290:. In the submitted document, the system is described in detail. The assumption is that terrorists and criminals are vulnerable due to their need to conduct pre-attack surveillance, "such as photographing, measuring and signaling". Such suspicious activities, as detected in imagery or human reports, are entered into a database using a "10-characteristic description of individuals" or vehicle information. The data is correlated across the network, claiming a "network effect" of increased security due to this correlation. The result is a TrapWire Threat Meter (TIM) level which may be monitored by security personnel. The system distinguishes threat and vulnerability information; the latter is not shared through the network.
36:
140:
276:
According to company documents, the first deployment of the TrapWire system appears to have occurred in 2007 and was originally built and deployed to protect US critical infrastructure. The system currently provides physical security and threat detection services to more than 2,000 public and private
298:
TrapWire does not list its clients online; however, a review of publicly available documents indicates the firm's clients include, among others, the US military, state and local law enforcement, Fusion
Centers, financial institutions, transportation hubs, energy sites, and the hospitality and gaming
285:
The TrapWire flagship product is a cloud-based threat-detection technology that received US government FedRAMP authorization in 2018. The system provides a common operating platform for analysis and information sharing between various government and private sector entities. TrapWire registered as a
311:. Included in the emails were claims made by Stratfor employees about the size, scope and capability of the TrapWire system. A review of various news, business and social media articles suggests these claims may be overblown. According to the Stratfor emails, TrapWire
498:
483:
277:
sector sites across the US. The system is being used to identify threats ranging from terrorism to organized crime, human trafficking, fraud and crimes against children.
488:
416:
493:
273:
officers in response to the increasing threats posed by terrorist organizations against US targets. Helms is the former head of the C.I.A's
European division.
287:
463:
347:
119:
307:
In August 2012, the hack of a US-based company, Stratfor, resulted in more than one million internal
Stratfor emails published via
57:
100:
270:
72:
269:
The company was founded in 2004 by
Richard "Hollis" Helms as a division of Abraxas Corporation, a company formed by
46:
299:
industry. For example, The Texas
Monitor claimed that TrapWire formed an increasing size of contract with Texas.
53:
79:
249:
is an
American software and services company focused on risk mitigation and threat detection. Headquartered in
417:"Seven years in, DPS offers no data on whether millions spent on surveillance software is helping fight crime"
316:
254:
86:
319:, incident reports from citizens, and data correlation for local police and law enforcement agencies".
68:
261:
system to help its users find patterns indicative of terrorist attacks and other criminal events.
391:
355:
323:
322:
In one leaked email, Stratfor vice president Fred Burton stated TrapWire is in place at every
453:
383:
93:
477:
326:
in New York City, Washington, D.C., and Los
Angeles, as well as London and Ottawa.
35:
192:
395:
359:
457:
308:
139:
312:
258:
250:
17:
315:“facilitates intelligence-gathering on US and global citizens, using
468:
29:
446:
348:"WikiLeaks Stirs Global Fears on Antiterrorist Software"
384:"Trapwire: It's Not the Surveillance, It's the Sleaze"
499:
Information technology companies of the United States
253:, the company blends proprietary analytic tools and
210:
Paul Chadha, Dir. Technology and
Product Development
236:
222:
214:
198:
188:
180:
162:
154:
146:
60:. Unsourced material may be challenged and removed.
8:
132:
484:Non-military counterterrorist organizations
138:
131:
288:United States Patent and Trademark Office
206:Michael Maness, Dir. Business Development
120:Learn how and when to remove this message
489:Technology companies established in 2004
494:Security companies of the United States
335:
469:Trapwire and data mining: What we know
27:American software and services company
7:
377:
375:
341:
339:
58:adding citations to reliable sources
218:TrapWire Threat Detection Platform
25:
34:
226:Threat detection and mitigation
45:needs additional citations for
415:Miller, Steve (Nov 22, 2019).
1:
346:Shane, Scott (2012-08-14).
208:Mike Chang, Dir. Operations
168:; 20 years ago
515:
137:
257:to produce a homonymous
317:surveillance technology
255:Artificial Intelligence
228:Surveillance detection
184:Richard "Hollis" Helms
204:Dan Botsch, President
54:improve this article
286:trademark with the
134:
352:The New York Times
230:Threat assessments
421:The Texas Monitor
382:Shachtman, Noah.
324:high-value target
244:
243:
130:
129:
122:
104:
16:(Redirected from
506:
450:
449:
447:Official website
432:
431:
429:
427:
412:
406:
405:
403:
402:
379:
370:
369:
367:
366:
343:
240:www.trapwire.com
176:
174:
169:
142:
135:
125:
118:
114:
111:
105:
103:
62:
38:
30:
21:
514:
513:
509:
508:
507:
505:
504:
503:
474:
473:
445:
444:
441:
436:
435:
425:
423:
414:
413:
409:
400:
398:
381:
380:
373:
364:
362:
345:
344:
337:
332:
305:
296:
283:
267:
231:
229:
227:
209:
207:
205:
201:
172:
170:
167:
126:
115:
109:
106:
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
512:
510:
502:
501:
496:
491:
486:
476:
475:
472:
471:
466:
461:
451:
440:
439:External links
437:
434:
433:
407:
371:
334:
333:
331:
328:
304:
301:
295:
292:
282:
279:
266:
263:
242:
241:
238:
234:
233:
224:
220:
219:
216:
212:
211:
202:
199:
196:
195:
190:
186:
185:
182:
178:
177:
164:
160:
159:
156:
152:
151:
148:
144:
143:
128:
127:
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
511:
500:
497:
495:
492:
490:
487:
485:
482:
481:
479:
470:
467:
465:
462:
459:
455:
452:
448:
443:
442:
438:
422:
418:
411:
408:
397:
393:
389:
385:
378:
376:
372:
361:
357:
353:
349:
342:
340:
336:
329:
327:
325:
320:
318:
314:
310:
302:
300:
293:
291:
289:
280:
278:
274:
272:
264:
262:
260:
256:
252:
248:
239:
235:
225:
221:
217:
213:
203:
197:
194:
191:
187:
183:
179:
165:
161:
157:
153:
149:
145:
141:
136:
124:
121:
113:
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
43:This article
41:
37:
32:
31:
19:
424:. Retrieved
420:
410:
399:. Retrieved
387:
363:. Retrieved
351:
321:
306:
297:
284:
275:
268:
246:
245:
189:Headquarters
147:Company type
116:
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
478:Categories
401:2022-09-27
365:2022-09-03
330:References
200:Key people
193:Reston, VA
80:newspapers
69:"TrapWire"
458:WikiLeaks
396:1059-1028
360:0362-4331
309:WikiLeaks
303:Incidents
460:releases
313:software
281:Products
259:software
251:Virginia
247:TrapWire
232:Training
223:Services
215:Products
158:Security
155:Industry
133:Trapwire
110:May 2019
18:Trapwire
454:Summary
294:Clients
265:History
237:Website
181:Founder
171: (
163:Founded
150:Private
94:scholar
464:Patent
426:Dec 9,
394:
358:
271:C.I.A.
96:
89:
82:
75:
67:
388:Wired
101:JSTOR
87:books
428:2020
392:ISSN
356:ISSN
173:2004
166:2004
73:news
456:of
56:by
480::
419:.
390:.
386:.
374:^
354:.
350:.
338:^
430:.
404:.
368:.
175:)
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.