Rahul Sharma (Editor)

TrapWire

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit
Founded
  
2004

Trapwire linked company targets occupiers


TrapWire is a counter-terrorism technology company that produces a homonymous predictive software system designed to find patterns indicative of terrorist attacks.

Contents

Trapwire linked company targets occupiers youtube


History

The company was named in August 2012, through the WikiLeaks releases, as a source of software that facilitates intelligence-gathering on U.S. and global citizens, using surveillance technology, incident reports from citizens, and data correlation for local police and law enforcement agencies.

Details about the program emerged in 2011, after Stratfor's emails were hacked and released. According to a report by Russia Today, a network of surveillance cameras was installed "In major American cities at selected high value targets (HVTs) and has appeared abroad as well." A software program analyzes the images to detect "suspicious" behavior. The program is reported to be a joint effort by Stratfor and Abraxas Corp (VA), but following an ownership change, Abraxas has no involvement in the technology venture. The report also refers to a 2006 article in which then-current Abraxas Vice President R. Daniel Botsch outlined TrapWire's capabilities:

Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with the law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.

In one leaked email, Stratfor vice president Fred Burton stated TrapWire is in place at every high-value target in New York City, Washington, D.C, and Los Angeles, as well as London and Ottawa.

System description

TrapWire is registered as a trademark with the United States Patent and Trademark Office. In the submitted document, the system is described in detail. The assumption is that terrorists are vulnerable due to their need to conduct pre-attack surveillance, "such as photographing, measuring and signaling". Such suspicious activities, as detected in imagery from Pan–tilt–zoom cameras or human reports, are entered into a database, using a "10-characteristic description of individuals" or vehicle information. The data is correlated across the network, claiming a "network effect" of increased security due to this correlation. The result is a TrapWire Threat Meter (TIM) level which may be monitored by security personnel. The system distinguishes threat and vulnerability information; the latter is not shared through the network.

Reaction

Chief NYPD spokesperson Paul J. Browne denied that the department used TrapWire. The company's particular "intelligence for hire" methods have been characterized as "noting sleeze, rather than surveillance", although TrapWire has been characterized as being a data-mining company. WikiLeaks suffered DDoS attacks of over 10GB/sec for several days on its main domains, with mirrored supporter sites receiving up to 40GB/sec at times. "Trapwire" topped the trending topics on Twitter. The leaked documentation promptly became available via a number of mirror sites and on the anonymity network Tor. The story raised concerns about the surveillance-industrial complex vis-à-vis civil liberties.

Starting August 2012, Anonymous launched a campaign of popular education (named #OpTrapWire). In September 2012, the group changed the operation's name to #OpBigBrother, #IDP13 and #optinfoilhat in response to the development of other similar mass surveillance systems in other countries or locations. Several days of "International day for privacy" have been organized (for example February 23, 2013).

References

TrapWire Wikipedia