Operation Metal Gear
This operation stems from a string of leaked HBGary emails wherein a company by the name of Booz Allen Hamilton, in direct contact with Aaron Barr, is believed to have bid on and successfully won the contract to develop an unnamed software from the US Air Force. This software will be known as „Metal Gear“ for informational purposes.
We believe that Metal Gear involves an army of fake cyber personalities immersed in social networking websites for the purposes of manipulating the mass population via influence, crawling information from major online communities (such as Facebook), and identifying anonymous personalities via correlating stored information from multiple sources to establish connections between separate online accounts, using this information to arrest dissidents and activists who work anonymously.
The primary goal of this operation is to find out exactly what metal gear is and why they are developing it.
What is ‚Metal Gear‘ ?
We codenamed the software that we believe Booz Allen Hamilton and some of their partners are working on.
The nature of the software is partially known, from the documents that we have seen and from what some employees have said it is a software that would allow a single agent to command an ‚army‘ of sockpuppet accounts on social networking mediums. It is sophisticated enough to develop a ‚profile‘ for each puppet to add a level of ‚realism‘ to each. In short, there would be no fesiable way to distinguish between 100 people commenting on a subject, and 100 of these puppets doing the same.
This is nothing new for those of us familiar with how the net works. However, given recent events across the world, the idea behind Metal Gear seems to be ‚weaponizing‘ sockpuppets, in order to influence the face of revolutions that are based within social networking sites.
;What you see below is the actual document we used under the investigation (which is still going) so there may be some random notes and other weird things that we haven’t removed yet.
;If there is something you can’t understand, please contact us in #OpMetalGear on IRC.
;For reporters/press, join #reporter
Audio recording of our announcement (16th of March 2011)
IBM Corporation 3901 S. Miami Blvd
Durham, NC 27703-9315, USA
HOLMAN IP LAW / IBM RSW
(This is the profile for Holman IP Law. It is no longer active.)
(These are profiles of Jeff Holman, formerly of Holman IP law, now with a firm called WH&H. Same person.)
(IBM RSW is believed to be an IBM office near the SW Regional Airport in Florida.)
4037 Del Prado Boulevard South, Cape Coral, FL
Patent application number: 20090313274
ALSO WORTH LOOKING INTO;
Meeting/training class between NSA, USAF, HBGary, Booz Allen & other various sec companies
Note: Why are the exact same companies that are intrested in Metal Gear have a seminar about a malware analyzing software?
The purpose of the meeting/thing was to school them in Responder Pro
Phil Wallisch was the instructor.
Dox of guys in the meeting
Booz Allen Hamilton
Here’s the list of folks who will be attending ‚class‘:
Protip: call these people, ask them about Metal Gear, ask them about the air force, NSA, USAF, Aaron Barr. Get them worried, get them talking.
Keesok Han USAF Keesook.Han@rl.af.mil
DEPARTMENT OF FUCKING HOMELAND SECURITY
<- whitepages say 3 or less with this name, it may also be Kesook, misspelt on purpose?
Jose Faura NSA NTOC firstname.lastname@example.org
Zane Lackey iSEC Partners email@example.com
Have written book about :
H.323 Attack And IAX Attacks
Txt msg attacks
Scott Brown NSA – Blue Team firstname.lastname@example.org
> Scott K. Brown
> Technical Director
> NSA Blue Team
> (410) 854-6529
George Peslis DISA email@example.com
Jimmy Lloyd DISA James.Lloyd@disa.mil
Eric Potter DISA Eric.Potter@disa.mil
Phil Geneste BAH firstname.lastname@example.org
Patrick Upatham Verdasys email@example.com
Security Solutions Manager
Mobile: +1 339.222.4022
David Black IBM firstname.lastname@example.org
Emergency Response Service
IBM Security Services
Kansas City, Missouri USA
Office: (+001) 816-525-5494
Tim Sherald DISA email@example.com
> Tim Sherald
> Computer Scientist
> DISA FSO – IRRT (FS42)
> Comm: 717-267-9370
> DSN: 570-9370
> Cell: 717-414-3450
Christina Smyre NSA firstname.lastname@example.org
John Laliberte NSA
AAPC G-PPE Task Force Members <—-
Eric Potter brought us to that link <- check it out
Diese(s) Werk bzw. Inhalt von sem steht unter einer Creative Commons Namensnennung-Weitergabe unter gleichen Bedingungen 3.0 Unported Lizenz.
Beruht auf einem Inhalt unter anonnews.org.