{"id":42747,"date":"2014-05-12T12:00:41","date_gmt":"2014-05-12T11:00:41","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=42747"},"modified":"2015-05-05T21:35:00","modified_gmt":"2015-05-05T20:35:00","slug":"willing-accomplices-the-nsas-corporate-collaborators","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/05\/willing-accomplices-the-nsas-corporate-collaborators\/","title":{"rendered":"Willing Accomplices: The NSA\u2019s Corporate Collaborators"},"content":{"rendered":"<p style=\"text-align: left;\">Emails published by Al Jazeera America, in addition to showing hi-tech executives and senior intelligence officials interacting on a casual first-name basis, reference a government program referred to as the Enduring Security Framework (ESF) [1]. An NPR piece on the ESF back in 2012 offers a nutshell summary of what this initiative is all about [2]:<\/p>\n<p style=\"text-align: left;\">\u201cFor each session, the CEOs get special, top-secret clearances so they can be told about the latest in cyberweaponry. They can then go back to their companies and take steps to deal with the threats they hear about, threats they may not previously have taken seriously. In the words of one government participant: We scare the bejeezus out of them\u201d<\/p>\n<p style=\"text-align: left;\">This description reinforces the notion that the big bad NSA somehow coerced hi-tech companies into collaboration. Since Ed Snowden\u2019s documents have trickled out into public view companies like Google have tried to distance themselves from the NSA [3], to make public displays of anger [4], to create the impression that they were somehow strong-armed into helping government spies [5] and that they\u2019ve been working to bolster their security against the NSA\u2019s prying eyes [6]. Above all hi-tech companies want to look like they\u2019re siding with their users [7].<\/p>\n<p style=\"text-align: left;\">These gestures are likely theater, being performed by executives on behalf of quarterly earnings. Such is the beauty of PR. Hi-tech companies don\u2019t really need to fend off government spies but merely provide users with the perception of resistance.<\/p>\n<p style=\"text-align: left;\">Keep in mind that social media survives by selling user data. Spying is their business model. In padding their bottom lines executives have worked diligently to dilute privacy legislation [8] in addition to garnering a myriad of fines [9]. All of this data harvesting services a data broker industry which generates something in the neighborhood of $200 billion in revenue annually [10].<\/p>\n<p style=\"text-align: left;\">Those who resist government pressure like Nicholas Merrill, who was running an Internet service provider in New York called Calyx, and Ladar Levison, the former owner of Lavabit, are rare exceptions to the rule. For the big multinationals too much money is at stake to let something like civil liberties get in the way. Google\u2019s Larry Page opines that [11]:<\/p>\n<p style=\"text-align: left;\">\u201cThere\u2019s many, many exciting and important things you could do that you just can\u2019t do because they\u2019re illegal or they\u2019re not allowed by regulation\u201d<\/p>\n<p style=\"text-align: left;\">Though the Washington Post may imply otherwise [12], in reality as far as the National Security State is concerned there is very little dividing line between the public sector and the private sector. According to Heidi Boghosian, the executive director of the National Lawyers Guild [13]:<\/p>\n<p style=\"text-align: left;\">\u201cPeople need to know that for all intents and purposes, the distinction right now between government and the corporate world is virtually nil. They are hand-in-hand working to gather information about Americans as well as people across the globe, to really be in a race to collect more information than any other country can, because I think in their eyes, having this information, storing it, and being able to access it for years on end is a symbol of power and control. So that you can\u2019t really make that distinction anymore between big business and government.\u201d<\/p>\n<p style=\"text-align: left;\">Glenn Greenwald echoed this point after the Polk Award ceremony [14]:\u00a0\u201dThere almost is no division between the private sector and the NSA, or the private sector and the Pentagon, when it comes to the American national security state. They really are essentially one.\u201d<\/p>\n<p style=\"text-align: left;\">Despite Eric Schmidt\u2019s vocal tirade over NSA spying [15], Google is linked tightly with the elements of the defense industry (e.g. SAIC, Lockheed Martin, Northrop Grumman, and Blackbird) [16] and is no stranger to covert<br \/>\ncooperation with the U.S. government. For example, in an e-mailed published by WikiLeaks Fred Burton, a former State Department official and a VP at Stratfor, described the director of Google Ideas, Jared Cohen, as involved in secret missions near the Iranian border with the support of the White House and the State Department [17]. Ostensibly Burton heard this from Eric Schmidt.<\/p>\n<p style=\"text-align: left;\">When a provider like Amazon is awarded a $600 million 10-year contract to provide the CIA with cloud services [18] do you suppose that Amazon is inclined to cater to government requests? Think of it this way: Roughly 70% of the intelligence budget goes to the private sector [19]. There are incentives for executives to go along.<\/p>\n<p style=\"text-align: left;\">Years ago the banking industry single-handedly used its resources to push through the Gramm-Leach-Bliley Act, effectively repealing the protections of Glass-Steagall, in addition to deregulating the market for derivatives with the Commodity Futures Modernization Act of 2000. If the moneyed elite don\u2019t like certain laws, in the absence of a strong countervailing public opinion, they have the means to impose change. Their influence isn\u2019t total but history has shown that it\u2019s often sufficient.<\/p>\n<p style=\"text-align: left;\">Yahoo has been known to help Chinese officials identify citizens who make critical remarks about the Chinese government [20]. According to news reports from overseas, Microsoft has redesigned Skype so that government security forces in countries like Russia can tap into and monitor Skype traffic [21]. Companies like Microsoft (sitting on 60 billion in cash [22]) or Apple (sitting on $147 billion in cash [23]) aren\u2019t exactly defenseless. Corporate spies choose to collaborate with government spies because the benefits outweigh the negative consequences.<\/p>\n<p style=\"text-align: left;\"><strong>Notes:<\/strong><\/p>\n<p style=\"text-align: left;\">[1] Jason Leopold, \u201cExclusive: Emails reveal close Google relationship with NSA,\u201d Al Jazeera America, May 6, 2013,\u00a0<a target=\"_blank\" href=\"http:\/\/america.aljazeera.com\/articles\/2014\/5\/6\/nsa-chief-google.html\" >http:\/\/america.aljazeera.com\/articles\/2014\/5\/6\/nsa-chief-google.html<\/a><\/p>\n<p style=\"text-align: left;\">[2] Tom Gjelten, \u201cCyber Briefings \u2018Scare The Bejeezus\u2019 Out Of CEOs,\u201d NPR, May 9, 2012,\u00a0<a target=\"_blank\" href=\"http:\/\/www.npr.org\/templates\/transcript\/transcript.php?storyId=152296621\" >http:\/\/www.npr.org\/templates\/transcript\/transcript.php?storyId=152296621<\/a><\/p>\n<p style=\"text-align: left;\">[3] Craig Timberg and Tom Hamburger, \u201cTech executives visit White House to discuss online surveillance issues with Obama,\u201d Washington Post, March 21, 2014,<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/business\/technology\/tech-ceos-to-meet-with-obama-this-afternoon\/2014\/03\/21\/dfdd7140-b109-11e3-95e8-39bef8e9a48b_story.html\" >http:\/\/www.washingtonpost.com\/business\/technology\/tech-ceos-to-meet-with-obama-this-afternoon\/2014\/03\/21\/dfdd7140-b109-11e3-95e8-39bef8e9a48b_story.html<\/a><\/p>\n<p style=\"text-align: left;\">[4] Andy Greenberg, \u201cZuckerberg Says He Called Obama To Express \u2018Frustration\u2019 Over NSA Surveillance,\u201d Forbes, March 13, 2014,<a target=\"_blank\" href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2014\/03\/13\/zuckerberg-says-he-called-obama-to-express-frustration-over-nsa-surveillance\/\" >http:\/\/www.forbes.com\/sites\/andygreenberg\/2014\/03\/13\/zuckerberg-says-he-called-obama-to-express-frustration-over-nsa-surveillance\/<\/a><\/p>\n<p style=\"text-align: left;\">[5] Dominic Rushe, \u201cZuckerberg: US government \u2018blew it\u2019 on NSA surveillance,\u201d Guardian, September 11, 2013,<a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/technology\/2013\/sep\/11\/yahoo-ceo-mayer-jail-nsa-surveillance\" >http:\/\/www.theguardian.com\/technology\/2013\/sep\/11\/yahoo-ceo-mayer-jail-nsa-surveillance<\/a><\/p>\n<p style=\"text-align: left;\">[6] Craig Timberg, \u201cGoogle encrypts data amid backlash against NSA spying,\u201d Washington Post, September 6, 2013,<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/business\/technology\/google-encrypts-data-amid-backlash-against-nsa-spying\/2013\/09\/06\/9acc3c20-1722-11e3-a2ec-b47e45e6f8ef_story.html\" >http:\/\/www.washingtonpost.com\/business\/technology\/google-encrypts-data-amid-backlash-against-nsa-spying\/2013\/09\/06\/9acc3c20-1722-11e3-a2ec-b47e45e6f8ef_story.html<\/a><\/p>\n<p style=\"text-align: left;\">[7] Craig Timberg, \u201cApple, Facebook, others defy authorities, notify users of secret data demands,\u201d Washington Post, May 1, 2014,<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/business\/technology\/apple-facebook-others-defy-authorities-increasingly-notify-users-of-secret-data-demands-after-snowden-revelations\/2014\/05\/01\/b41539c6-cfd1-11e3-b812-0c92213941f4_story.html\" >http:\/\/www.washingtonpost.com\/business\/technology\/apple-facebook-others-defy-authorities-increasingly-notify-users-of-secret-data-demands-after-snowden-revelations\/2014\/05\/01\/b41539c6-cfd1-11e3-b812-0c92213941f4_story.html<\/a><\/p>\n<p style=\"text-align: left;\">[8] Melissa Eddy And James Kanter, \u201cMerkel Urges Europe to Tighten Internet Safeguards,\u201d New York Times, July 15, 2013,<a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/07\/16\/world\/europe\/merkel-urges-europe-to-tighten-internet-safeguards.html\" >http:\/\/www.nytimes.com\/2013\/07\/16\/world\/europe\/merkel-urges-europe-to-tighten-internet-safeguards.html<\/a><\/p>\n<p style=\"text-align: left;\">[9] Claire Cain Miller, \u201cF.T.C. Fines Google $22.5 Million for Safari Privacy Violations,\u201d New York Times, August 9, 2012,\u00a0<a target=\"_blank\" href=\"http:\/\/bits.blogs.nytimes.com\/2012\/08\/09\/f-t-c-fines-google-22-5-million-for-safari-privacy-violations\/\" >http:\/\/bits.blogs.nytimes.com\/2012\/08\/09\/f-t-c-fines-google-22-5-million-for-safari-privacy-violations\/<\/a><\/p>\n<p style=\"text-align: left;\">[10] Yasha Levine, \u201cWhat Surveillance Valley knows about you,\u201d Pando Daily, December 22, 2013,\u00a0<a target=\"_blank\" href=\"http:\/\/pando.com\/2013\/12\/22\/a-peek-into-surveillance-valley\/\" >http:\/\/pando.com\/2013\/12\/22\/a-peek-into-surveillance-valley\/<\/a><\/p>\n<p style=\"text-align: left;\">[11] Claire Cain Miller, \u201cGoogle Gives a Hint About Its Mystery Barges,\u201d New York Times, November 6, 2013,\u00a0<a target=\"_blank\" href=\"http:\/\/bits.blogs.nytimes.com\/2013\/11\/06\/google-gives-a-hint-about-its-mystery-barges\/?_php=true&amp;_type=blogs&amp;_r=0\" >http:\/\/bits.blogs.nytimes.com\/2013\/11\/06\/google-gives-a-hint-about-its-mystery-barges\/?_php=true&amp;_type=blogs&amp;_r=0<\/a><\/p>\n<p style=\"text-align: left;\">[12] Brian Fung, \u201cNSA e-mails purport to show a \u2018close\u2019 relationship with Google. Maybe, maybe not,\u201d Washington Post, May 6, 2014,<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/05\/06\/nsa-e-mails-purport-to-show-a-close-relationship-with-google-maybe-maybe-not\/?print=1\" >http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/05\/06\/nsa-e-mails-purport-to-show-a-close-relationship-with-google-maybe-maybe-not\/\/?print=1<\/a><\/p>\n<p style=\"text-align: left;\">[13] \u201cSegment: Heidi Boghosian on Spying and Civil Liberties,\u201d Moyers and Company, November 8, 2013,\u00a0<a target=\"_blank\" href=\"http:\/\/billmoyers.com\/wp-content\/themes\/billmoyers\/transcript-print.php?post=48454\" >http:\/\/billmoyers.com\/wp-content\/themes\/billmoyers\/transcript-print.php?post=48454<\/a><\/p>\n<p style=\"text-align: left;\">[14] \u201c\u201dWe Won\u2019t Succumb to Threats\u201d: Journalists Return to U.S. for First Time Since Revealing NSA Spying,\u201d Democracy Now! April 14, 2014,<a target=\"_blank\" href=\"http:\/\/www.democracynow.org\/2014\/4\/14\/we_wont_succumb_to_threats_journalists\" >http:\/\/www.democracynow.org\/2014\/4\/14\/we_wont_succumb_to_threats_journalists#<\/a><\/p>\n<p style=\"text-align: left;\">[15] Deborah Kan, \u201cGoogle\u2019s Eric Schmidt Lambasts NSA Over Spying,\u201d Wall Street Journal, November 4, 2013,<a target=\"_blank\" href=\"http:\/\/online.wsj.com\/news\/articles\/SB10001424052702304391204579177104151435042\" >http:\/\/online.wsj.com\/news\/articles\/SB10001424052702304391204579177104151435042<\/a><\/p>\n<p style=\"text-align: left;\">[16] Yasha Levine, \u201cThe revolving door between Google and the Department of Defense,\u201d Pando Daily, April 23, 2014,\u00a0<a target=\"_blank\" href=\"http:\/\/pando.com\/2014\/04\/23\/the-revolving-door-between-google-and-the-department-of-defense\/\" >http:\/\/pando.com\/2014\/04\/23\/the-revolving-door-between-google-and-the-department-of-defense\/<\/a><\/p>\n<p style=\"text-align: left;\">[17] Julian Assange, \u201cGoogle and the NSA: Who\u2019s holding the \u2018shit-bag\u2019 now?,\u201d Stringer, August 24, 2013,\u00a0<a target=\"_blank\" href=\"http:\/\/thestringer.com.au\/google-and-the-nsa-whos-holding-the-shit-bag-now\/#.UzC6EVdBdUo\" >http:\/\/thestringer.com.au\/google-and-the-nsa-whos-holding-the-shit-bag-now\/#.UzC6EVdBdUo<\/a><\/p>\n<p style=\"text-align: left;\">[18] Frank Konkel, \u201cSources: Amazon and CIA ink cloud deal,\u201d FCW, March 18, 2013,\u00a0<a target=\"_blank\" href=\"http:\/\/fcw.com\/articles\/2013\/03\/18\/amazon-cia-cloud.aspx\" >http:\/\/fcw.com\/articles\/2013\/03\/18\/amazon-cia-cloud.aspx<\/a><\/p>\n<p style=\"text-align: left;\">[19] \u201cDigital Blackwater: How the NSA Gives Private Contractors Control of the Surveillance State,\u201d Democracy Now! June 11, 2013,<a target=\"_blank\" href=\"http:\/\/www.democracynow.org\/2013\/6\/11\/digital_blackwater_how_the_nsa_gives\" >http:\/\/www.democracynow.org\/2013\/6\/11\/digital_blackwater_how_the_nsa_gives#<\/a><\/p>\n<p style=\"text-align: left;\">[20] Yasha Levine, \u201cRentacops on desktops: Edward Snowden\u2019s dismissal of Surveillance Valley is wrong, and dangerous,\u201d Pando Daily, December 30, 2013,<a target=\"_blank\" href=\"http:\/\/pando.com\/2013\/12\/30\/rentacops-on-desktops-edward-snowdens-dangerous-dismissal-of-surveillance-valley\/\" >http:\/\/pando.com\/2013\/12\/30\/rentacops-on-desktops-edward-snowdens-dangerous-dismissal-of-surveillance-valley\/<\/a><\/p>\n<p style=\"text-align: left;\">[21] RAPSI, \u201cFSB, Russian police could tap Skype without court order,\u201d March 14, 2013, Moscow News,<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.themoscownews.com\/russia\/20130314\/191336455\/FSB-Russian-police-could-tap-Skype-without--court-order.html\" >http:\/\/www.themoscownews.com\/russia\/20130314\/191336455\/FSB-Russian-police-could-tap-Skype-without\u2013court-order.html<\/a><\/p>\n<p style=\"text-align: left;\">[22] Juliette Garside, \u201cMicrosoft Windows performance helps cash reserves grow by $5bn in six months,\u201d Guardian, January 24, 2013,<a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/technology\/2013\/jan\/24\/microsoft-cash-reserves-grow-5-billion\/print\" >http:\/\/www.theguardian.com\/technology\/2013\/jan\/24\/microsoft-cash-reserves-grow-5-billion\/print<\/a><\/p>\n<p style=\"text-align: left;\">[23] Emily Chasan, \u201cApple Now Holds 10% of All Corporate Cash: Moody\u2019s,\u201d Wall Street Journal, October 1, 2013,\u00a0<a target=\"_blank\" href=\"http:\/\/blogs.wsj.com\/cfo\/2013\/10\/01\/applenow-holds-10-of-all-corporate-cash-moodys\/?mod=trending_now_3\" >http:\/\/blogs.wsj.com\/cfo\/2013\/10\/01\/applenow-holds-10-of-all-corporate-cash-moodys\/?mod=trending_now_3<\/a><\/p>\n<p style=\"text-align: left;\">_____________________________<\/p>\n<p style=\"text-align: left;\"><em>Bill Blunden<\/em><em>\u00a0is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including\u00a0<a target=\"_blank\" href=\"http:\/\/www.amazon.com\/exec\/obidos\/ASIN\/144962636X\/counterpunchmaga\" >The Rootkit Arsenal<\/a>\u00a0, and\u00a0<a target=\"_blank\" href=\"http:\/\/www.amazon.com\/exec\/obidos\/ASIN\/1937584801\/counterpunchmaga\" >Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex<\/a>. Bill is the lead investigator at Below Gotham Labs.<\/em><\/p>\n<p style=\"text-align: left;\"><a target=\"_blank\" href=\"http:\/\/www.counterpunch.org\/2014\/05\/09\/the-nsas-corporate-collaborators\/\" >Go to Original \u2013 counterpunch.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>These gestures are likely theater, being performed by executives on behalf of quarterly earnings. Such is the beauty of PR. Hi-tech companies don\u2019t really need to fend off government spies but merely provide users with the perception of resistance.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-42747","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/42747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=42747"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/42747\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=42747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=42747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=42747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}