Here's a story, that like me, you may have mentally filed as "Learn about Later" ...
Well Today, is 'Later' .... for me, anyways. Takes a few minutes, you may be surprised ...
Despite Denials, New Emails Suggest US Chamber Was Aware Of Private Security Firms' Espionage Work
by Scott Keyes, thinkprogress.org -- on Feb 14th, 2011
[...]
As ThinkProgress laid out last week, the lobbying law firm Hunton & Williams (H&W) served as the go-between for the Chamber and three private security firms — HBGary, Palantir, and Berico Technologies — who were collectively known as "Team Themis." Emails indicate that three top lawyers at Hunton & Williams — John Woods, Bob Quackenboss, and Richard Wyatt — met on multiple occasions with the Chamber in order to brief them on Team Themis's proposals.
[...]
American Chamber of Commerce's Dirty Tricks Plan Leaked by Anonymous
sixthestate.net -- February 12th, 2011
[...]
According to coverage at Firedoglake, last November HBGary, Palantir, and Berico Technologies also put together a plan to work for the U.S. Chamber of Commerce, with the Hunton & Williams law firm acting as an intermediary, presumably for plausible deniability. [Aaron] Barr put together some initial background information on connections between Chamber Watch and the labour movement as part of a proposal for a longer-term intelligence contract, pulling in $250,000-$300,000 per month from the Chamber of Commerce, presumably with the intention of monitoring connections between union officials and Chamber of Commerce critics. Together, these companies referred to themselves as THEMIS.
The initial THEMIS plan, dated November 15, divided work into a preliminary Phase I (cost: $200,000) and a full-scale Phase II (cost: $2 million). The first phase was just getting things moving and performing some preliminary estimates, like preparing "target folders" against the "Top 10" critics of the Chamber of Commerce.
[...]
Think Progress suggest Barr began assembling the "target folders," including pictures and personal information of the family members of staffers at the labour groups and anti-Chamber of Commerce groups.
Isn't this what in other contexts, would be called an "Enemies List" ?
Hello Big Brother ... It must finally be "1984", as Orwell predicted ... just a few decades late ...
Of course, our dedicated staff at dailykos was covering the 'Team Themis' -- Chamber of Commerce cyber-spying story, even as the story was breaking, a few months ago. Here are a few snippets of their fine analysis ...
Chamber lobbyist says 'all options on the table' in fight against Obama to keep funding secret
by Meteor Blades for Daily Kos -- Apr 27, 2011
Whatever the mission statement on the wall at Chamber headquarters says in addition to profits over people, the organization's main objective at the moment seems to be burying Americans deep in disinformation. Anything that stands even slightly in the way of that, as the executive order on transparency would do, is bound to be included in that disinformation campaign. Nothing is more inimical to the Chamber's long-term goals than allowing rank-and-file Americans know who is behind so many of the lies of its members. Like the ones about climate change that keep the nation scurrying headlong down a dead-end path.
{ ... Speaking of Transparency -- This just in ... on May 06, 2011 -- FoxNews.com ...}
GOP Warns Obama Not to Issue Executive Order for Government Contractors
Republicans are warning President Obama not to issue an executive order that would require government contractors to disclose their political donations.
And this ... from another early reporter of the 'Team Themis' story ...
HBGary, Themis, bloggers, and traditional media: What a tangled Web
by Joan McCarter for Daily Kos -- Feb 15, 2011
[...] it's a fascinating story, and not just a little disquieting. The Chamber of Commerce, of course, denies any involvement in the scheme, claiming "that HBGary's proposal 'was never discussed with anyone at the Chamber' and that 'the Chamber was not aware of these proposals until HBGary's e-mails leaked.'"
[ leaked emails ...]
And this is just from a small portion of the e-mails that have been read so far. The possibility of the damaging revelations to still come as the e-mails are sifted through seem limitless. But one important revelation to come out so far isn't necessarily that damaging to either the Chamber or BOA or Hunton Williams as much as it is to traditional media. This is revealed in the PowerPoint one of Team Themis -- Palantir -- created referencing Glenn Greenwald [...]
Here's another PowerPoint explaining "the technology capabilities" that Team Themis, can bring to YOUR Corporate Organization:
Corporate Information Reconnaissance Cell
(pdf)
Team Themis
Purpose:
Develop a corporate information reconnaissance service to aid legal investigations through the open source collection of information on target groups and individuals that appear organized to extort specific concessions through online slander campaigns.
Solution:
Develop collection solutions for information on individuals and groups of interest
-- Standardize and store information in common DB for structured analysis
-- Analyze digital artifacts and social links within common visual framework
-- Report correlated information in individual and organizational profiles
[...]
'Online Slander' ??? ... like, "The Chamber supports the Off-shoring of American Jobs." ???
[by jamess -- 10/13/2010]
Simply Slanderous!
Here's the Sales Pitch that 'Team Themis' gives to its Corporate clients -- The same "Information Reconnaissance" Plan, which as the leaked emails confirm, the Chamber of Commerce was in the midst of implementing, when this very detailed "ChamberLeaks Scandal" broke ... forcing the Chamber's many adamant denials ... They know NOTHING!
"Pay no attention, to those Social Media 'infiltrators', behind that invisible Internet curtain ..."
Corporate Information Reconnaissance Cell (pdf)
November 3, 2010
Berico Technologies, LLC
HBGary Federal, LLC
HBGary Federal, LLC
Submitted to:
Hunton and Williams, LLP
Berico Technologies -- Be Smarter. Be Faster.
Corporate Information Reconnaissance Cell
Hunton & Williams, LLP
[Pg 2]
Background
Internet based communications, most predominately the growing spectrum of social media platforms, allow people to coordinate and communicate in a highly efficient and collaborative manner, even when vastly geographically distributed. These same services and technologies can also make it difficult to attribute information to specific entities. Anonymizing and misattribution technologies used to mask location and identity have become commonplace. In many cases, people and/or organizations use the inherent insecurity in Internet communications to conduct criminal or unethical activities. This represents a paradigm shift in the capability of individuals and small groups to conduct effective planning and execution of asymmetric operations and campaigns that can have major impacts on large organizations or corporations.
[...]
[Pg 5]
Data Collection
Team Themis consistently uses a combination of open source tools and data subscriptions combined with custom data collectors and pre-processors. Our unique methodology for collection is tailored for the social media environment; an iterative process of traditional data collection and social media link and artifact collection and analysis that allows us to link information correlations.
[...]
Primary information resources:
1. Background Checks
2. LexisNexis
3. LinkedIn
4. Facebook
5. Twitter
7. Other social media and location services
6. Subject specific sites, blogs, and forums
7. Well crafted search queries to search for digital artifacts
8. Other digital information discovered or given access to during the investigation
Social media encompasses vast amounts of information, much of it potentially ambiguous, so comparative analysis between information sources is key to derive accurate intelligence. The key to successful open source Intelligence, Surveillance, and Reconnaissance (ISR) is to iterate that would not otherwise be apparent. through the lifecycle quickly and accurately for as much complete data collection as possible. We have significant experience in this type of analysis and our methodology has proven out in real operations.
If/when Hunston & Williams LLP needs or desires web-content production, Team Themis will create realistic, useable web content to engage specific audiences for the purpose of gathering relevant, in-depth information. Direct target engagement can provide valuable information that cannot be acquired through other means: the detailed, focused task encompasses persona creation, [...]
[Pg 6]
Data Integration
Team Themis developers and engineers will leverage their extensive knowledge of Palantir's development and data integration environments to integrate all relevant data in one single, robust analytics layer. All of the data collected will be integrated seamlessly into the Palantir analysis framework to enhance link and artifact analysis. The platform's powerful approach to data integration will enable enterprises to unify data schemas, thus allowing analysts to depict and query otherwise disparate pieces of information in a secure and collaborative environment. Thanks to Palantir's sophisticated data integration capabilities, analysts within the CIRC will also be able to ingest both structured and unstructured data and perform real-time entity resolution against user-defined criteria on the fly, culminating with the fusion of multiple data sources and enrichment of single-source data feeds.
Palantir's open and dynamic ontology capability will provide Hunton & Williams LLP the flexibility to store and contextualize all types of data for analysis. Team Themis will work closely with the customer to conceptualize and implement a tailored ontology that considers the specific problem set and maps data into human-oriented models – this approach will drive effective decisionmaking grounded in deep understanding.
By providing high-value context and data enrichment, analysts will be empowered to develop robust link analysis between people, organizations, and/or other digital artifacts that will begin to form trends and allow statistical analysis. Team Themis will also develop specific helpers to further automate some data ingestion from commercial data sources as well as social media services and Google queries. [...]
[Pg 7]
Leverage the leading analytical platform. Team Themis will utilize the powerful Palantir platform as the centerpiece of the CIRC – empowering our collector/analysts with a cutting-edge analytical capability that enables rapid search and discovery, effective collaboration, and intuitive knowledge management.
Palantir is recognized as the market-leading analytical platform for counter-intelligence (CI), counter-terrorism (CT), counter-narcotics (CN), and counter-proliferation (CP), currently deployed across elements of the intelligence, defense, and law enforcement communities that include SOCOM, DIA, CIA, and JIEDDO. The platform's proven record of success is grounded in the Palantir philosophy of augmenting and empowering analysts with a flexible, intuitive set of tools and capabilities that allow for analysis of data across relational, temporal, and geospatial domains.
Wow! Forget about a Paper Trail -- Beware of your Digit Footprints, just waiting to be collated ... in a far off corporate war room.
Here's the Info Products and Service that 'Team Themis' delivers to its Corporate clients -- for a "small maintenance fee" ...
"Never Forget -- Knowledge is Power ... Does your firm have it?"
Corporate Information Reconnaissance Cell
(pdf)
November 15, 2010
Berico Technologies, LLC
HBGary Federal, LLC
HBGary Federal, LLC
Submitted to:
Hunton and Williams, LLP
Berico Technologies -- Be Smarter. Be Faster.
Corporate Information Reconnaissance Cell
Hunton & Williams, LLP
[Pg 2]
Team Themis Scope of Work
Team Themis will establish and operate a Corporate Information Reconnaissance Cell (CIRC) in order to provide Hunton & Williams, LLC with a full spectrum capability to collect, analyze, and affect adversarial entities and networks of interest. We will accomplish the following tasks in support of this effort:
Phase I (23 NOV 10 – 23 DEC 10)
[...]
Product
Description
Delivery
Intelligence Assessment (written)
Provide overall estimate of adversary composition, key leaders, capabilities, intentions/strategy, courses of actions, strengths/vulnerabilities, etc.
(One time)
Network/Link Analysis (charts/diagrams)
Provide graphic depiction of adversary network(s); highlight key individuals/roles; show relationships and vulnerabilities
(One time)
Target Folders
Develop in-depth target dossiers for key entities and groups; will include key biographic data, relationships, intentions, etc.
(One time – "Top 10" targets)
Phase II (24 DEC 10 – 24 JUN 11)
[...]
Product
Description
Delivery
Intelligence Assessments (written)
Provide overall estimate of adversary composition, key leaders, capabilities, intentions/strategy, courses of actions, strengths/vulnerabilities, etc.
(Weekly and Monthly)
Special Assessments (written)
Provide focused, written assessment based on specific entity, group, or problem set
(As needed -- Significant Event)
Reporting (written)
Provide alerting and rapid analysis of significant events to enable situational awareness
(Daily)
Weekly Update Brief (slideshow)
Provide regular update on analytical findings, new key entities/groups, recommended actions, likely courses of action, etc.
(Weekly)
Network/Link Analysis (charts/diagrams)
Provide graphic depiction of adversary network(s); highlight key individuals/roles; show relationships and vulnerabilities; illustrate network effects based on customer actions
(Weekly)
Target Folders/Target Lists
Develop in-depth target dossiers for key entities and groups; will include key biographic data, relationships, intentions; develop target lists for prioritization of collection and effects
(As required – unlimited)
Indications and Warning (I&W) Reports
Conduct regular monitoring of key targets based on tailored indicators to provide warning/alerting for upcoming events
(Daily)
Predictive Analysis and Pattern Analysis
Leverage cutting-edge analytics to predict upcoming events based on historic trending and detailed knowledge of adversary
(As needed)
Vulnerability Analysis
Conduct detailed study of adversary networks, entities, and methods to identify potential vulnerabilities
(As needed)
Red Team Analysis
Conduct detailed study of friendly (customer) networks, entities, and methods to identify vulnerabilities and mitigate risks
(As needed)
[Pg 3]
Additional Capabilities (as needed)
Team Themis is also able to offer the following additional capabilities related to development and deployment of messaging campaigns to achieve specific objectives. Team Themis has extensive real-world experience conducting complex information operations campaigns. These campaigns typically include many different elements listed below with different messaging goals working towards larger objectives.
Product
Description
Delivery
Personas
Provide persona development and maintenance to effectively execute active message delivery.
(As Needed)
Landing Pages
Develop and maintain blogs, Facebook, twitter, or other web services to provide relevant consistent content to engage target audiences.
(As Needed)
Animated Content
Video and audio productions to deliver tailored messages.
(As Needed)
Mobile Applications
Information distribution and consumer engagement on mobile devices.
(As Needed)
Forensic Analysis
Conduct forensic analysis of media and software; potentially associate developed media with entities/groups
(As Needed)
Other Interactive Content
Design, develop, and deploy any means of new media content for purposes of satisfying mission requirements.
(As Needed)
[Pg 4]
Cost Proposal
Item
Provider
Cost (monthly)
Phase I
Palantir Software Licenses/Services
Palantir
$100,000
Project Management/Analysis/Engineering Services
Berico
$50,000
Collection/Engineering/Analysis Support/Development Services
HBGary
$50,000
Total $200,000 [one time -- intro cost]
Phase II
Palantir Software Licenses/Services
Palantir
$800,000 (monthly)
Project Management/Analysis/Engineering Services
Berico
$600,000 (monthly)
Collection/Engineering/Analysis Support/Development Services
HBGary
$600,000 (monthly)
Total $2,000,000 (monthly)
Keeping tabs on your Political Enemies -- Priceless!
Scratch that -- All for the mere price of $2 Million Dollars a Month!
-- Isn't the 'Citizen United' decision empowering -- for Corporate players, that is?
Why doesn't Congress look into this? Good Question. Why indeed?
Rep. Johnson seeks intelligence firms' contracts in ChamberLeaks scandal
hankjohnson.house.gov -- March 28, 2011
Congressman writes Gates, Holder and Clapper; says he will lead investigation himself if necessary
WASHINGTON, D.C. -- Congressman Hank Johnson (D-GA-04) has requested that the Department of Defense, Department of Justice, and Director of National Intelligence turn over to Congress all contracts with intelligence firms HBGary Federal, Palantir Technologies, and Berico Technologies.
Rep. Johnson has led calls for a formal Congressional probe into allegations that the contractors conspired to use intelligence and counterterrorism tools to attack U.S. citizens. "We need aggressive action to defend American citizens in the cyber domain," said Johnson. "This scandal cries out for a full investigation. I'll do it myself if I have to."
Bush Administration counterterrorism and cybersecurity chief Richard Clarke speculated in an interview with ThinkProgress last week that the private use of cyberwarfare tools against U.S. citizens would constitute a criminal offense. "I think it's a violation of 10USC," said Clarke. "I think it's a felony, and I think they should go to jail."
I checked the good Congressman's public website, but I don't think Rep Hank Johnson, has gotten any significant replies to his letters of outrage, just yet ...
Perhaps there has not been enough Citizen's Outrage accompanying it?
Joan McCarter gives her assessment of the ChamberLeaks stonewalling ... and the chances for a real investigation ... it kind of figures ...
Richard Clarke: U.S. Chamber committed felony in ChamberLeaks scandal
by Joan McCarter for Daily Kos -- Mar 24, 2011
A number of lawmakers have called for an investigation of the Chamber over its probably illegal activities, and Rep. Hank Johnson (D-GA) has requested documents from the NSA and Defense Department detailing their contracts with Berico and HBGary, the firms implicated in the scandal. It seems unlikely that any House committee controlled by the GOP would want to investigate. That would leave it the Justice Department.
Hey Eric Holder, are you listening? Are you scanning THIS Social Network?
IF SO, Here's a good recap on how the US Chamber has been planning to defeat US Unions ... the last bastion of the People, standing between Us and complete Corporate Takeover:
ChamberLeaks Timeline
by Brad Johnson, ThinkProgress -- February 16, 2011
Original reporting by ThinkProgress revealed that Hunton & Williams, a corporate law firm representing the U.S. Chamber of Commerce, conspired with set of private security companies and lobbying firms to undermine the political opponents of the Chamber with a surreptitious sabotage campaign.
[...]
Below [see link above] is a detailed timeline of the conspiracy to launch a dirty-tricks campaign against labor unions, progressive organizations, and journalists who have challenged the U.S. Chamber of Commerce's right-wing agenda.
Here's a reason WHY we should all be a bit more informed, and a bit more outraged, about all these disturbing ChamberLeaks implications, (no matter how the story first broke) ...
The horrible events of 9-11-2001 has caused a lingering National Stupor ... it is long past time we awoke from that deep sleep,
and return to some of our "core values", long cherished by Americans ... of generations gone by ... including this very simple one:
U.S. Constitution - Amendment 4
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
May those words, and those principles, once again be true in America, someday soon ...
perhaps today is that day -- given recent 9-11 Chapter Closing events ... may we soon reach that season, where real change and real National Healing might begin, in earnest ...