• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

 | 

Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Security
  • #OpTrapWire, Anonymous against surveillance systems

#OpTrapWire, Anonymous against surveillance systems

Pierluigi Paganini August 15, 2012

In this days I have written several times regarding surveillance systems and the huge business around it. Private companies, government agencies and cyber units are all working to develop new tools to spy on wide audience.

This tools are really attractive for those governments that desire to monitor and pursue dissident, in many cases these application arming the hands of the Executioner.

A spyware is a tool and it could be used for good purposes as bad ones, we cannot demonize them, however, we must remain outraged when the companies in the name of money violate all kinds of rules to make profit at the expense of the human rights.

It’s normal at this point that the voice of Anonymous thunder in defense of these rights by bringing the light of the sun a problem that is often shelved for obvious reasons, to talk about certain issues is inconvenient and detrimental to the interests of many.

We are facing with a growing and profitable market that has too much shadow starting from the names of the players that operate on it.

This time Anonymous has started an operation named #opTrapware that targets the massive surveillance project named Trapwire after that WikiLeaks has recently disclosed information regarding a global system of surveillance run by the U.S. government.

On August 12 the group of hacktivist has published on AnonPaste a call to arms in order to “initiate the doom of this evil and misbegotten program (TrapWire).”

Which are the revelation made by Wikileaks?

At the beginning of August Wikileaks published documents related to intelligence firm Stratfor describing the massive electronic spying system run by the U.S. government.

The project is described in a pdf document dated 2007 that introduces the TrapWire as “a unique, predictive software system designed to detect patterns of pre-attack surveillance.”

Representatives of Anonymous sustain that TrapWire is already used in different US cities such as New York, Los Angeles, Las Vegas.

The system appears really complex, to prevent terrorist attacks it use many surveillance  technologies to monitor on ongoing events, a powerful facial recognition combined with an artificial intelligence engine allow to track and monitor any individual in a specific area using images captured from several closed-circuit cameras.

Anonymous despite recognize the anti-terrorism use warns citizens that the system can also be used to provide unprecedented surveillance and data-mining capabilities to governments and corporations.

In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes,

“God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.”

The web site RT.com published

Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.
News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers.

Following some statement from official announce of Anonymous

“The more we learn about TrapWire and similar systems, it becomes absolutely clear that we must at all costs shut this system down and render it useless. A giant AI electronic brain able to monitor us through a combination of access to all the CCTV cameras as well as all the online social media feeds is monstrous and Orwellian in it’s implications and possibilities. The Peoples Liberation Front and Anonymous will now put forth a call to arms, and initiate the doom of this evil and misbegotten program.”

“Operation TrapWire is a direct action of the over-arching Anonymous Operation USA. TrapWire is but one instance of how the government of the USA has turned against it’s own citizens, designating them as suspects and enemies. Now those citizens rise, and take back their country and their freedom. Welcome to the Second American Revolution. “

Actually there is no concrete plan to boicot the system, @Asher_Wolf has already developed and announced a plan to fight TrapWire on the legal and social fronts by, for instance, flooding it with reports of fake suspicious activities,

This is not only the unique option, there is also the possibility of massive DDoS attack against TrapWire’s site.

The real question to solve is

Are we ready to sacrifice our privacy in the name of security?

If so, we must also accept the possibility of “unpleasant” use of our information.

Pierluigi Paganini


facebook linkedin twitter

#opTrapWire Anonymous monitor spyware Stratfor surveillance systems TrapWire Wikileaks

you might also like

Pierluigi Paganini July 26, 2025
Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme
Read more
Pierluigi Paganini July 25, 2025
Operation CargoTalon targets Russia’s aerospace with EAGLET malware,
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

    Malware / July 27, 2025

    Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / July 27, 2025

    Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

    Cyber Crime / July 26, 2025

    Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

    Intelligence / July 26, 2025

    Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

    Intelligence / July 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT