some data ingestion from commercial data sources as well as social media services and Google queries. [...]

[Pg 7]

Leverage the leading analytical platform. Team Themis will utilize the powerful Palantir platform as the centerpiece of the CIRC – empowering our collector/analysts with a cutting-edge analytical capability that enables rapid search and discovery, effective  collaboration, and intuitive knowledge management.

Palantir is recognized as the market-leading analytical platform for counter-intelligence (CI), counter-terrorism (CT), counter-narcotics (CN), and counter-proliferation (CP), currently deployed across elements of the intelligence, defense, and law enforcement communities that include SOCOM, DIA, CIA, and JIEDDO. The platform's proven record of success is grounded in the Palantir philosophy of augmenting and empowering analysts with a flexible, intuitive set of tools and capabilities that allow for analysis of data across relational, temporal, and geospatial domains.

Wow!  Forget about a Paper Trail -- Beware of your Digit Footprints, just waiting to be collated ... in a far off corporate war room.

Here's the Info Products and Service that 'Team Themis' delivers to its Corporate clients -- for a "small maintenance fee"  ...

"Never Forget -- Knowledge is Power ...  Does your firm have it?"

Corporate Information Reconnaissance Cell

Scope of Work


November 15, 2010

Berico Technologies, LLC
HBGary Federal, LLC
HBGary Federal, LLC

Submitted to:
Hunton and Williams, LLP  

Berico Technologies -- Be Smarter. Be Faster.

Corporate Information Reconnaissance Cell
Hunton & Williams, LLP

[Pg 2]

Team Themis Scope of Work

Team Themis will establish and operate a Corporate Information Reconnaissance Cell (CIRC) in order to provide Hunton & Williams, LLC with a full spectrum capability to collect, analyze, and affect adversarial entities and networks of interest. We will accomplish the following tasks in support of this effort:

Phase I (23 NOV 10 – 23 DEC 10)


Intelligence Assessment (written)

Provide overall estimate of adversary composition, key leaders, capabilities, intentions/strategy, courses of actions, strengths/vulnerabilities, etc.
(One time)

Network/Link Analysis (charts/diagrams)

Provide graphic depiction of adversary network(s); highlight key individuals/roles; show relationships and vulnerabilities
(One time)

Target Folders

Develop in-depth target dossiers for key entities and groups; will include key biographic data, relationships, intentions, etc.
(One time – "Top 10" targets)

Phase II  (24 DEC 10 – 24 JUN 11)


Intelligence Assessments (written)

Provide overall estimate of adversary composition, key leaders, capabilities, intentions/strategy, courses of actions, strengths/vulnerabilities, etc.
(Weekly and Monthly)

Special Assessments (written)

Provide focused, written assessment based on specific entity, group, or problem set
(As needed -- Significant Event)

Reporting (written)

Provide alerting and rapid analysis of significant events to enable situational awareness

Weekly Update Brief (slideshow)

Provide regular update on analytical findings, new key entities/groups, recommended actions, likely courses of action, etc.

Network/Link Analysis (charts/diagrams)

Provide graphic depiction of adversary network(s); highlight key individuals/roles; show relationships and vulnerabilities; illustrate network effects based on customer actions

Target Folders/Target Lists

Develop in-depth target dossiers for key entities and groups; will include key biographic data, relationships, intentions; develop target lists for prioritization of collection and effects
(As required – unlimited)

Indications and Warning (I&W) Reports

Conduct regular monitoring of key targets based on tailored indicators to provide warning/alerting for upcoming events

Predictive Analysis and Pattern Analysis

Leverage cutting-edge analytics to predict upcoming events based on historic trending and detailed knowledge of adversary
(As needed)

Vulnerability Analysis

Conduct detailed study of adversary networks, entities, and methods to identify potential vulnerabilities
(As needed)

Red Team Analysis

Conduct detailed study of friendly (customer) networks, entities, and methods to identify vulnerabilities and mitigate risks
(As needed)

[Pg 3]

Additional Capabilities (as needed)

Team Themis is also able to offer the following additional capabilities related to development and deployment of messaging campaigns to achieve specific objectives. Team Themis has extensive real-world experience conducting complex information operations campaigns. These campaigns typically include many different elements listed below with different messaging goals working towards larger objectives.



Provide persona development and maintenance to effectively execute active message delivery.
(As Needed)

Landing Pages

Develop and maintain blogs, Facebook, twitter, or other web services to provide relevant consistent content to engage target audiences.
(As Needed)

Animated Content

Video and audio productions to deliver tailored messages.
(As Needed)

Mobile Applications

Information distribution and consumer engagement on mobile devices.
(As Needed)

Forensic Analysis

Conduct forensic analysis of media and software; potentially associate developed media with entities/groups
(As Needed)

Other Interactive Content

Design, develop, and deploy any means of new media content for purposes of satisfying mission requirements.
(As Needed)

[Pg 4]

Cost Proposal

Cost (monthly)

Phase I

Palantir Software Licenses/Services

Project Management/Analysis/Engineering Services

Collection/Engineering/Analysis Support/Development Services

Total $200,000 [one time -- intro cost]

Phase II

Palantir Software Licenses/Services
$800,000 (monthly)

Project Management/Analysis/Engineering Services
$600,000 (monthly)

Collection/Engineering/Analysis Support/Development Services
$600,000 (monthly)

Total $2,000,000  (monthly)

Keeping tabs on your Political Enemies -- Priceless!

Scratch that -- All for the mere price of $2 Million Dollars a Month!

-- Isn't the 'Citizen United' decision empowering -- for Corporate players, that is?

Why doesn't Congress look into this?   Good Question.  Why indeed?

Rep. Johnson seeks intelligence firms' contracts in ChamberLeaks scandal -- March 28, 2011
Congressman writes Gates, Holder and Clapper; says he will lead investigation himself if necessary

WASHINGTON, D.C. -- Congressman Hank Johnson (D-GA-04) has requested that the Department of Defense, Department of Justice, and Director of National Intelligence turn over to Congress all contracts with intelligence firms HBGary Federal, Palantir Technologies, and Berico Technologies.  

Rep. Johnson has led calls for a formal Congressional probe into allegations that the contractors conspired to use intelligence and counterterrorism tools to attack U.S. citizens.  "We need aggressive action to defend American citizens in the cyber domain," said Johnson.  "This scandal cries out for a full investigation.  I'll do it myself if I have to."

Bush Administration counterterrorism and cybersecurity chief Richard Clarke speculated in an interview with ThinkProgress last week that the private use of cyberwarfare tools against U.S. citizens would constitute a criminal offense.  "I think it's a violation of 10USC," said Clarke.  "I think it's a felony, and I think they should go to jail."

I checked the good Congressman's public website, but I don't think Rep Hank Johnson, has gotten any significant replies to his letters of outrage, just yet ...

Perhaps there has not been enough Citizen's Outrage accompanying it?

Joan McCarter gives her assessment of the ChamberLeaks stonewalling ... and the chances for a real investigation ... it kind of figures ...

Richard Clarke: U.S. Chamber committed felony in ChamberLeaks scandal
by Joan McCarter for Daily Kos -- Mar 24, 2011

A number of lawmakers have called for an investigation of the Chamber over its probably illegal activities, and Rep. Hank Johnson (D-GA) has requested documents from the NSA and Defense Department detailing their contracts with Berico and HBGary, the firms implicated in the scandal. It seems unlikely that any House committee controlled by the GOP would want to investigate. That would leave it the Justice Department.

Hey Eric Holder, are you listening?   Are you scanning THIS Social Network?

IF SO, Here's a good recap on how the US Chamber has been planning to defeat US Unions ... the last bastion of the People, standing between Us and complete Corporate Takeover:

ChamberLeaks Timeline
by Brad Johnson, ThinkProgress -- February 16, 2011

Original reporting by ThinkProgress revealed that Hunton & Williams, a corporate law firm representing the U.S. Chamber of Commerce, conspired with set of private security companies and lobbying firms to undermine the political opponents of the Chamber with a surreptitious sabotage campaign.

Below [see link above] is a detailed timeline of the conspiracy to launch a dirty-tricks campaign against labor unions, progressive organizations, and journalists who have challenged the U.S. Chamber of Commerce's right-wing agenda.

Here's a reason WHY we should all be a bit more informed, and a bit more outraged, about all these disturbing ChamberLeaks implications, (no matter how the story first broke) ...

The horrible events of 9-11-2001 has caused a lingering National Stupor ... it is long past time we awoke from that deep sleep,

and return to some of our "core values", long cherished by Americans ... of generations gone by ... including this very simple one:

U.S. Constitution - Amendment 4

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

May those words, and those principles, once again be true in America, someday soon ...
perhaps today is that day -- given recent 9-11 Chapter Closing events ... may we soon reach that season, where real change and real National Healing might begin, in earnest ...

Originally posted to Digging up those Facts ... for over 8 years. on Fri May 06, 2011 at 03:11 PM PDT.

Also republished by InfoWar, Anonymous Dkos, and Wikileaks Informationthread.

Your Email has been sent.
You must add at least one tag to this diary before publishing it.

Add keywords that describe this diary. Separate multiple keywords with commas.
Tagging tips - Search For Tags - Browse For Tags


More Tagging tips:

A tag is a way to search for this diary. If someone is searching for "Barack Obama," is this a diary they'd be trying to find?

Use a person's full name, without any title. Senator Obama may become President Obama, and Michelle Obama might run for office.

If your diary covers an election or elected official, use election tags, which are generally the state abbreviation followed by the office. CA-01 is the first district House seat. CA-Sen covers both senate races. NY-GOV covers the New York governor's race.

Tags do not compound: that is, "education reform" is a completely different tag from "education". A tag like "reform" alone is probably not meaningful.

Consider if one or more of these tags fits your diary: Civil Rights, Community, Congress, Culture, Economy, Education, Elections, Energy, Environment, Health Care, International, Labor, Law, Media, Meta, National Security, Science, Transportation, or White House. If your diary is specific to a state, consider adding the state (California, Texas, etc). Keep in mind, though, that there are many wonderful and important diaries that don't fit in any of these tags. Don't worry if yours doesn't.

You can add a private note to this diary when hotlisting it:
Are you sure you want to remove this diary from your hotlist?
Are you sure you want to remove your recommendation? You can only recommend a diary once, so you will not be able to re-recommend it afterwards.
Rescue this diary, and add a note:
Are you sure you want to remove this diary from Rescue?
Choose where to republish this diary. The diary will be added to the queue for that group. Publish it from the queue to make it appear.

You must be a member of a group to use this feature.

Add a quick update to your diary without changing the diary itself:
Are you sure you want to remove this diary?
(The diary will be removed from the site and returned to your drafts for further editing.)
(The diary will be removed.)
Are you sure you want to save these changes to the published diary?

Comment Preferences

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site