Palantir did not participate in any activities involving HBGary's proposed tactics.
The slide entitled "Potential Proactive Tactics" was authored solely by HBGary.
The Palantir logo on the slide is the result of a collated deck and does not represent Palantir's position.
Given the detailed, 12-page proposal [PDF] titled "Corporate Information Reconnaissance Cell," submitted to Hunton & Williams on November 3, 2010, detailing Palantir's tightly-knit, side-by-side partnership in the triumvirate of cyber-security/intel firms calling themselves Team Themis, it's difficult to believe that Palantir was as innocent in these matters -- or even as "progressive" -- as their statements hope to convey.
Wheeler reports in another piece regarding part of the Themis plan to charge $250/hour to create false personas and exploit social media sites such as Twitter to help discredit progressive journalists and activists such as those fighting on behalf of those making $12/hour or less to "keep your building clean or care for you when you're sick."
As the Palantir employee working with Barr on these numbers put it, "Most of all that we are the best money can buy! Dam it feels good to be a gangsta..."
I suspect publicly distancing themselves from "any activities involving HBGary's proposed tactics," is a very carefully chosen phrase for Palantir, as both of the Power Point presentations I've highlighted so far -- the one bearing Palantir's logo targeting Greenwald and the one targeting me, under the Team Themis banner -- propose exceedingly pernicious and objectionable McCarthyesque tactics to be used against private American citizens and organizations exercising their right to free speech and peaceable assembly in the cause of progressive political advocacy.
While Palantir and their self-described champion of free speech and progressive values, CEO Karp, reached out to the widely-read and very visible Greenwald to apologize for the proposed attacks on him and his credibility, as evidenced on their logoed Power Point slide, to date, "Somehow," as Wheeler noticed, "Dr. Karp forgot to apologize to Brad Friedman, another journalist [Team Themis] has targeted."
HBGary, the company of the loathsome Aaron Barr, initially claimed to "have been the victims of an intentional criminal cyberattack," following their takedown by Anonymous. They went on to baselessly charge that "any information currently in the public domain is not reliable because the perpetrators of this offense, or people working closely with them, have intentionally falsified certain data."
Um, I don't think so. Neither does anybody else. As The Tech Herald observed, "It is unlikely that Anonymous would forge thousands and thousands of emails or attachments" and notes "the complete severance of ties by" the other two companies of Team Themis, "leaves little room for doubt that the information ... is legitimate."
And isn't a bit desperate to try and use the old "they intentionally falsified data!" ploy after you've already been busted as having concocted precisely such a scheme of fraud and forgery to plant false documents and then make that claim in order discredit others?
Remarkably, Barr also had the temerity, after all of this happened, to complain to Forbes about the fall-out from his decision to go after Anonymous: "Do I regret it now? Sure, I'm getting personal threats from people, and I have two kids. I have two four-year old kids. Nothing is worth that."
The irony was surely lost on this man.
[On a related note, for fans of Schadenfreude, you must read the hilarious and detailed inside story of the absolutely epic, legendary even, take-down by Anonymous of HBGary and Barr, its Egomaniac-in-Chief, including details on the 16-year old girl who managed to gain access to the company password at the multi-million dollar cyber-security "intelligence" firm as Anonymous then proceeded to take over their website (see the message they left on it here, including: "You've tried to bite at the Anonymous hand, and now the Anonymous hand is b*tch-slapping you in the face"); deface Barr's Twitter account; remotely wipe his iPad clean; and downloaded the entire company email database. The account, as stitched together from the now-public record by by Ars Technica's Nate Anderson, is an instant classic.]
The self-discrediting Barr and HBGary have been quickly made the scapegoats in all of this, and so have received the most coverage in the media to date. But the instigators behind all of these diabolical schemes, the bag men at Hunton & Williams and the godfathers at the U.S. Chamber of Commerce, have still remained largely unscathed in media reports.
Hunton & Williams has yet to release a comment in regard to any of this, while the U.S. Chamber of Commerce, as is their wont, chose to go on the attack, charging, like HBGary, that they are actually the victims of "baseless attacks."
In their first statement on Thursday, Tom Collamore writing for the U.S. Chamber at ChamberPost, offered this remarkably daft "non-denial denial":
We're incredulous that anyone would attempt to associate such activities with the Chamber as we've seen today from the Center for American Progress. The security firm referenced by ThinkProgress was not hired by the Chamber or by anyone else on the Chamber's behalf. We have never seen the document in question nor has it ever been discussed with us.
While ThinkProgress and the Center for American Progress continue to orchestrate a baseless smear campaign against the Chamber, we will continue to remain focused on promoting policies that create jobs.