ChamberLeaks: Plan Solicited By Chamber Lawyers Included Malware Hacking Of Activist Computers (via ThinkProgress)

The Chamber of Commerce and I do not agree on many issues ranging from outsourcing to taxes to mortgage foreclosures to financial regulations. That would probably make me in the Chamber’s judgment an “activist.” At this time, I am a very small player but that might change. But I am hardly worth a cyber attack at this time. However, I am concerned about this because against this kind of firepower, I’m a duck in a shooting gallery.

What’s more, I have complete and total confidence that federal, state and local law enforcement will have no interest in protecting my rights, my web site or my right to free speech. Those things are so “passe.”

James Pilant

From the article

HBGary, the parent company of HBGary Federal, specializes in analyzing “malware,” computer viruses that are used to maliciously steal data from computers or networks. In other presentations, Barr makes clear that his expertise in “Information Operations” covers forms of hacking like a “computer network attack,” “custom malware development,” and “persistent software implants.” The presentation shows Barr boasting that he had knowledge of using “zero day” attacks to exploit vulnerabilities in Flash, Java, Windows 2000 and other programs to steal data from a target’s computer.

Indeed, malware hacking appears to be a key service sold by HBGary Federal. Describing a “spear phishing” strategy (an illegal form of hacking), Barr advised his colleague Greg Hoglund that “We should have a capability to do this to our adversaries.” In another e-mail chain, HBGary Federal executives discuss using a fake “patriotic video of our soldiers overseas” to induce military officials to open malicious data extraction viruses. In September, HBGary Federal executives again contemplate their success of a dummy “evite” e-mail used to maliciously hack target computers.

Some of the initial e-mails discussing the Chamber deal with Team Themis stress the fact that HBGary Federal would provide “expertise on ‘digital intellgence collection’ and social media exploitation.’”

Barr also sent another document to the Chamber’s attorney describing in greater detail Team Themis’ hacking abilities (download a copy here). In one section, Team Themis claims that “if/when Hunton & Williams LLP needs or desire,” they can use “direct engagement” to “provide valuable information that cannot be acquired through other means.” This cryptic pledge appears to be in reference to same malware data intrusion techniques proposed in the other Team Themis documents.

(Generally, I pull links out of any quoted material but these are so useful, I decided to leave them in.)