Advertisement
Guest User

Untitled

a guest
Apr 2nd, 2011
3,570
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 39.33 KB | None | 0 0
  1.  
  2. http://hbgary.anonleaks.ch/aaron_hbgary_com/9303.html HBGary Federal CEOAaron Barr to Northrop Grumman Senior VP Intelligence Division Tom Conroy 3 Dec 2009
  3.  
  4. ========================================================
  5.  
  6. Tom,
  7.  
  8. First I just have to say...I have not had this much fun since Ted and I were working with you to win Romas and Bluebird. I spent the last few days at the AFCEA solutions conference and had lots of folks, government and industry, wanting to talk with me. HBGary, and this is as unbias as I can make it, has some amazing technology that I think will be very significant in the near future. Their Malware Genome and Digital DNA products are the future of cyber protection, based on behavior and characteristics of malware, and they work. Right now we have a malware genome of 3500 traits/characteristics and it catches 75% of all malware, including zero day attacks.
  9.  
  10. I have been working with Palantir and Xetron to develop this group that is going to try and tackle some bits of Attribution. I received some advise from some NSA folks at the conference to also include Carnegie Melon as they are just starting a similar effort for NSA, so I will reach out to them.
  11.  
  12. Brian Masterson will probably reach out to you for some advice/direction. Xetron is very worried about IS. My EXTERNAL opinion, IS has lost or never had its way for cyber, Xetron is the best thing Northrop has going and they are hungry to make a difference. I told Brian you would be an advocate as much as you could. For that matter, having gone around these last few weeks talking with various companies (GD, SAIC, CSC, Mantech) Northrop is drastically falling behind in cyber. Northrop has hitched its wagon to NCR and TU, both of which are the absolute wrong things to develop a successful cyber strategy on. Just my opinion.
  13.  
  14. I am meeting with Bill Luti Monday morning. I am extremely curious what he wants to talk about, looking forward to it.
  15.  
  16. Aaron
  17.  
  18. ========================================================
  19. http://hbgary.anonleaks.ch/aaron_hbgary_com/5594.html Aaron Barr to John Jolly, cc: Tom Conroy 4 Dec 2009 Note NSA staff member Ralph Denty and possible involvement of Carnegie Mellon developing software for the NSA.
  20.  
  21. ========================================================
  22.  
  23.  
  24.  
  25. John,
  26.  
  27. Not sure if you know, but I am no longer with Northrop. My current position is as CEO of HBGary Federal, a wholly owned subsidiary of HBGary. HBGary builds malware detection and analysis products. Their history is steeped in Forensics, but their recent products and technology roadmap is focused more on malware detection and incident response.
  28.  
  29. Specifically a product launched last spring called Digital DNA and another product launched last month called ReCON. They currently have a malware genome with 3500 traits/characteristics identified. Using their memory capture and analysis tools they look at the function and behavior of software and compare that to the malware genome and attribute a threat score indicating the likely hood of it being malware. Using the genome they are also doing comparisons of malware for authorship identification. I think this has possibilities for attribution if linked with capabilities like Palantir. I am currently in discussions with Palantir to partner on an attribution based capability. Currently we claim 75% identification of zero day malware and believe further build outs of the genome and partnerships with other technologies will get us into the 80-90% range.
  30.  
  31. I spoke to Ralph Denty from NSA cybersecurity operations integration, he is putting me in contact with some folks from Carnegie Melon, who have been recently charted by NSA to look at developing something similar. We also have a current partnership with Mcafee and have integrated Digital DNA into their ePO product which is currently the base for HBSS.
  32.  
  33. My question is is their any interest from a TU perspective, specifically Tutiledge, in including this type of capability? I think there are some longer term efforts on forward deployed systems using this type of methodology that could eventually detect evolutions of attacks and develop defensive capabilities against them before they ever reach you systems.
  34.  
  35. Aaron Barr
  36. CEO
  37. HBGary Federal Inc.
  38.  
  39.  
  40. ========================================================
  41. http://hbgary.anonleaks.ch/aaron_hbgary_com/15025h.html Tom Conroy to Aaron Barr 26 Jan 2010. Note introduction of House staff member Jacob Olcott. Note presence of Endgame Systems, Netwitness, and Splunk in addition to HBGary Federal, Palantir, and Berico.
  42.  
  43. ========================================================
  44.  
  45.  
  46.  
  47.  
  48. It is pretty impressive. Now think of our opponents who are unfettered
  49. by government constraints, and in fact are encouraged to be as
  50. entrepreneurial as they can be. And overlay that with the number of
  51. smart people they have available to advance their cause, combined with
  52. enthusiasm for success unfettered by high expectations of wealth. It's
  53. downright scary. In the long run we'll likely have to make fundamental
  54. changes in the way the internet is implemented to close ALL the
  55. loopholes to hacking, something not likely in our lifetime but essential
  56. to security I would think.
  57.  
  58.  
  59.  
  60. From: Aaron Barr [mailto:aaron@hbgary.com]
  61. Sent: Monday, January 25, 2010 11:38 PM
  62. To: Conroy, Thomas W.
  63. Cc: Barnett, Jim H.
  64. Subject: Fwd: Idea
  65.  
  66.  
  67.  
  68. I love being able to do stuff like this now.
  69.  
  70.  
  71.  
  72. I sent an email back to Jake suggesting that our consortium could be the
  73. fast moving prototype capability to his non-profit. We will see how the
  74. conversation progresses.
  75.  
  76.  
  77.  
  78. Aaron
  79.  
  80.  
  81.  
  82. Begin forwarded message:
  83.  
  84.  
  85.  
  86.  
  87.  
  88. From: "Olcott, Jacob" <Jacob.Olcott@mail.house.gov>
  89.  
  90. Date: January 25, 2010 11:46:15 AM EST
  91.  
  92. To: "Aaron Barr" <aaron@hbgary.com>
  93.  
  94. Subject: RE: Idea
  95.  
  96.  
  97.  
  98. Aaron - sounds cool! We've actually been discussing an approach like
  99. this on the CSIS commission lately (the idea they've been hashing around
  100. is how to achieve greater situational awareness, but they've been
  101. proposing a non-profit agency to allow everyone to access specific
  102. information).
  103. Would like to discuss with you - busy this week and next, but maybe
  104. early Feb?
  105.  
  106. -----Original Message-----
  107. From: Aaron Barr [mailto:aaron@hbgary.com]
  108. Sent: Friday, January 22, 2010 8:49 AM
  109. To: Olcott, Jacob
  110. Subject: Idea
  111.  
  112. Jake,
  113.  
  114.  
  115. I have put together a subset of highly capable companies for the
  116. purposes of improving threat intelligence, believing that we have to
  117. improve our knowledge of the threat before we can improve our security.
  118. Once we have a better threat picture we integrate more
  119. proactive/reactive security capabilities and more effectively manage
  120. enterprise security based on our knowledge of the threat.
  121.  
  122. A good cyber intelligence capability needs to cover and integrate all
  123. areas of cyber: executable, host, network, internet, and social
  124. analysis. These companies represent a best of breed, complete
  125. end-to-end cyber intelligence picture. Using Palantir as the framework
  126. for organizing the data feeds from the other companies and overlaying
  127. that data with other social network analysis.
  128.  
  129. Application - HBGary (automated malware detection based on traits and
  130. code fingerprinting)
  131. Host - Splunk (host based security monitoring)
  132. Network - Netwitness (Network Forensics, full textual analysis)
  133. Internet - EndGames (External network monitoring, botnet C2 monitoring,
  134. zero days)
  135. Social - Palantir (link analysis framework for intelligence)
  136.  
  137. I am bringing these companies together in an consortium, they have all
  138. bought in. Rather than a typical integrator model, keeping the product
  139. companies at arms length, a consortium puts us all on a more level
  140. playing field and forces us to think about the right solution rather
  141. than a particular offering.
  142.  
  143. As we talked about before. There are significant organizational and
  144. contractual impedance's from bringing together the necessary pieces to
  145. enhance our cybersecurity. So it occured to me, why not do for cyber
  146. intelligence what Space-X did for space exploration and satellite
  147. deployments. Forget the bureaucracy, develop the complete solution
  148. externally from the mad house. The individual products from these
  149. companies alone are significant, imagine what can be produced once we
  150. integrate them.
  151.  
  152. What do you think?
  153.  
  154.  
  155.  
  156. ========================================================
  157. http://hbgary.anonleaks.ch/aaron_hbgary_com/6934.html from Northrop Grumman executive Jim Barnett to Aaron Barr 27 Jan 2010. Offer from House staffer Jacob Olcott permitting them to write U.S. cyber security legislation under discussion.
  158.  
  159. ========================================================
  160.  
  161.  
  162. Now that's a trick question...us (assume you mean NGC...no "I" in us) and Aaron? I am not certain those are seperable, good news. But beyond the fun and chaos, I would let Aaron run and not engage NGC...perhaps Jacob has Larry, or Linda, or Kathy, or Tim on his list...but we probably won't hear from them.
  163. What we could do, for NGC, is alert them to the bill and pending action and let the NGC system engage...it's Wednesday and there is an EXCOM tommorrow.
  164. I like Jacobs approach...he is right about the window...thoughts for AAron SEPCOR.
  165.  
  166. ________________________________
  167.  
  168. From: Conroy, Thomas W.
  169. To: 'aaron@hbgary.com' <aaron@hbgary.com>; Barnett, Jim H.
  170. Sent: Wed Jan 27 18:00:55 2010
  171. Subject: Re: Fwd: request for amendments - cyber bill
  172.  
  173.  
  174. Jim -
  175. How do we get the best result from this, both for Aaron and for us?
  176.  
  177.  
  178.  
  179. ________________________________
  180.  
  181. From: Aaron Barr <aaron@hbgary.com>
  182. To: Conroy, Thomas W.; Barnett, Jim H.
  183. Sent: Wed Jan 27 17:55:33 2010
  184. Subject: Fwd: request for amendments - cyber bill
  185.  
  186.  
  187. Wow. Any thoughts? I have some work to do.
  188.  
  189. Aaron
  190.  
  191. From my iPhone
  192.  
  193. Begin forwarded message:
  194.  
  195.  
  196.  
  197. From: "Olcott, Jacob" <Jacob.Olcott@mail.house.gov>
  198. Date: January 27, 2010 6:45:14 PM EST
  199. To: "Olcott, Jacob" <Jacob.Olcott@mail.house.gov>
  200. Subject: request for amendments - cyber bill
  201.  
  202.  
  203.  
  204. One of the interesting things about working for Congress is that you can go long stretches of time where you never seem to have traction on an issue, and then suddenly a window of opportunity presents itself and you have a brief moment to take advantage of it. This is one of those moments for cybersecurity here in the House of Reps.
  205.  
  206.  
  207.  
  208. Several months ago, the Science and Technology Committee marked up a Cyber R&D bill. You can find the bill here: <http://www.rules.house.gov/111/LegText/111_hr4061_txt.pdf> http://www.rules.house.gov/111/LegText/111_hr4061_txt.pdf. As you can tell, this was a fairly noncontroversial bill. The Speaker’s office decided today that they want this bill on the floor next week (likely Wednesday or Thursday).
  209.  
  210.  
  211.  
  212. Here’s how the procedure works. Members are allowed to write amendments to the bill. They submit them to the Rules Committee. On Monday night, the Rules Committee will consider those amendments, and rule them either “in order� or “out of order.� Amendments are supposed to be “germane� to the section of the bill that is being amended (there is a test for this, but basically an amendment has to relate to the subject matter under consideration). Amendments that are ruled “in order� can then be raised by that member on the floor – and put to a vote of the House.
  213.  
  214.  
  215.  
  216. As you can see from the text, the bill contains provisions on R&D, cyber workforce, strategic planning, social and behavioral cyber research, the focus of NSF grants, scholarship for service, NIST research, international standards, identity management, cyber awareness into legislation. Lots of good and interesting subjects that can be improved and enhanced through the amendment process. For those looking for an opportunity, this is a great way to address some of these issues in a bill that will be voted on by the House of Representatives.
  217.  
  218.  
  219.  
  220. Members have already been asking me for amendments, and I am busy drafting. You are a trusted ally, and I would really appreciate if you can take a look at this bill, see if you have some ideas about ways to improve it, and send them to me. Please be creative! I will take your submissions, turn them into amendment language, and send them to members who are interested in amending this bill.
  221.  
  222.  
  223.  
  224. Sorry for the late notice, but I need your proposals by not later than FRIDAY at NOON. If you’re not comfortable drafting an amendment, feel free to submit an “idea� to me and I will do my best to turn it into legislative language that the members can use.
  225.  
  226.  
  227.  
  228. Thanks for your help.
  229.  
  230.  
  231.  
  232. Jake
  233.  
  234.  
  235.  
  236. Jacob Olcott
  237.  
  238. Subcommittee Director and Counsel
  239.  
  240. Emerging Threats, Cybersecurity, S&T Subcommittee
  241.  
  242. Committee on Homeland Security (Majority)
  243.  
  244. 202-226-2623
  245.  
  246. =======================================================
  247. http://hbgary.anonleaks.ch/aaron_hbgary_com/783.html Jim Barnett to Aaron Barr 27 Jan 2010. Discussing how to use access in House via Jacob Olcott to steer earmarks to fund their scheme. Excerpt for brevity
  248.  
  249. =======================================================
  250.  
  251.  
  252. Sure...but you need to think about how you want to "steer" this to an appropriation mark reflective of a members ammendment.
  253. Jacob is pro staff who has the ability to influence members on his committee and specifically sub...review those members and then look for a "constituency angle" and write accordingly.
  254. You can take the "good government" approach but that's too easy.
  255. Let me know if I can help.
  256. Jim
  257.  
  258.  
  259.  
  260. http://hbgary.anonleaks.ch/aaron_hbgary_com/14481h.html Aaron Barr to Tom Conroy 29 Jan 2010. Describing language to be inserted into cybersecurity bill, reference to direct communication with Jacob Olcott included inline.
  261.  
  262. ===============================================================
  263.  
  264. How about carribean breeze.
  265. 4100 N Fairfax Dr
  266. Arlington, VA 22203
  267.  
  268. Aaron
  269.  
  270. From my iPhone
  271.  
  272. On Jan 29, 2010, at 6:38 AM, "Conroy, Thomas W." <Tom.Conroy@ngc.com> wrote:
  273.  
  274. On your way into DARPA today, pick a convenient restaurant and send me a quick email. I'll come to you and that will minimize your time away from the session. And if it looks too good to leave, let me know and we'll reschedule.
  275. Tom
  276.  
  277.  
  278. From: Aaron Barr <aaron@hbgary.com>
  279. To: Barnett, Jim H.; Conroy, Thomas W.
  280. Sent: Fri Jan 29 05:09:39 2010
  281. Subject: Fwd: Input
  282.  
  283. Here is the input I sent in.
  284.  
  285. Aaron
  286.  
  287. From my iPhone
  288.  
  289. Begin forwarded message:
  290.  
  291. From: Aaron Barr <aaron@hbgary.com>
  292. Date: January 29, 2010 6:02:39 AM EST
  293. To: Jake Olcott <Jacob.Olcott@mail.house.gov>
  294. Subject: Input
  295.  
  296. Jake,
  297.  
  298. I wish I had more time. But here is some input. Hope it helps. Let me know if there is anything else I can do.
  299.  
  300. Aaron
  301.  
  302.  
  303. SEC 103. CYBERSECURITY STRATEGIC RESEARCH AND DEVELOPMENT PLAN
  304. Describe how the program will incentivize the collaboration of academia, small and large businesses to work together to develop more significant capabilities. (my point here is there is lots of talent, capability, overlap, but often they don't collaborate for reasons of market share, territory, etc). Grants for innovative integration. Small companies are laser focused on immediate revenue and growth. Difficult to get them to think about collaboration.
  305.  
  306. Describe how the program will provide access to government mission sets and information for the purposes of real world research, development, and testing. (In many cases, you might have good ideas, good technology but you need a real world environment/data to test against which is difficult to get unless you secure a contract).
  307.  
  308. Describe how the programs national research infrastructure will provide expertise to mission owners on the effectiveness of new technologies. (It would be effective to have a technology shop that could provide the real world testing on new technologies and provide expert opinion to the government on technology effectiveness)
  309.  
  310. Describe how the program will facilitate development and implementation of newly developed technologies. Once you have a new technology then you have to go sell it, which can be a matter of contacts, etc, things that don't have anything to do with the quality of the technology.
  311.  
  312. Describe how the program will develop a national challenge based on priorities to effectively evaluate and reward best in class capabilities in those areas referenced. How can we innovatively foster the creation of new ideas. Provide a national challenge in different areas at a government sponsored cybersecurity event. This would allow virtual nobodies that have developed amazing capability to get instant recognition and exposure.
  313.  
  314. SEC. 104. SOCIAL AND BEHAVIORAL RESEARCH IN CYBER-SECURITY
  315. Develop a program to incentivize people to think and act more securely in how the use systems, and develop systems.
  316.  
  317. Develop incentives to more effectively share cybersecurity related information amongst government, academia, and industry.
  318.  
  319. Programs to inform public of compromised systems, attack types, methods. More publicly digestible information on the threats and methods of attack.
  320.  
  321. SEC. 105. NATIONAL SCIENCE FOUNDATION CYBERSECURITY RESEARCH AND DEVELOPMENT PROGRAMS
  322.  
  323. SEC. 106. FEDERAL CYBER SCHOLARSHIP FOR SERVICE PROGRAM
  324.  
  325. SEC. 107. CYBERSECURITY WORKFORCE ASSESSMENT
  326. Incentivize industry and government to bring on college students part time in larger numbers, mechanisms to get them in the clearance process, get them experience, introduced to what is actually happening in the national cybersecurity efforts.
  327.  
  328. Develop a set of cybersecurity programs; to teach general users, acquisitions forces to help them write cyber requirements, and more technical for personnel who work on the systems so they better understand both why and how to secure systems.
  329.  
  330. Develop technical coaching and mentorship programs to grow the current base into technical experts.
  331.  
  332. SEC. 108. CYBERSECURITY UNIVERSITY-INDUSTRY TASK FORCE
  333. Develop a program to tie university research to industry sponsorships. I sat through the review of a bunch of academic papers and it was obvious the are technically sharp but operationally ignorant..get them involved more effectively in working on industry R&D.
  334.  
  335. SEC. 109. CYBERSECURITY CHECKLIST DEVELOPMENT AND DISSEMINATION
  336.  
  337. SEC. 110. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY CYBERSECURITY RESEARCH AND DEVELOPMENT
  338. Develop cybersecurity taxonomy and metrics standards.
  339.  
  340. Develop standards for research, engage international communities, establish more cross functional committees and act as government POC to track all cyber related research (allowing agencies to quickly see what is being done and facilitate collaboration).
  341.  
  342. Continually assess gaps in cyber defense research, development and implementation. Annual assessments of cyber intrusions and investigations/remediation. Publicly available documentation.
  343.  
  344.  
  345. http://hbgary.anonleaks.ch/aaron_hbgary_com/2483h.html Jim Barnett to Aaron Barr 29 Jan 2010, revealing they will influence the Senate side and naming Tim McKnight, who seems to be either an NG employee or perhaps a Senate staffer. This is an excerpt.
  346. ==============================================================
  347.  
  348. Good stuff Aaron...
  349.  
  350. Just so ya know...it looks like NGC will duck on this one...see what
  351. "companion" shows up on the Senate side...see if they can figure out
  352. what they want to do to influence that for conference.
  353.  
  354. As it turns out, Tim McKnight was also part of Jacob's outreach so there
  355. was discussion within the corporation but not much real action.
  356.  
  357. Jim
  358. http://hbgary.anonleaks.ch/aaron_hbgary_com/6420.html Tom Conroy to Aaron Barr, cc: Brian Masterson, CTO of Northrop Grumman division Xetron 11 Feb 2010
  359. ===========================================================
  360.  
  361.  
  362.  
  363. Brian - Were you aware? Are there any issues here we should be aware
  364. of?
  365. Aaron - Gathering momentum, hopefully. Hope we can all make it through
  366. the snow.
  367.  
  368.  
  369. _____________________________________________
  370. From: Thompson, Bill (Xetron)
  371. Sent: Thursday, February 11, 2010 1:57 PM
  372. To: Conroy, Thomas W.
  373. Cc: Jadik, John; Simoni, Martin P. (Xetron)
  374. Subject: HBGary Federal
  375.  
  376.  
  377. Tom,
  378.  
  379. I just found out that you have a meeting set up with Aaron Barr from
  380. HBGary Federal tomorrow afternoon. We have been working with Aaron to
  381. define the subject effort for some time and I would like to attend the
  382. meeting if you feel that it is appropriate. I was not able to get you
  383. by phone to discuss. Therefore, I am going to plan on attending unless
  384. I hear otherwise.
  385.  
  386. Please let me know if this presents a problem,
  387.  
  388. Bill Thompson
  389. Manager - Cyber Solutions
  390. Northrop Grumman - Xetron
  391.  
  392.  
  393. http://hbgary.anonleaks.ch/aaron_hbgary_com/178h.html Tom Conroy to Aaron Barr 22 Feb 2010. Xetron apparently competes with Northrop Grumman staff at a location known as Millersville. Conroy helps him navigate the choppy corporate waters.
  394.  
  395. Phew. Heavy. I'm on my way to the Leadership Conference and I'll try to carry the message.
  396.  
  397.  
  398.  
  399.  
  400. ________________________________
  401.  
  402. From: Aaron Barr <aaron@hbgary.com>
  403. To: Conroy, Thomas W.
  404. Sent: Mon Feb 22 15:27:17 2010
  405. Subject: Re: Millersville
  406.  
  407.  
  408. Phrases were they don't understand/listen to the customer, and are not producing anything of value. This came from folks from GMU, a few small companies, AGNOSC, Sourcefire. It was just shocking to get that much negative input in a short period of time. I figured there was not a lot of recourse but thought it was feedback you should hear.
  409.  
  410. Meeting with Xetron went very well. I was impressed with NGES Information Geometry capability. I had a meeting with Mike Van Putte today and discussed our Threat Intelligence concept. He was interested in our approach but it sounded to evolutionary for his funding. A few other government folks, that were sitting with him that represent part of the end customers for the cyber genome, caught us later and said what we were developing was exactly what was needed and no one is approaching it that way. Good input. We will continue to press.
  411.  
  412. Aaron
  413.  
  414. On Feb 22, 2010, at 4:20 PM, Conroy, Thomas W. wrote:
  415.  
  416.  
  417. Do you get a sense for what causes the negative feelings? People (most likely), which ones, and what is the antibody producing behavior?
  418. Probably not much we can do about it though, short of new management.
  419. How did your trip to Zetron go?
  420.  
  421.  
  422.  
  423. ________________________________
  424.  
  425. From: Aaron Barr <aaron@hbgary.com>
  426. To: Conroy, Thomas W.
  427. Sent: Mon Feb 22 14:56:11 2010
  428. Subject: Millersville
  429.  
  430.  
  431. Tom,
  432.  
  433. I have been getting a lot of negative feedback about Millersville in talking with a lot of different companies, universities, and government at the DARPA Cyber Genome industry day. This conversation starts with me talking about partnering with Northrop working on some threat intelligence capabilities (generic). Once I mention its with Xetron not Millersville the tone changes. Just thought it was good information to share with you.
  434.  
  435.  
  436. Aaron Barr
  437. CEO
  438. HBGary Federal Inc.
  439.  
  440.  
  441. Aaron Barr
  442. CEO
  443. HBGary Federal Inc.
  444.  
  445.  
  446.  
  447. http://hbgary.anonleaks.ch/aaron_hbgary_com/2410.html Tom Conroy to Aaron Barr, introducing Brian Hibbeln at osd.mil 8 Jul 2010. Conroy reveals he met Barr when he was at TASC and Barr was an NG employee. NG acquired then later sold TASC. OSD is the Office of the Secretary of Defense.
  448.  
  449. ===============================================================
  450.  
  451. Aaron and Brian -
  452.  
  453.  
  454.  
  455. Allow me to introduce you to each other.
  456.  
  457.  
  458.  
  459. Brian, I worked with Aaron while I was at TASC and he was my go to
  460. person in establishing some of the most unique and highly successful
  461. internet programs for the IC that I know of. He and his team produced
  462. some truly remarkable and extremely innovative capabilities that have
  463. changed the way the Agency does business.
  464.  
  465.  
  466.  
  467. Aaron and I had lunch yesterday and he has left TASC and Northrop
  468. Grumman and is now with a small company (HB Gary) developing a similarly
  469. innovative and value adding capability for them across a broader range
  470. of customers. Knowing how you value talent and capability, and are able
  471. to bring together just the right mix of users, visionaries, and funding
  472. sources, I realized you two would be like catalysts in a mix of free
  473. hydrogen and free oxygen. Heat, light, and explosive impacts will
  474. almost certainly result.
  475.  
  476.  
  477.  
  478. Please get in direct contact and see if you don't agree this is a
  479. partnership made in heaven.
  480.  
  481.  
  482.  
  483. Good luck to you both.
  484.  
  485.  
  486.  
  487. Tom
  488.  
  489.  
  490. http://hbgary.anonleaks.ch/aaron_hbgary_com/3682.html Aaron Barr to Tom Conroy 2 Aug 2010. Meeting with InQTel & FBI.
  491.  
  492.  
  493. Tom,
  494.  
  495. Nice to see you today. As always I will look to build capabilities that make a difference and will look to those organizations that I know to support efforts as they arise.
  496.  
  497. I wanted to share a dialog I had with the CEO of HBGary proper regarding the future of cybersecurity.... I would be interested in your thoughts. I am meeting with InQTel next week, talking with MITRE, and the FBI. Working to develop a standard for threat intelligence, a threat repository, a methodology to share information on threats. There are not many people that seem to understand both security and path of technology. Threats are llke, they take the path of least resistance, but inevitably with time, they are successful. We still believe we can build better mousetraps... we can't. The only way to get ahead of the problem is what I discuss below. I am just struggling to implement. In Northrop I was too encumbered by a bureaucracy. In a small business I am, well small. I know influential people... well you know the challenges. (PS. I haven't forgot about the news idea, just been busy trying to make payroll. :)) I called today and am waiting to hear back from the contact you gave me. Greg Hoglund and I are beginning to write a book about the future of technology and security that has this as the skeleton.
  498.  
  499. ---------------------
  500. The trajectory of technology = Mobility + Social + Cloud
  501.  
  502. This = perimeterless environment, + promiscuous networking + open PII.
  503.  
  504. Computer security is not possible, not remotely given the current trajectory of security. Even host based behavioral detection can not keep up with this without significant additional capabilities. I see only two paths to improving this. As the stakes are raised to organized crime and nation state FIS (Foreign Intelligence Services) anything is possible. Backbone compromises, Supply Chain compromises, specialized insider threats, legitimate commercial services.
  505.  
  506. Choices to better security.
  507. Complete rework of the computer and communications architecture. (not likely and certainly not within 5 years). There are some technologies short of this that will help; broad distribution and management of personal certs and pervasive encryption. But the implementation of this is a bugger. Again long ways away.
  508. or
  509. Intelligence, Incident Response, and IO.
  510.  
  511. The area Incident Response requires some clarification because I don't mean it in the traditionally understood sense. I mean human and system response to abnormal cyber conditions. I mean system and mission resiliency in the face of compromise and attack. This requires good intelligence, we can improve human and system response with better intelligence.
  512.  
  513. IO requires some intelligence but is more a feeder to intelligence. All offense all the time. Forward deployed and embedded capabilities that can give us insight, I&W, knowledge of threats, their intent and capabilities. This is a blended approach of all of the capabilities available. Coordinated campaigns
  514.  
  515. Intelligence. This is a bugger. Some of it because of organizational and bureaucratic boundaries. Some of it is we just don't know how to organize the data. Threats are complex as we have discussed. How do you develop a threat focused intelligence capability?
  516.  
  517. Aaron Barr
  518. CEO
  519. HBGary Federal Inc.
  520.  
  521.  
  522. http://hbgary.anonleaks.ch/aaron_hbgary_com/8618.html Tom Conroy to Aaron Barr 6 Aug 2010. Seeking a meeting with Dawn Meyerriecks at Director of National Intelligence. Cassie is Conroy’s administrative assistant.
  523.  
  524.  
  525. I want to schedule a meeting for you and me with Dawn Meyerriecks,
  526. DDNI/Acquisition and Technology, ASAP. Call me with your general
  527. calendar constraints and I'll see what I can do. Cassie is out so we're
  528. both in a world of hurt.
  529.  
  530. Tom
  531.  
  532.  
  533.  
  534. ================================================================
  535. http://hbgary.anonleaks.ch/aaron_hbgary_com/9109.html Aaron Barr to Tom Conroy 12 Aug 2010. This goes to the level of the Deputy Director of the NSA. Kind of a faux pas here, proper spooks were very careful to keep stuff out of email, Barr on the other hand is quite messy.
  536.  
  537. =========================================================
  538.  
  539.  
  540. Sent from my iPad
  541.  
  542. Begin forwarded message:
  543.  
  544. *From:* <paula.bucher@dni.gov>
  545. *Date:* August 12, 2010 9:01:41 AM EDT
  546. *To:* <aaron@hbgary.com>
  547. *Subject:* *Meesage from Dawn Meyerriecks*
  548.  
  549. Mr. Barr,
  550.  
  551.  
  552.  
  553. Dawn asked me to pass this message to you.
  554.  
  555. The information has been passed to the Deputy Dir of NSA and someone will be
  556. contacting you.
  557.  
  558.  
  559.  
  560. Paula H Bucher
  561.  
  562. Executive Assistant for the
  563.  
  564. DDNI Acquisition and Technology
  565.  
  566. 703-275-3240
  567.  
  568. http://hbgary.anonleaks.ch/aaron_hbgary_com/4307.html Aaron Barr to Tom Conroy. 18 Aug 2010. The “folks up north” refers to the National Security Agency, based at Fort George Meade, between Washington D.C. and Baltimore. HBGary Federal’s offices are southwest of D.C.
  569.  
  570. ========================================================
  571.  
  572.  
  573. Hi Tom,
  574.  
  575. I just wanted to close the loop on the conversation. I got a call late last week and gave the folks up north a call on a secure line, gave them my information in detail. They said if they had any follow up that was needed they would give me a call. So I think that is it.
  576.  
  577. Something that occurred to me. Maybe they are ok with the level of information that is discernible? This whole thing, if not a fluke, is very interesting in that it happened, was allowed, etc. Maybe a current change? No need to take unnecessary risks though.
  578.  
  579. Aaron
  580.  
  581.  
  582. http://hbgary.anonleaks.ch/aaron_hbgary_com/12950h.html 20 Aug 2010. Aaron Barr reveals to Tom Conroy that Dawn Meyerriecks is introducing him to Lisa J. Porter on the ugov portal. This system is a cross agency information sharing portal.
  583.  
  584. ==========================================================
  585.  
  586.  
  587. FYI...
  588.  
  589. Sent from my iPad
  590.  
  591. Begin forwarded message:
  592.  
  593. *From:* <dawn.meyerriecks@dni.gov>
  594. *Date:* August 20, 2010 6:12:01 PM EDT
  595. *To:* <lisa.j.porter@ugov.gov>, <aaron@hbgary.com>
  596. *Subject:* *e-Intro*
  597.  
  598. Lisa –
  599.  
  600.  
  601.  
  602. Aaron is the individual I mentioned that came to me with the interesting
  603. code fragment analysis.
  604.  
  605.  
  606.  
  607. Aaron –
  608.  
  609.  
  610.  
  611. Lisa is the brilliant scientist we are lucky to have running IARPA.
  612.  
  613.  
  614.  
  615. Thought you two might have an interesting conversation. J
  616.  
  617.  
  618.  
  619. Thanks! Dawn
  620.  
  621.  
  622.  
  623. http://hbgary.anonleaks.ch/aaron_hbgary_com/4012.html Aaron Barr to Tom Conroy 18 Nov 2010. This is speculative – is what they were reporting to the NSA earlier the discovery of Stuxnet?
  624.  
  625. ============================================================
  626.  
  627.  
  628. FYI. Did you have more insight on this?
  629.  
  630. Aaron
  631.  
  632. *Stuxnet Virus Now Biggest Threat To
  633. Industry*<http://rss.slashdot.org/~r/Slashdot/slashdot/~3/v_lDuabXF_Q/story01.htm>
  634. digitaldc writes "A malicious computer attack that appears to target Iran's
  635. nuclear plants can be modified to wreak havoc on industrial control systems
  636. around the world, and represents the most dire cyberthreat known to
  637. industry, government officials and experts said Wednesday. They warned that
  638. industries are becoming increasingly vulnerable to the so-called Stuxnet
  639. worm as they merge networks and computer systems to increase efficiency. The
  640. growing danger, said lawmakers, makes it imperative that Congress move on
  641. legislation that would expand government controls and set requirements to
  642. make systems safer."
  643.  
  644. <http://www.facebook.com/sharer.php?u=http%3A%2F%2Fit.slashdot.org%2Fstory%2F10%2F11%2F18%2F140253%2FStuxnet-Virus-Now-Biggest-Threat-To-Industry%3Ffrom%3Dfb>
  645. <http://twitter.com/home?status=Stuxnet+Virus+Now+Biggest+Threat+To+Industry%3A+http%3A%2F%2Fbit.ly%2FaS9Pci>
  646.  
  647. Read more of this
  648. story<http://it.slashdot.org/story/10/11/18/140253/Stuxnet-Virus-Now-Biggest-Threat-To-Industry?from=rss>at
  649. Slashdot.
  650.  
  651.  
  652. <http://da.feedsportal.com/r/83966956716/u/49/f/530758/c/32909/s/fc47320/a2.htm>
  653.  
  654.  
  655.  
  656. Sent from my iPad
  657.  
  658.  
  659. This fragment has been much quoted and finding the original on hbgary.anonleaks.ch has been problematic. Aaron Barr admits to sticking his penis into the Anonymous hornets nest, informing Dawn Meyerriecks at the Director of National Intelligence on 28 Jan 2011.
  660.  
  661.  
  662. Hi Dawn,
  663.  
  664. I have been doing some research on the Anonymous group of wikileaks fame for an upcoming presentation. I have put together what I believe is a significant data set on this group, how it's organized, individuals. I shared some of this with Tom and he recommended that I should mention this to you to see if there is any interest in discussing my results, methodologies, and significance of social media for analysis and exposure.
  665.  
  666. Aaron
  667.  
  668.  
  669.  
  670. This fragment has also been quoted to death. Conroy instructed Barr to get him a clean, coherent message as to what he had on Anonymous. This is the result.
  671. ===========================================================
  672.  
  673. Tom,
  674.  
  675. I have been researching the Anonymous group over the last few weeks in preparation for a social media talk I will be giving at the BSIDES conference in San Francisco on Feb. 14th. My focus is to show the power of social media analytics to derive intelligence and for potential exploitation. In the talk I will be focusing how effective it is to penetrate three organizations, one military (INSCOM), one Critical Infrastructure (Nuclear PowerPlant in PA), and the Anonymous Group. All penetrations passed social media exploitation are inferred (i.e. I am not delivering any payload).
  676.  
  677. I am surprised at the level of success I am having on the Anonymous group. I am able to tie IRC Alias to Facebook account to real people. I have laid out the organizations communications and operational structure. Determined the leadership of the organization (mostly - some more work here to go).
  678.  
  679. I have to believe this data would be valuable to someone in government, and if so I would like to get this data in front of those that are interested prior to my talk, as I imagine I will get some press around the talk and the group will likely change certain TTPs afterwards.
  680.  
  681. Thanks for your help.
  682.  
  683. Aaron
  684.  
  685. http://hbgary.anonleaks.ch/aaron_hbgary_com/6449h.html Aaron Barr to Tom Conroy 29 Jan 2011. Bill Wansley is a very senior executive at Booz Allen Hamilton. Mike McConnell has not been identified to our knowledge.
  686.  
  687. ==============================================================
  688.  
  689. Tom,
  690.  
  691. I forgot to mention. I had a meeting yesterday with Bill Wansley over at Booz yesterday. He said Mike McConnell is walking around like the cat that got the canary because their is something to happen or be released soon that is very significant in the cyber arena. Any knowledge?
  692.  
  693. Aaron
  694.  
  695.  
  696. http://hbgary.anonleaks.ch/aaron_hbgary_com/9394.html Tom Conroy to Aaron Barr 6 Feb 2011. Speculating that the model of an offshore intel operation collecting data and selling it to the government is the correct way to circumvent privacy laws.
  697.  
  698.  
  699. Do you suppose there might be a market for an offshore intel gathering organization that would sell results?
  700.  
  701. -----Original Message-----
  702. From: Aaron Barr <aaron@hbgary.com>
  703. Date: Fri, 4 Feb 2011 20:50:08
  704. To: <conroy.tom@gmail.com>
  705. Subject: Re: Research Data
  706.  
  707. BTW,
  708.  
  709. The conversation was very interesting today. The admit they had no idea this was happening until it hit the streets. They have no idea how to manage things like this in the future. And the agree they are not capable of doing the right activities (like I did) to be better prepared in the future because of authority and policy restrictions.
  710.  
  711. So I gave them a model that might work. I will do the work based on my understanding of need on my dime... put together a report... and sell them the report.
  712.  
  713. They liked that. I am working up 5 slides to hopefully brief Glenn next Friday.
  714.  
  715. Aaron
  716.  
  717. On Feb 4, 2011, at 8:46 PM, Tom Conroy wrote:
  718.  
  719. > Any chance you would be OK dragging me along to visit Dawn. Its not necessary and it is purely selfish of me to ask, but.... What do you think?
  720. > From: Aaron Barr <aaron@hbgary.com>
  721. > Date: Fri, 4 Feb 2011 20:05:18 -0500
  722. > To: Tom Conroy<conroy.tom@gmail.com>
  723. > Subject: Fwd: Research Data
  724. >
  725. > Interesting Day.
  726. >
  727. > So I have been contacted by OSD (Rosemary), FBI, USG, and now DNI...all today.
  728. >
  729. > I have a meeting with FBI/OSD Monday @ 11am.
  730. >
  731. > Met with some folks at my old customer today (I should fill u in on that).
  732. >
  733. > And looks like a meeting to be set up with Dawn...
  734. >
  735. > Let me know if you would like to get together.
  736. >
  737. > Aaron
  738. >
  739. >
  740. > Begin forwarded message:
  741. >
  742. >> From: <dawn.meyerriecks@dni.gov>
  743. >> Date: February 4, 2011 7:56:55 PM EST
  744. >> To: <aaron@hbgary.com>
  745. >> Cc: <conroy.tom@gmail.com>, <catherine.m.white@dni.gov>
  746. >> Subject: RE: Research Data
  747. >>
  748. >> Yes....always enjoy our chats and would be interested in an update on our other conversation. I've cc:-ed Cathy, who can set this up.
  749. >>
  750. >> Thanks! Dawn
  751. >>
  752. >> -----Original Message-----
  753. >> From: Aaron Barr [mailto:aaron@hbgary.com]
  754. >> Sent: Friday, January 28, 2011 5:37 PM
  755. >> To: Dawn Meyerriecks
  756. >> Cc: Tom Conroy
  757. >> Subject: Research Data
  758. >>
  759. >> Hi Dawn,
  760. >>
  761. >> I have been doing some research on the Anonymous group of wikileaks fame for an upcoming presentation. I have put together what I believe is a significant data set on this group, how it's organized, individuals. I shared some of this with Tom and he recommended that I should mention this to you to see if there is any interest in discussing my results, methodologies, and significance of social media for analysis and exposure.
  762. >>
  763. >> Aaron
  764. >
  765.  
  766.  
  767.  
  768.  
  769. We’ve read this several times since it was released.
  770.  
  771. Conroy worked at TASC and Barr was his contact at Northrop Grumman. NG bought TASC in 2001 and sold it in 2009.
  772.  
  773. http://www.tasc.com/about_us/history/
  774.  
  775. Barr viewed Conroy as a mentor and consulted him frequently. Conroy was planning leave NG and did so at the end of 2010, landing at an unnamed company in the D.C. area that helped him to keep his clearances.
  776.  
  777. Conroy, assisted by Barnett, both of Northrop Grumman, were introducing HBGary Federal around, apparently with an eye on using a more nimble private company to circumvent both their own employers stodgy approach as well as U.S. laws regarding privacy, intelligence gathering, and various fraud statutes that cover what the military refers to as “information operations”.
  778.  
  779. The U.S. government was caught flat footed by the vigorous defense Anonymous offered when actions were taken against Wikileaks. They had expected to shut the Wikileaks operation down quickly and discredit what was released. Wikileaks survived, distributed itself, and when HBGary went after Anonymous the situation got dramatically worse.
  780.  
  781. That ends what can be discerned from reading the 164 messages either to or from Conroy that were found in Aaron Barr’s mailbox.
  782.  
  783.  
  784. What is known from revelations over the last few days is that th3j35st3r (The Jester), the Islamophobic U.S. Nationalist hacking group, has also made the mistake of engaging Anonymous. Two of the members have been outed as the 2010 winners of the DoD Cyber Crime Center’s forensic challenge. There are hints in other messages in Barr’s inbox that indicate they were in contact with DC3.
  785.  
  786. The story of Anonymous and HBGary is far from over …
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement