A recent Wikileaks announcement that Anonymous had hacked the email account of the Texas based company Stratfor, and the information obtained about the TrapWire company and system has privacy activists up in arms. It seems that TrapWire has been operating under the radar for some time now, and has managed to get their system plugged into many public and private closed circuit and passive monitoring systems. The hacked emails give some detail that hasn’t been obtainable up to this point, but in total they outline a system that could potentially become the worlds largest surveillance program.

A Little About The TrapWire Company

Originally the company TrapWire was the brainchild of the company Abraxas, but has since been cut loose to tread water as it’s own entity. The upper levels of management is comprised mainly of ex-CIA, and other intelligence agents that have retired, this may account in part to their success in keeping a public company so secret. It was immediately apparent that the upper levels weren’t happy about the breach, as the Wikileaks website experienced massive Denial of Service attacks in an attempt to take them off line. Also, Anonymous is gearing up to retaliate with their own attack on the TrapWire website.

A Little About TrapWire The Program

The system looks for signs of terrorist or criminal activities. TrapWire incorporates into virtually any CCTV system, and works by taking snapshots at specific intervals that are uploaded to a central database server. Once there it is analyzed for signs of pre-operational activities. Things like measuring, picture taking, and other scouting activities are considered red flags. The ultimate goal being heading off terrorist and criminal threats through predictive examination and methodology.

No Place To Run, No Where To Hide

With the government monitoring virtually every phone call through the use of FISA and the NSA, and increased efforts to gain access to internet communications without warrants, it is a sure bet that everything you do, the government knows. Internet denizens wanting privacy have increasingly turned to cloaking software like TOR, proxies, and VPNs. Many are saying that this is the only way to be guaranteed any measure of privacy. VPNs and the like provide an encrypted “tunnel” for the communications to take place in, and in some cases will further ensure privacy by encrypting the payload being transported. As private locations become scarcer, it is a sure bet that these cloaking softwares will become even more popular.