Knowledge (XXG)

TrapWire

Source 📝

290:. In the submitted document, the system is described in detail. The assumption is that terrorists and criminals are vulnerable due to their need to conduct pre-attack surveillance, "such as photographing, measuring and signaling". Such suspicious activities, as detected in imagery or human reports, are entered into a database using a "10-characteristic description of individuals" or vehicle information. The data is correlated across the network, claiming a "network effect" of increased security due to this correlation. The result is a TrapWire Threat Meter (TIM) level which may be monitored by security personnel. The system distinguishes threat and vulnerability information; the latter is not shared through the network. 36: 140: 276:
According to company documents, the first deployment of the TrapWire system appears to have occurred in 2007 and was originally built and deployed to protect US critical infrastructure. The system currently provides physical security and threat detection services to more than 2,000 public and private
298:
TrapWire does not list its clients online; however, a review of publicly available documents indicates the firm's clients include, among others, the US military, state and local law enforcement, Fusion Centers, financial institutions, transportation hubs, energy sites, and the hospitality and gaming
285:
The TrapWire flagship product is a cloud-based threat-detection technology that received US government FedRAMP authorization in 2018. The system provides a common operating platform for analysis and information sharing between various government and private sector entities. TrapWire registered as a
311:. Included in the emails were claims made by Stratfor employees about the size, scope and capability of the TrapWire system. A review of various news, business and social media articles suggests these claims may be overblown. According to the Stratfor emails, TrapWire 498: 483: 277:
sector sites across the US. The system is being used to identify threats ranging from terrorism to organized crime, human trafficking, fraud and crimes against children.
488: 416: 493: 273:
officers in response to the increasing threats posed by terrorist organizations against US targets. Helms is the former head of the C.I.A's European division.
287: 463: 347: 119: 307:
In August 2012, the hack of a US-based company, Stratfor, resulted in more than one million internal Stratfor emails published via
57: 100: 270: 72: 269:
The company was founded in 2004 by Richard "Hollis" Helms as a division of Abraxas Corporation, a company formed by
46: 299:
industry. For example, The Texas Monitor claimed that TrapWire formed an increasing size of contract with Texas.
53: 79: 249:
is an American software and services company focused on risk mitigation and threat detection. Headquartered in
417:"Seven years in, DPS offers no data on whether millions spent on surveillance software is helping fight crime" 316: 254: 86: 319:, incident reports from citizens, and data correlation for local police and law enforcement agencies". 68: 261:
system to help its users find patterns indicative of terrorist attacks and other criminal events.
391: 355: 323: 322:
In one leaked email, Stratfor vice president Fred Burton stated TrapWire is in place at every
453: 383: 93: 477: 326:
in New York City, Washington, D.C., and Los Angeles, as well as London and Ottawa.
35: 192: 395: 359: 457: 308: 139: 312: 258: 250: 17: 315:“facilitates intelligence-gathering on US and global citizens, using 468: 29: 446: 348:"WikiLeaks Stirs Global Fears on Antiterrorist Software" 384:"Trapwire: It's Not the Surveillance, It's the Sleaze" 499:
Information technology companies of the United States
253:, the company blends proprietary analytic tools and 210:
Paul Chadha, Dir. Technology and Product Development
236: 222: 214: 198: 188: 180: 162: 154: 146: 60:. Unsourced material may be challenged and removed. 8: 132: 484:Non-military counterterrorist organizations 138: 131: 288:United States Patent and Trademark Office 206:Michael Maness, Dir. Business Development 120:Learn how and when to remove this message 489:Technology companies established in 2004 494:Security companies of the United States 335: 469:Trapwire and data mining: What we know 27:American software and services company 7: 377: 375: 341: 339: 58:adding citations to reliable sources 218:TrapWire Threat Detection Platform 25: 34: 226:Threat detection and mitigation 45:needs additional citations for 415:Miller, Steve (Nov 22, 2019). 1: 346:Shane, Scott (2012-08-14). 208:Mike Chang, Dir. Operations 168:; 20 years ago 515: 137: 257:to produce a homonymous 317:surveillance technology 255:Artificial Intelligence 228:Surveillance detection 184:Richard "Hollis" Helms 204:Dan Botsch, President 54:improve this article 286:trademark with the 134: 352:The New York Times 230:Threat assessments 421:The Texas Monitor 382:Shachtman, Noah. 324:high-value target 244: 243: 130: 129: 122: 104: 16:(Redirected from 506: 450: 449: 447:Official website 432: 431: 429: 427: 412: 406: 405: 403: 402: 379: 370: 369: 367: 366: 343: 240:www.trapwire.com 176: 174: 169: 142: 135: 125: 118: 114: 111: 105: 103: 62: 38: 30: 21: 514: 513: 509: 508: 507: 505: 504: 503: 474: 473: 445: 444: 441: 436: 435: 425: 423: 414: 413: 409: 400: 398: 381: 380: 373: 364: 362: 345: 344: 337: 332: 305: 296: 283: 267: 231: 229: 227: 209: 207: 205: 201: 172: 170: 167: 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 512: 510: 502: 501: 496: 491: 486: 476: 475: 472: 471: 466: 461: 451: 440: 439:External links 437: 434: 433: 407: 371: 334: 333: 331: 328: 304: 301: 295: 292: 282: 279: 266: 263: 242: 241: 238: 234: 233: 224: 220: 219: 216: 212: 211: 202: 199: 196: 195: 190: 186: 185: 182: 178: 177: 164: 160: 159: 156: 152: 151: 148: 144: 143: 128: 127: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 511: 500: 497: 495: 492: 490: 487: 485: 482: 481: 479: 470: 467: 465: 462: 459: 455: 452: 448: 443: 442: 438: 422: 418: 411: 408: 397: 393: 389: 385: 378: 376: 372: 361: 357: 353: 349: 342: 340: 336: 329: 327: 325: 320: 318: 314: 310: 302: 300: 293: 291: 289: 280: 278: 274: 272: 264: 262: 260: 256: 252: 248: 239: 235: 225: 221: 217: 213: 203: 197: 194: 191: 187: 183: 179: 165: 161: 157: 153: 149: 145: 141: 136: 124: 121: 113: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 424:. Retrieved 420: 410: 399:. Retrieved 387: 363:. Retrieved 351: 321: 306: 297: 284: 275: 268: 246: 245: 189:Headquarters 147:Company type 116: 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 478:Categories 401:2022-09-27 365:2022-09-03 330:References 200:Key people 193:Reston, VA 80:newspapers 69:"TrapWire" 458:WikiLeaks 396:1059-1028 360:0362-4331 309:WikiLeaks 303:Incidents 460:releases 313:software 281:Products 259:software 251:Virginia 247:TrapWire 232:Training 223:Services 215:Products 158:Security 155:Industry 133:Trapwire 110:May 2019 18:Trapwire 454:Summary 294:Clients 265:History 237:Website 181:Founder 171: ( 163:Founded 150:Private 94:scholar 464:Patent 426:Dec 9, 394:  358:  271:C.I.A. 96:  89:  82:  75:  67:  388:Wired 101:JSTOR 87:books 428:2020 392:ISSN 356:ISSN 173:2004 166:2004 73:news 456:of 56:by 480:: 419:. 390:. 386:. 374:^ 354:. 350:. 338:^ 430:. 404:. 368:. 175:) 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Trapwire

verification
improve this article
adding citations to reliable sources
"TrapWire"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

Reston, VA
Virginia
Artificial Intelligence
software
C.I.A.
United States Patent and Trademark Office
WikiLeaks
software
surveillance technology
high-value target


"WikiLeaks Stirs Global Fears on Antiterrorist Software"
ISSN
0362-4331

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.