Trapwire: Big Brother Now Monitors Your Every Move
The latest Wikileaks data-dump reveals that the government now has the ability to grab video from far-flung surveillance cameras located in stores, casinos and other businesses around the country. It uses sophisticated facial recognition software to identify people of interest captured by the ubiquitous cameras numbering in the millions.
The software, Trapwire, is a significant breakthrough for the surveillance state. It was uncovered by security researcher Justin Ferguson. He delved into the massive pile of emails hacked from Stratfor – regarded as a shadow CIA – on Christmas of 2011. In response to Ferguson’s discovery and the Trapwire revelation, Wikileaks was recently hit with a large scale distributed denial-of-service (DDoS) attack.
“Trapwire would make something like disclosure of UFO contact or imminent failure of a major U.S. bank fairly boring news by comparison,” writes David Seaman.
“Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence,” RT reported last week. “It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.”
According to the RT report, Trapwire is now in place in major cities in the United States and abroad. It is being used by law enforcement:
The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the “See Something, Say Something” program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.
Read the full article at: infowars.com
Stratfor emails reveal secret, widespread TrapWire surveillance system
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.
Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.
The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.
Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.
On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.
Read the full article at: rt.com
TrapWire Pre-Attack Operations Course
The Terrorist Pre-Attack Operations Course (TPOC) is a three-hour training workshop designed for law enforcement, military, security, and any other personnel who may be in a position to observe and report suspicious activity. The workshop will enhance their overall security awareness and improve their understanding of terrorist and criminal pre-attack surveillance and intelligence collection operations against a selected target. They will learn how to counter terrorist pre-attack operations by taking advantage of the "Terrorist’s Vulnerability" and gain an understanding of the "TrapWire Paradigm Shift".
RedIce Ed Note: At the time of this posting, both Abraxas Corp site and WikiLeaks site are down. Also, Trapwire’s ’leadership team’ info has been scrubbed from the Trapwire.com site.