You are hereThink Progress: ChamberLeaks: Plan Solicited by Chamber Lawyers Included malware Hacking of Activist Computers

Think Progress: ChamberLeaks: Plan Solicited by Chamber Lawyers Included malware Hacking of Activist Computers


February 17, 2011- Last Thursday, ThinkProgress revealed that lawyers representing the U.S. Chamber of Commerce, one of the most powerful trade associations for large corporations like ExxonMobil and CitiGroup, had solicited a proposal from a set of military contractors to develop a surreptitious campaign to attack the Chamber’s political opponents, including ThinkProgress, the Change to Win labor coalition, SEIU, StopTheChamber.com, MoveOn.org and others. The lawyers from the Chamber’s longtime law firm Hunton and Williams had been compiling their own data set on some of these targets. However, the lawyers sought the military contractors for assistance.

As ThinkProgress has reported, the proposals — created by military contractors Palantir, Berico Technologies, and HB Gary Federal, collectively known as “Team Themis” — were discussed at length with the Chamber’s lawyers over the course of several months starting in October of 2010. The core proposals called for snooping on the families of progressive activists, creating phony identities to penetrate progressive organizations, creating bots to “scrape” social media for information, and submitting fake documents to Chamber opponents as a false flag trick to discredit progressive organizations.

In addition to the Team Themis plans that ThinkProgress and other outlets have reported on, a closer look at the proposals show that the firms had planned to use exploits to steal information from the Chamber’s opponents, or worse. On November 2, HB Gary Federal executive Aaron Barr sent John Woods, a lawyer at Hunton and Williams representing the Chamber, two documents discussing tactics for assisting the Chamber (view the e-mail here). One presentation (click here to download) boasted of HBGary Federal’s capabilities in “Information Operations,” a military contractor term for offensive data extraction techniques typically reserved for use against terrorist groups. The slide includes sections on “Vulnerability Research/Exploit Development” and “Malware Analysis and Reverse Engineering.” View a screenshot below:

HBGary, the parent company of HBGary Federal, specializes in analyzing “malware,” computer viruses that are used to maliciously steal data from computers or networks. In other presentations, Barr makes clear that his expertise in “Information Operations” covers forms of hacking like a “computer network attack,” “custom malware development,” and “persistent software implants.” The presentation shows Barr boasting that he had knowledge of using “zero day” attacks to exploit vulnerabilities in Flash, Java, Windows 2000 and other programs to steal data from a target’s computer.

Indeed, malware hacking appears to be a key service sold by HBGary Federal. Describing a “spear phishing” strategy (an illegal form of hacking), Barr advised his colleague Greg Hoglund that “We should have a capability to do this to our adversaries.” In another e-mail chain, HB Gary Federal executives discuss using a fake “patriotic video of our soldiers overseas” to induce military officials to open malicious data extraction viruses. In September, HGGary executives again contemplate their success of a dummy “evite” e-mail used to maliciously hack target computers.

FULL STORY HERE:

Partners

Backbone Campaign
ReclaimDemocracy.org
ProsperityAgenda.us
Liberty Tree
Democrats.com
Progressive Democrats of America
AfterDowningStreet
Peoples Email Network
Justice Through Music
ePluribusMedia
Locust Fork Journal
Berkeley Fellowship UU\'s Social Justice Committee
BuzzFlash
The Smirking Chimp
Progressive Democrats Sonoma County
BanksterUSA
Center for Media and Democracy
Chelsea Neighbors United
Atlanta Progressive News
Yes Men
No Nukes North
ProsecuteThemNow.com