Darktrace and Cybereason: The Intelligence Front Companies Seeking to Subjugate the World with the A.I. Singularity
We have all been dreaming, a dream where you can float or glide across your dreamscape effortlessly. This leads to the feeling of trepidation, as though you have the ability to let go, and if you do let go, you’ll either soar or fall.
We’re now at a point in history where either the coming events will be studied for thousands of years, or it will be remembered as the point where we lost our humanity completely. Artificial Intelligence (A.I.) technology has entered a new phase over the past several years, where instead of the A.I. algorithms learning from humans, they are now teaching themselves, changing their own algorithms as they learn. We are on the cusp of letting go of control entirely, so early on, because of a few small companies who have quietly been given free reign under the guise of “protecting” our digital lives, all within a tech sector that is moving so fast that we can no longer see what’s just around the bend.
The entire free thinking population of Earth would love a little more time to discuss such epochal change. However, the technocrats and scientists, supported by venture capitalists, are already putting into action the future before the masses have a chance to even consider discussing its consequences. With very little legislation governing A.I. technologies on the books, our governments are eager to get every tech pioneer inventing whilst there is no accountability for any resulting harm. We’re not talking major societal disruption, we’re talking about a potential extinction level event of our own creation. Where we should be taking cautious baby steps, instead we’re expecting to fly just by letting go.
We are about to experience a monumental change in technology, starting with “next-generation” cybersecurity that will then move quickly into the unknown. Unsupervised A.I., now running on critical networks throughout the world as a “cybersecurity” product, is evolving its own algorithm without the need for humans to be involved. Meanwhile, the wealthy patrons funding this cutting edge future tech are out in force, working to propel our societies into this new, unexplored and dystopian technological frontier.
But who are the companies that these eager wealthy venture capitalists are funding to create an autonomous, A.I.-powered cyber defence system like never before? Are they even companies at all when we consider their deep and direct ties to intelligence agencies? Should these firms instead be reclassified as simply extensions of state intelligence apparatus acting without the restrictions of public accountability?
Each of these companies have been built by teams of former intelligence operatives, some of who have sat in the highest echelons of the intelligence apparati of their respective countries. MI5 and C.I.A. both carry considerable weight in these sinister sounding enterprises, but it is Israel’s Unit 8200 that are the main group capitalising on this advance into the world-altering realm of unsupervised Artificial Intelligence algorithms.
Yet, these very companies appear to be selling a defence against a potential apocalypse that they themselves may be responsible for. They have the solutions to everyone’s cyber-woes, or at least that’s the image they wish to portray. Let me introduce you to the most dangerous intelligence operations masquerading as cybersecurity companies on planet Earth.
Darktrace – The Unsupervised Machine Learning A.I. Cybersecurity Solution
The members of Darktrace are open about their aims. They talk about publicly held data as though they already have the rights to sell it to anyone around the world. Data is the fuel of the Fourth Industrial Revolution and Darktrace has made almost $2 billion in the data business during its relatively short history, reaching Unicorn status with great ease. When Darktrace first launched its website in 2013, its description of the company’s vision was entitled, “The New Normal: Learn Human and Machine Behavior to Reduce Cyber Security Risks.” Back then we were less familiar with the term “the new normal,” but now it surrounds us. Darktrace is already active within the NHS, the U.K. power grid, and many other major parts of Britain’s critical infrastructure and they are rapidly expanding around the globe.
Dave Palmer was an MI5 anti-terror agent working on the 2012 London Olympics when he and some of his colleagues first bashed out the initial idea for what would become Darktrace. They wanted to create an A.I. cybersecurity system that was based on the human immune system, a system that differed from the traditional, reactive antivirus software approach. This system would look for abnormalities in a computer network’s processes to target a wider range of more sophisticated cyber issues.
Palmer had spent 14 years working for MI5 and GCHQ in a role creating secure networks for British spies to communicate. He would eventually approach two mathematicians from Cambridge University to help make his dreams reality at the tail end of 2012. These mathematicians were working on projects related to using unsupervised machine learning to teach a computer to have a sense of self, a step that would bring such technology dangerously close to the so-called singularity. At that point, as critics and proponents of self-aware A.I. alike have warned, that machine intelligence will not only surpass human intelligence, but advance at an incomprehensible rate, which major and world-altering implications.
In a TechCrunch talk in 2016, the freshly installed co-CEO of Darktrace, Poppy Gustafsson, is caught misleading the audience about the company’s origins. She uses the TechCrunch stage to claim that the “spark” for the creation of Darktrace originally came from the mathematicians at Cambridge and downplayed the involvement of intelligence agencies like MI5, GCHQ, and the C.I.A. The TechCrunch moderator, Natasha Lomas, displayed some fine journalistic integrity on this occasion and asked for clarification. “So did the maths research come first and then you got together with the spies. Which way round was it?” asked the intrepid Lomas. Gustafsson squirms a little before saying, “it was exactly that. First the machine learning that was talking about how to critique a computer to help it understand itself. And then it was the, um, experts from the government intelligence agencies who thought ‘ooh, this could be applied to the problem of cybersecurity.’” But that statement was an outright lie and Gustafsson isn’t the most skilled deceiver.
Gustafsson, who was initially CFO and COO for the fledgling Darktrace, runs the company alongside the other co-CEO Nicole Eagen, an alumnus of Oracle, a major tech company that also has its origins in intelligence. Both parts of Darktrace’s female power duo were brought over from Invoke Capital by Darktrace’s initial angel investor and advisory board member, UK billionaire Dr. Mike Lynch OBE. Describing himself as the “UKs answer to Bill Gates“, Dr. Mike Lynch is lauded as one of the most influential investors in the tech sector. His previous successful endeavours had been with Autonomy, a tech firm that has Lynch caught up in a legal wrangle with HP over the fraudulent inflation of its valuation, and Blinkx, a video search company where Lynch was later forced to step down from the board.
Dr. Mike Lynch’s problems with Hewlett Packard are not to be understated as was made clear in a Telegraph article that described it as “the trial of the century.” But, before that spectacle can take place, Mike Lynch must first be extradited and his protracted court battle to resist extradition has led to some uncertainty surrounding the future of Darktrace whilst Lynch is still active within the company. It was also recently reported in the mainstream media that the Wall Street bank Goldman Sachs had declined to take a role in the initial public offering (IPO) of Darktrace due to Mike Lynch’s ongoing extradition battle.
Yet, Darktrace is not just one man working alone. The company boasts that over 4000 organisations worldwide now rely on Darktrace’s A.I. technologies. With headquarters in San Francisco, US, and Cambridge, UK, Darktrace has over 1300 employees spread across 44 countries and their numbers are rising. And although the connections to the state intelligence agencies are clear and obvious, Darktrace is officially a completely private enterprise with big investors including KKR, Summit Partners, Vitruvian Partners, Samsung Ventures, TenEleven Ventures, Hoxton Ventures, Talis Capital, Invoke Capital and Insight Venture Partners. Sitting alongside the controversial Dr. Mike Lynch OBE on the advisory board for Darktrace are some seriously influential people deeply connected to US and UK intelligence agencies.
One of the first members appointed to Darktrace’s advisory board was Jonathan Evans, also referred to as Baron Evans of Weardale. Evans was previously the Director General of MI5, taking over from Dame Eliza Manningham-Buller in 2007 and staying in the most senior intelligence role that the UK has to offer until 2013. After his time as head of MI5, Evans initially joined HSBC Holdings as a non-executive Director, a role he also took up at Ark, a highly secure UK data centre.
If you were to walk into the advisory boardroom at Darktrace, you could be forgiven for thinking that you were actually attending a U.K. Home Office meeting from the past. The former Home Secretary under Prime Minister Theresa May, Amber Rudd, became part of Darktrace after her time in government ended in 2019. She is also on the advisory team of Teneo, a consulting firm co-founded and led by Doug Band, the former advisor to Bill Clinton and close friend of the infamous Jeffrey Epstein. As always, when investigating the murky world of intelligence, many connections to Epstein and his partner Ghislaine Maxwell are revealed.
With that being said, yet another member of Darktrace’s advisory board also has Epstein/Maxwell links. The C.I.A. stalwart, Alan Wade, is one of the most interesting members of the Darktrace advisory team. He was announced as joining their growing advisory board on 10 May 2016 and had been the former Chief Information Officer of the Central Intelligence Agency. His thirty- five year career at the top echelons of the C.I.A. ended in 2006 and afterwards he would dedicate his time to assisting companies with C.I.A. links from the private sector.
While he had been at one of the top posts in the entire U.S. intelligence community, Wade co-founded Chiliad alongside Ghislaine Maxwell’s sister, Christine Maxwell. As Unlimited Hangout reported earlier this year, Christine Maxwell was personally involved in leading the opeartions of the front company used by Robert Maxwell to market the PROMIS software, which had a backdoor for Israeli intelligence, to both the U.S.’ public and private sectors. Given this history, it is certainly telling that Wade would choose to co-found a major software company with Christine Maxwell of all people.
When it was still active as a company, Chiliad described itself as “the leader in data analysis across clouds, agencies, departments and other stovepipes” and it ran on the computers and databases of nearly every major national security system in the U.S. government. But nowadays, its defunct website gives us just the standard error message.
Rounding out the Darktrace advisory board is their token academic, Professor Nick Jennings CB FREng, who serves the Vice-Provost for Research and Enterprise at Imperial College London. Yet, Jennings has also been the U.K. ‘s Government’s Chief Scientific Advisor for National Security and is currently a member of the U.K. government’s AI council, a very convenient position to hold given Darktrace’s ambitions.
These characters that comprise Darktrace’s leadership and board stand ready to put forward a solution to all of our problems related to cybersecurity. You can simply install a box and let Darktrace care for your network, placing your trust in an A.I. approaching self-awareness that is managed by intelligence-linked individuals with questionable pasts all for peace of mind and “convenience.” But what will they be fighting?
Cybereason – From Offensive, State-Sponsored Hackers to A.I. Cybersecurity
As we have experienced at other memorable moments in history, coincidental simulations prior or during any intelligence agency led manipulated event are commonplace. On this occasion, a company named Cybereason is here to provide us with a short glimpse of our pending fearful futures. In multiple simulations Cybereason has run over the last few years, they have been gaming out how potential cyberattacks could cause unthinkable disaster for the U.S. 2020 election.
Cybereason’s CEO and co-founder is an enigmatic former Israeli Intelligence agent Lior Div-Cohen, often simply referred to as Lior Div. Div, an IDF Medal of Honor recipient and former Israeli Unit 8200 member, co-founded Cybereason in 2012 alongside Yossi Naar and Yonatan Striem-Amit, who are also fellow veterans of Israel’s military cybersecurity corps. A scholar from the Academic College of Tel-Aviv, Lior Div afterwards worked as a software engineer for Xacct a network service provider followed by the notorious firm Amdocs, which was accused of eavesdropping on American government officials on behalf of Israel. In between Amdocs and Cybereason, Lior Div was the CEO and co-founder of Israeli cybersecurity firm AlfaTech which is described in its national media as “a cybersecurity services company for Israeli government agencies.”
Cybereason, in a bizarre advert promoting a fictional product they called Cyberblast, described themselves as “the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and managed monitoring services powered by paradigm-shifting, military-grade technology leveraging artificial intelligence and machine learning.” The marketers at Cybereason have gone all out to show themselves as a Silicon Valley style start-up where they spend all their days cooking, drinking, dancing, and doing barely any work, but in reality it is a company partially owned by such defence giants such as Lockheed Martin and who have very close ties to the Israeli intelligence apparatus. Through their partnership with Lockheed Martin, Cybereason now his its A.I.-driven cybersecurity software running on some of the U.S. government’s most classified networks, including numerous, critical U.S. military systems.
Yet, it’s not only major weapons developers like Lockheed Martin who have invested in this hi-tech cybersecurity platform. Reuters reported in August 2019 that Japanese firm Softbank has invested previously in the company, along with venture capital firms CRV and Spark Capital. Spark Capital’s investment portfolio includes Twitter, Oculus, Wayfair, Coinbase, Plaid, among many other big players. CRV’s investments include Dropbox, Patreon, but also A.I. and machine learning related enterprises such as Standard Cognition and Dyno Therapeutics.
As with Darktrace, Cybereason offers what is described as a next generation antivirus technology which, instead of responding to attacks when detected, will use A.I. and machine learning to see abnormalities to a network’s usual processes in real time.
Some of the simulations that Cybereason have hosted over the past two years lead us to election day. In a video entitled: 2018 -10 Hacking the Vote from a scenario and simulation which was actually entitled Blackout; Protect the Vote, the simulation examines which parts of an election day processes were vulnerable to hackers. They make clear from the start it won’t be all about voting machines themselves.
Nolandia, the fictional city which was ground zero during Operation Blackout, was based on an average American city nestled within a crucial swing state on election day. Here in Nolandia, three teams of cyber-fighters would battle with each other over control of the city.
These would be the three teams each with succinct roles in the polling day pretence, as told to us by Cybereason’s Ross Rustici and Sam Curry:
Red Team AKA Broken Eagle Task Force: The basic aim of the Broken Eagle’s Task Force was to disrupt the election processes in real time. The Red’s approach evolved throughout the simulation from causing as much harm as they could into making the result of the election as in doubt and politically biased as possible. They attempted to control the narrative that the system was broken and that the elections could not be trusted.
Blue Team AKA Nolandia Event Task Force: The Blue’s were fundamentally reactive during the simulation and were constantly on the backfoot. The Blue’s, responding to a reported gas leak at a Nolandia polling station early in the scenario, contacted the Secretary of State’s office to ask whether they needed to close the polling station. Luckily, the real State Department had two advisors sitting in on the simulation who were able to offer alternative contingency plans that existed in real world America. By the end of the simulation, the Blue’s were all aware that they had largely failed the exercise.
White Team AKA White Control Team: This team acted as support to give advice or permission to either team, in a role very much like the Dungeon Master in a D&D game. The White’s main task was to balance the realism of the scenario and create problems for either team that they’d experience in the real world.
In November 2019, Cybereason re-ran their election day attack simulation at an event in Washington D.C. and have run multiple simulations over the last year. The last imagined American city was called Adversaria. As the election day creeps ever closer, Cybereason have been releasing it’s more well produced promo videos online. If you’re paying very close attention then you will have noticed that Cybereason have spent all of October 2020 marketing heavily as their big day approaches. Representatives of Cybereason are being quoted in every mainstream scare story out there.
Vice News released an article on 7 October entitled: “Hospitals Have Become ‘Prime Targets’ for Crippling Ransomware Attacks,” where they quote Israel Barak, Cybereason’s Chief Information Security Officer, the article states that Barak is “a cyber warfare expert at Cybereason, spent nine years in the Israel Defence Forces specialising in cyber defence systems.” And when Computer Weekly’s Adam Scroxton, on 20 October, was reporting on the conviction of the six supposed Russian hackers in the famous NotPetya attack, Cybereason rolled out their CSO, Sam Curry, to give a statement.
In a 5 minute video released by the channel Freethink, released on 21 October 2020, entitled Hacker’s Simulate Election Day Blackout, Sam Curry, Cybereason’s Chief Security Officer, speaks openly about the possibilities of election day interference happening in the coming Presidential showdown. “No-one has seen an election like we expect the 2020 Presidential Election to be,” says Curry, “the stakes are high for 2020. Frankly, this is the game to win.”
In a Wired article on 22 October titled: 12 Cyber Threats That Could Wreak Havoc on the Election, Wired explains: “The security firm Cybereason last year ran a series of tabletop exercises specifically looking at how real-world attacks might impact Election Day. One exercise focused on a hacktivist group—known in the exercise as “Kill Organized Systems (K-OS),” pun intended—that disrupted traffic lights and brought the election to a standstill by paralyzing the city’s transportation system.” The media appearances for Cybereason have never come so thick and fast as they have this past October. One could even assume that these appearances are a media campaign leading up towards a big event.
And then, on 26 October 2020, Cybereason released a new promo video entitled: “We are the Defenders. The first to your fight.” In the two-minute piece, a Hollywood-esque movie intro narrator is accompanied by a CGI killer robot owl, with knives for wings and evil glowing eyes. They’re obviously looking to project their image as one of the wise, old protectors of cyberspace, or maybe something much worse. Regardless of the reason for the killer robot owls, Cybereason are sinister enough without them.
The Usual Suspects
Cybereason also has links to one of the usual suspects, Brigadier Pinchas Buchris. The former Deputy Commander of an elite IDF operations unit and former Commander of the IDF 8200 Cyber Intelligence Unit, he was also Director General of the Israeli Ministry of Defense, CEO of Oil Refineries Ltd and also serves as an AIPAC board member. This high flying Israeli intelligence operative joined the board of Cybereason shortly after his time spent at Carbyne911. Carbyne, an Israeli 911 call platform which saw initial investment from Jeffrey Epstein, Nicole Junkermann, and Peter Thiel, was founded by Ehud Barak and other ex Israeli intelligence giants.
Carbyne911 is an excellent example of how Israeli intelligence companies are trying to subvert and infiltrate our current systems. And since my initial article exposing their sinister team of ex-Unit 8200 members in 2019, Carbyne has had to change nearly every member of their advisory board. Now, the members chosen to be on their board are nearly all ex-American intelligence and state representatives with barely a Unit 8200 member anywhere in sight. This was an obvious attempt to distance the company from Israeli intelligence and steamroll on towards their aim to be in control of the private data of every American. Carbyne911 have been pushing to be involved in the Covid-19 track and trace apps as well as continuing to try and take over the American emergency services communication infrastructure. The people now occupying these positions at Carbyne911 will be examined in greater detail on another day.
Darktrace, Cybereason and Carbyne911 aren’t simply pioneers in a fast moving tech sector. Rather, they are intrinsically linked to the same old intelligence agencies who are attempting to reinvent themselves under a different, more acceptable guise. They are creating the infrastructure designed to subvert our current systems. An unsupervised A.I. behemoth that will require as much data as possible to power and our governments have already agreed to give away everything they can.
All of these technologies must be thought about, not only in relation to just an election day cyber-attack or a terrorist event, but instead think of this in its original and larger context. The Cambridge mathematicians behind the creation of Darktrace weren’t originally looking to prevent a cyberattack on election day 2020. These high flying math geniuses were trying to create the singularity, the creation of self learning A.I. This advancing technology will soon be fed with more data sets than the human brain is capable of imagining. In a move to take self learning A.I. online, the cyber threat to the elections will just be a smoke screen to avoid the larger more pertinent public policy questions concerning the safety and ethics of unsupervised self learning A.I., and more importantly, the major risks attached to these unknown systems.
The companies holding this all powerful future tech no longer bother to hide their associations and allegiances. Their various companies are riddled with American, British, and Israeli intelligence agents who plan on using this kind of technology to target their own populations. It is no coincidence then that some of these same nations have been covertly working on developing an A.I. that would replace human hackers, automating the very threat that companies like Darktrace and Cybereason claim to be guarding us against.