{"id":34168,"date":"2013-09-30T12:00:05","date_gmt":"2013-09-30T11:00:05","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=34168"},"modified":"2015-05-06T08:59:02","modified_gmt":"2015-05-06T07:59:02","slug":"the-surveillance-marketplace","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2013\/09\/the-surveillance-marketplace\/","title":{"rendered":"The Surveillance Marketplace"},"content":{"rendered":"<p><i>Behind Google and Verizon lies a much more complex landscape of American companies ready to do global business selling surveillance technologies &#8211; and stay apathetic to the consequences. <\/i><\/p>\n<p>In 2006, tech giant Cisco\u2014along with Google, Microsoft, and Yahoo\u2014faced the House Subcommittee on Africa, Global Human Rights and International Operations. The accusation? Complicity with the Chinese government or, as Rep. Christopher H. Smith <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2006\/02\/15\/technology\/15cnd-internet.html\" >called it<\/a>, a \u201csickening collaboration&#8221; that &#8220;[decapitated] the voice of the dissidents&#8221; there.<\/p>\n<p>Two years later, Cisco was <a target=\"_blank\" href=\"http:\/\/usatoday30.usatoday.com\/tech\/techinvestor\/corporatenews\/2008-05-20-cisco-china_N.htm?csp=DailyBriefing\" >made to face the music<\/a> again, this time in the form of a Senate subcommittee. But on the eve of that confrontation, a fortuitous leak occurred: someone inside the company <a target=\"_blank\" href=\"http:\/\/www.wired.com\/threatlevel\/2008\/05\/leaked-cisco-do\/\" >leaked a document<\/a> to reporters that detailed the extent of Cisco\u2019s collaboration with the Chinese government. The document\u2014an internal company presentation\u2014demonstrated ways in which Cisco could help service China\u2019s censorship system, known as the \u2018Great Firewall of China.\u2019 Included in the list was \u201ccombat \u2018Falun Gong\u2019 evil religion and other hostiles.\u201d<\/p>\n<p>Although Cisco wasn\u2019t directly held accountable for its actions, the series of hearings had two direct outcomes: the proposal of the Global Online Freedom Act\u2014a bill that has yet to pass\u2014and the creation of the Global Network Initiative, a voluntary multistakeholder initiative meant to help tech companies navigate the privacy and free speech challenges that come with doing business globally, and to hold them accountable for transgressions.<\/p>\n<p>While the former remains stalled in Congress, proposed year after year, the latter launched in 2008 with Google, Microsoft, and Yahoo as members, alongside a bevy of human rights groups and academics, later attracting Facebook and other companies as well. Absent from the initiative? Cisco.<\/p>\n<p>In fact, Cisco\u2014as well as the many other American companies capable of and willing to provide censorship and surveillance technologies to foreign governments\u2014has continued its lucrative business without a whiff of accountability or public transparency. Two <a target=\"_blank\" href=\"http:\/\/www.informationweek.com\/government\/policy\/cisco-accused-of-helping-chinese-police\/229625490\" >pending lawsuits<\/a> against the company serve as reminders of its impunity.<\/p>\n<p>But Cisco is hardly the only American producer of surveillance technology selling to governments with less-than-stellar human rights records. Blue Coat Systems, Inc., based in Sunnyvale, California, came under scrutiny in 2011 after it was alleged that the Syrian government used their devices to censor and surveil domestic traffic. The company <a target=\"_blank\" href=\"http:\/\/online.wsj.com\/article\/SB10001424052970203687504577001911398596328.html\" >acknowledged the location<\/a> of the devices, but claimed they had been shipped to Dubai en route to Iraq, where they would be used by a government department (a questionable move in itself).<\/p>\n<p>Blue Coat\u2019s situation is different; selling certain technologies to Syria violates US sanctions against that country. And while Blue Coat itself was not charged with any violations, the reseller it used \u2014 Computerlinks \u2014<a target=\"_blank\" href=\"https:\/\/www.eff.org\/deeplinks\/2013\/05\/blue-coat-syria-scandal-next-shoe-drops-computerlinks-fzco\" >was fined<\/a> for selling tools worth $1.4 million to Syria. Blue Coat ultimately settled with the U.S. Department of Commerce\u2019s Bureau of Industry and Security (BIS) for $2.8 million. Just a few months later, however, the company was once again accused of violating export laws, this time after Canadian researchers at the University of Toronto\u2019s Citizen Lab <a target=\"_blank\" href=\"https:\/\/citizenlab.org\/2013\/07\/planet-blue-coat-redux\/\" >found evidence<\/a> of its devices in Sudan and Iran, both under US sanctions.<\/p>\n<p>It is not just the sale of surveillance-enabling devices sold to countries under sanctions that is troubling: <a target=\"_blank\" href=\"https:\/\/citizenlab.org\/2013\/01\/planet-blue-coat-mapping-global-censorship-and-surveillance-tools\/\" >earlier research<\/a> by the same group found Blue Coat devices in Venezuela, China, Singapore, Egypt, and a handful of other repressive countries. While there is no penalty for sale to most countries, the implications of electronic surveillance in many of these countries should make companies think twice.<\/p>\n<p><b>Apolitical technology? <\/b><\/p>\n<p>When Egypt <a target=\"_blank\" href=\"http:\/\/www.huffingtonpost.com\/2011\/01\/27\/egypt-internet-goes-down-_n_815156.html\" >shut down the Internet<\/a> two days into massive protests in 2011, the media was shocked by that government\u2019s audacity (though perhaps they shouldn\u2019t have been; Egypt by far isn\u2019t the first country to do so, having been preceded by the <a target=\"_blank\" href=\"http:\/\/en.rsf.org\/maldives-president-gayoom-cuts-off-internet-13-08-2004,11137.html\" >Maldives<\/a>, <a target=\"_blank\" href=\"http:\/\/opennet.net\/blog\/2005\/02\/nepal-internet-down-media-censorship-imposed\" >Nepal<\/a>, and <a target=\"_blank\" href=\"http:\/\/opennet.net\/research\/bulletins\/013\" >Burma<\/a>). But Egypt had long oppressed its media, professional and citizen alike. And it did so with the help of another American company.<\/p>\n<p>Narus, a subsidiary of Boeing, is perhaps best known in the US for <a target=\"_blank\" href=\"http:\/\/www.wired.com\/science\/discoveries\/news\/2006\/04\/70619\" >the claim<\/a> that one of its devices, the <a target=\"_blank\" href=\"http:\/\/www.dailykos.com\/story\/2006\/04\/08\/200431\/-All-About-NSA-s-and-AT-T-s-Big-Brother-Machine-the-Narus-6400\" >Narus STA 6400<\/a>, was \u201cused particularly by government agencies because of its ability to sift through large amounts of data looking for preprogrammed targets.\u201d Those \u201cgovernment agencies\u201d include The National Security Agency (NSA). In 2006, AT&amp;T technician Mark Klein blew the whistle on AT&amp;T\u2019s collaboration with the NSA, pointing in an affidavit to a secret room in which the Narus STA 6400 was being housed. Klein\u2019s claims match those made by Narus on its website, where it touted AT&amp;T as a customer.<\/p>\n<p>Narus was also open about the fact that it provided Deep Packet Inspection (DPI) equipment to Egypt Telecom, as well as to telecoms in Saudi Arabia, Pakistan, and other countries with questionable human rights practices.\u00a0 DPI technology is commonly used for routine network management (such as the handling of spam), but has the capability to analyze all layers of data packets sent across the Internet; in other words, it is a dual-use technology that can be utilized for both banal and nefarious purposes.<\/p>\n<p>That it is the same technology companies providing surveillance technologies to authorities in the United States and foreign countries isn\u2019t surprising; the demand often starts in the west, with American, Canadian, and European suppliers happy to rise to the occasion. Such companies are often agnostic to claims that their technologies are being used for political repression, stating the dual-use purposes of the tech. Or as the CEO of Hewlett-Packard <a target=\"_blank\" href=\"http:\/\/online.wsj.com\/article\/SB10001424052702304778304576377141077267316.html#ixzz1RHQIvKhL\" >claimed in 2011<\/a> after accusations that his company\u2019s technology was being used for surveillance in China: \u201cWe take them at their word as to the usage. It&#8217;s not my job to really understand what they&#8217;re going to use it for.\u201d<\/p>\n<p>As other markets catch up, companies are ready and waiting, eager to increase their revenue even if it means selling to a government willing to use the technology to violate human rights. And nothing is stopping them; many of the governments to which Blue Coat and Narus have sold equipment are US allies (regardless of their treatment of their own citizens), and those that aren\u2019t are for the most part unrestricted by export controls or sanction. Even when sanctions apply, companies (including Blue Coat) have denied their role in the sale and have continued their work with impunity.<\/p>\n<p>To say nothing of the US government itself: the revelations over the past few months have shown the United States\u2019 brazen and illegal surveillance of its own citizens as well as other individuals all over the world.\u00a0 It is undeniably the demand coming from the US and its western allies that has led to the proliferation of surveillance technologies and the global demand for them.<\/p>\n<p><b>Data demand\u00a0 <\/b><\/p>\n<p>It is not just those companies producing hardware that have been accused of bad behavior. The same social media companies that in 2006 faced that House Subcommittee now face allegations of participating in the NSA\u2019s <a target=\"_blank\" href=\"http:\/\/www.slate.com\/blogs\/the_slatest\/2013\/06\/07\/prism_explained_powerpoint_slides_glenn_greenwald_profiled_and_other_reccommended.html\" >PRISM program<\/a>. The extent of their participation remains to be seen, but what is known\u2014quite well-known, in fact, thanks to transparency reporting\u2014is the extent to which many American companies hand over user data to governments.<\/p>\n<p>Using Google\u2019s <a target=\"_blank\" href=\"http:\/\/www.google.com\/transparencyreport\/userdatarequests\/\" >Transparency Report on user data requests<\/a>, India, for example, shows that of 2,431 requests for data during a six-month period, Google complied with 66 percent. Now, India is a robust democracy, but a quick look at Singapore\u2014which Freedom House notes is \u201c<a target=\"_blank\" href=\"http:\/\/www.freedomhouse.org\/country\/singapore\" >partly free<\/a>\u201d, but which places extreme restrictions on the press\u2014shows similar statistics.\u00a0 Of course, the US itself is among the top governments in terms of demands for data, and until recently, Google\u2019s reporting excluded data requests stemming from National Security Letters.<\/p>\n<p>Google, Microsoft, and other companies that have produced transparency reports certainly should get credit for doing so; and yet, in the wake of the PRISM revelations, they\u2019ve<a target=\"_blank\" href=\"http:\/\/www.theverge.com\/2013\/6\/11\/4419666\/google-asks-to-publish-national-security-request-data\" > made clear<\/a> that their data for the United States was incomplete, bereft of FISA requests. Given that information, what\u2019s to say that an American company faced with similar laws in another jurisdiction wouldn\u2019t be forced into secrecy there as well?<\/p>\n<p>Beyond the technological enablers, the American government\u2019s surveillance tactics are clearly having influence elsewhere. The <i>New York Times<\/i> <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/07\/15\/business\/global\/nsa-leaks-stir-plans-in-russia-to-control-net.html?_r=0\" >has reported<\/a> that Russian parliamentarians have cited the NSA in a push to add greater controls to the Internet, while in India <a target=\"_blank\" href=\"http:\/\/india.blogs.nytimes.com\/2013\/07\/10\/how-surveillance-works-in-india\/\" >attempts to conduct<\/a> widespread surveillance have been underway for some time.<\/p>\n<p>Surveillance is, of course, no new thing. Governments with the desire to surveil will always find ways to do so, but when one government that imagines itself the leader of the free world takes such bold steps toward becoming Big Brother, others are sure to follow.<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.opendemocracy.net\/opensecurity\/jillian-c-york\/surveillance-marketplace\" >Go to Original \u2013 opendemocracy.net<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Behind Google and Verizon lies a much more complex landscape of American companies ready to do global business selling surveillance technologies &#8211; and stay apathetic to the consequences. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-34168","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/34168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=34168"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/34168\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=34168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=34168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=34168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}