Plan solicited by Chamber of Commerce lawyers included malware hacking of activist computers

Posted on  

"Plan solicited by Chamber of Commerce lawyers included malware hacking of activist computers"

This is a TP cross-post.

Last Thursday, ThinkProgress revealed that lawyers representing the U.S. Chamber of Commerce, one of the most powerful trade associations for large corporations like ExxonMobil and CitiGroup, had solicited a proposal from a set of military contractors to develop a surreptitious campaign to attack the Chamber’s political opponents, including ThinkProgress, the Change to Win labor coalition, SEIU, StopTheChamber.com, MoveOn.org, U.S. Chamber Watch and others. The lawyers from the Chamber’s longtime law firm Hunton and Williams had been compiling their own data set on some of these targets. However, the lawyers sought the military contractors for assistance.

As ThinkProgress has reported, the proposals “” created by military contractors Palantir, Berico Technologies, and HBGary Federal, collectively known as “Team Themis” “” were discussed at length with the Chamber’s lawyers over the course of several months starting in October of 2010. The core proposals called for snooping on the families of progressive activists, creating phony identities to penetrate progressive organizations, creating bots to “scrape” social media for information, and submitting fake documents to Chamber opponents as a false flag trick to discredit progressive organizations.

In addition to the Team Themis plans that ThinkProgress and other outlets have reported on, a closer look at the proposals show that the firms had planned to use exploits to steal information from the Chamber’s opponents, or worse. On November 2, HBGary Federal executive Aaron Barr sent John Woods, a lawyer at Hunton and Williams representing the Chamber, two documents discussing tactics for assisting the Chamber (view the e-mail here). One presentation (click here to download) boasted of HBGary Federal’s capabilities in “Information Operations,” a military contractor term for offensive data extraction techniques typically reserved for use against terrorist groups. The slide includes sections on “Vulnerability Research/Exploit Development” and “Malware Analysis and Reverse Engineering.” View a screenshot below:

HBGary, the parent company of HBGary Federal, specializes in analyzing “malware,” computer viruses that are used to maliciously steal data from computers or networks. In other presentations, Barr makes clear that his expertise in “Information Operations” covers forms of hacking like a “computer network attack,” “custom malware development,” and “persistent software implants.” The presentation shows Barr boasting that he had knowledge of using “zero day” attacks to exploit vulnerabilities in Flash, Java, Windows 2000 and other programs to steal data from a target’s computer.

Indeed, malware hacking appears to be a key service sold by HBGary Federal. Describing a “spear phishing” strategy (an illegal form of hacking), Barr advised his colleague Greg Hoglund that “We should have a capability to do this to our adversaries.” In another e-mail chain, HBGary Federal executives discuss using a fake “patriotic video of our soldiers overseas” to induce military officials to open malicious data extraction viruses. In September, HBGary Federal executives again contemplate their success of a dummy “evite” e-mail used to maliciously hack target computers.

Some of the initial e-mails discussing the Chamber deal with Team Themis stress the fact that HBGary Federal would provide “expertise on ‘digital intellgence collection’ and social media exploitation.'”

Barr also sent another document to the Chamber’s attorney describing in greater detail Team Themis’ hacking abilities (download a copy here). In one section, Team Themis claims that “if/when Hunton & Williams LLP needs or desire,” they can use “direct engagement” to “provide valuable information that cannot be acquired through other means.” This cryptic pledge appears to be in reference to same malware data intrusion techniques proposed in the other Team Themis documents. View a screenshot below:

In an e-mail on November 9th, Barr sent Chamber attorney John Woods an e-mail about his data extraction capabilities (view a copy here). Barr had compiled a dossier on a top Chamber attorney, Richard Wyatt, and hoped to use it as an example of what they could do to the Chamber’s adversaries. However, in the e-mail, Barr claimed that he realized that Wyatt’s wife’s computer had core vulnerabilities that could be exploited to gain access to Richard’s personal data. “If I can exploit her account through one of her social connections I can exploit the home network/system,” he wrote. This explains why Team Themis devoted so much time to researching the families and children of progressive activists, to find vulnerabilities in their computer systems.

It should be noted that the Chamber’s attorneys and lobbyists were well aware of Team Themis’ plans. A sample demonstration of Team Themis work had “sold the Chamber” at one point. Throughout the conversations made available by the leaked e-mails, neither the Chamber or its attorneys ever raised ethical complaints.

View a timeline of the ChamberLeaks scandal composed by the Wonk Room’s Brad Johnson here.

– A TP cross-post

« »

9 Responses to Plan solicited by Chamber of Commerce lawyers included malware hacking of activist computers

  1. John McCormick says:

    Where is the US Attorney General on this. A first year law student could likely find grounds for criminal intent.

    John McCormick

  2. Leland Palmer says:

    Yes, and where is the news media, on this story?

    These sort of tactics and fascist intimidation are an attack on the news media as well.

    These same tactics could be used, and likely are being used, against members of the news media whose only crime is telling the truth.

  3. Zetetic says:

    @ John:

    Good question about the US Att. Gen. I’m interested if any of the parties that have been targeted have thought about joining forced to file any sort of action against this kind of behavior.

    Maybe that might spur other agencies into action.

  4. paulm says:

    You just get the feeling that they might have been behind Climate Gate….

  5. Was “Climategate” the first major case of this type of illegal hacking?

    Should the DoJ be issuing indictments?

  6. Well, this “Team Themis” junk is what happens when an entire nation starts thinking that things like justice, human rights, and logic can all be put up for compromise — all be put up for sale — in the service of so-called ‘greater benefits’, and anyone who thinks otherwise is a ‘whiny liberal’.

    Really… When large groups of people start valuing ‘compromise’, ‘bipartisanship’, and ‘political savvy’ over basic human rights and truth, is it any wonder that human rights routinely go to the highest bidder?

    And in such an environment, can one really blame Anonymous for taking the law into their own hands?

    Speak no more of compromise.

    frank

  7. catman306 says:

    The DoJ is quite guilty of selective enforcement. Only prosecute lawbreakers who have the wrong political leanings. Ignore lawbreakers who are furthering the party.

    This is a different ‘nation of laws’ than the one that I had once imagined. Maybe I was younger then. Or maybe things have changed. Or maybe this has been going on since the Sheriff of Knotting-ham.

    Who would want to fight and die in some foreign war for this standard of Justice?

  8. Laurie Dougherty says:

    Shades of COINTELPRO. catman306, in my younger days, the technology was different, but the tactics used against progressives were exactly the same. Back in those days the DOJ, through the agency of the FBI, was the one doing it. I guess everything gets outsourced these days.

    http://en.wikipedia.org/wiki/COINTELPRO

    The struggle continues.

  9. And now, in a facepalm move, Democratic Congressmen somehow think they need to beg Republicans to start investigating these guys:

    http://www.washingtonpost.com/wp-dyn/content/article/2011/02/28/AR2011022805810.html
    http://ijish.livejournal.com/33072.html