• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 

Critical Sudo bugs expose major Linux distros to local Root exploits

 | 

Google fined $314M for misusing idle Android users' data

 | 

A flaw in Catwatchful spyware exposed logins of +62,000 users

 | 

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 

Europol shuts down Archetyp Market, longest-running dark web drug marketplace

 | 

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

 | 

Cisco removed the backdoor account from its Unified Communications Manager

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Security
  • #OpTrapWire, Anonymous against surveillance systems

#OpTrapWire, Anonymous against surveillance systems

Pierluigi Paganini August 15, 2012

In this days I have written several times regarding surveillance systems and the huge business around it. Private companies, government agencies and cyber units are all working to develop new tools to spy on wide audience.

This tools are really attractive for those governments that desire to monitor and pursue dissident, in many cases these application arming the hands of the Executioner.

A spyware is a tool and it could be used for good purposes as bad ones, we cannot demonize them, however, we must remain outraged when the companies in the name of money violate all kinds of rules to make profit at the expense of the human rights.

It’s normal at this point that the voice of Anonymous thunder in defense of these rights by bringing the light of the sun a problem that is often shelved for obvious reasons, to talk about certain issues is inconvenient and detrimental to the interests of many.

We are facing with a growing and profitable market that has too much shadow starting from the names of the players that operate on it.

This time Anonymous has started an operation named #opTrapware that targets the massive surveillance project named Trapwire after that WikiLeaks has recently disclosed information regarding a global system of surveillance run by the U.S. government.

On August 12 the group of hacktivist has published on AnonPaste a call to arms in order to “initiate the doom of this evil and misbegotten program (TrapWire).”

Which are the revelation made by Wikileaks?

At the beginning of August Wikileaks published documents related to intelligence firm Stratfor describing the massive electronic spying system run by the U.S. government.

The project is described in a pdf document dated 2007 that introduces the TrapWire as “a unique, predictive software system designed to detect patterns of pre-attack surveillance.”

Representatives of Anonymous sustain that TrapWire is already used in different US cities such as New York, Los Angeles, Las Vegas.

The system appears really complex, to prevent terrorist attacks it use many surveillance  technologies to monitor on ongoing events, a powerful facial recognition combined with an artificial intelligence engine allow to track and monitor any individual in a specific area using images captured from several closed-circuit cameras.

Anonymous despite recognize the anti-terrorism use warns citizens that the system can also be used to provide unprecedented surveillance and data-mining capabilities to governments and corporations.

In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes,

“God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.”

The web site RT.com published

Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.
News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers.

Following some statement from official announce of Anonymous

“The more we learn about TrapWire and similar systems, it becomes absolutely clear that we must at all costs shut this system down and render it useless. A giant AI electronic brain able to monitor us through a combination of access to all the CCTV cameras as well as all the online social media feeds is monstrous and Orwellian in it’s implications and possibilities. The Peoples Liberation Front and Anonymous will now put forth a call to arms, and initiate the doom of this evil and misbegotten program.”

“Operation TrapWire is a direct action of the over-arching Anonymous Operation USA. TrapWire is but one instance of how the government of the USA has turned against it’s own citizens, designating them as suspects and enemies. Now those citizens rise, and take back their country and their freedom. Welcome to the Second American Revolution. “

Actually there is no concrete plan to boicot the system, @Asher_Wolf has already developed and announced a plan to fight TrapWire on the legal and social fronts by, for instance, flooding it with reports of fake suspicious activities,

This is not only the unique option, there is also the possibility of massive DDoS attack against TrapWire’s site.

The real question to solve is

Are we ready to sacrifice our privacy in the name of security?

If so, we must also accept the possibility of “unpleasant” use of our information.

Pierluigi Paganini


facebook linkedin twitter

#opTrapWire Anonymous monitor spyware Stratfor surveillance systems TrapWire Wikileaks

you might also like

Pierluigi Paganini July 09, 2025
Hackers weaponize Shellter red teaming tool to spread infostealers
Read more
Pierluigi Paganini July 08, 2025
Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Hackers weaponize Shellter red teaming tool to spread infostealers

    Malware / July 09, 2025

    Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

    Security / July 08, 2025

    Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

    Intelligence / July 08, 2025

    U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

    Hacking / July 08, 2025

    IT Worker arrested for selling access in $100M PIX cyber heist

    Cyber Crime / July 08, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT