• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Bank of America using Private Intel Firms to Attack Wikileaks

†††††

Alfrescian
Loyal
Joined
Jan 23, 2010
Messages
1,746
Points
0
http://213.251.145.96/IMG/pdf/WikiLeaks_Response_v6.pdf
Original document converted to PDF (4.5MB)

Bank of America using Private Intel Firms to Attack Wikileaks
2011-02-09

In a document titled "The WikiLeaks Threat" three data intelligence companies, Plantir Technologies, HBGary Federal and Berico Technologies, outline a plan to attack Wikileaks. They are acting upon request from Hunton and Williams, a law firm working for Bank of America. The Department of Justice recommended the law firm to Bank of America according to an article in The Tech Herald. The prosed attacks on WikiLeaks according to the slides include these actions:

* Feed the fuel between the feuding groups. Disinformation. Create messages around actions of sabotage or discredit the opposing organizations. Submit fake documents and then call out the error.
* Create concern over the security of the infrastructure. Create exposure stories. If the process is believed not to be secure they are done.
* Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the servers are now in Sweden and France putting a team together to get access is more straightforward.
* Media campaign to push the radial and reckless nature of WikiLeaks activities. Sustain pressure. Does nothing for the fanatics, but creates concern and doubt among moderates.
* Search for leaks. Use social media to profile and identify risky behavior of employees.
 
Back
Top