Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.
These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc (GOOG). and other Internet companies under court order.
Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.
Along with the NSA, the Central Intelligence Agency (0112917D), the Federal Bureau of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords.
While cyberspace may be global, its infrastructure most definitely is not.
For example, a huge proportion of global Internet traffic flows through networks controlled by the United States, simply because eight of 15 global tier 1 telecommunications companies are American -- companies like AT&T, CenturyLink, XO Communications and, significantly, Verizon.
The social media services that many of us take for granted are also mostly provided by giants headquartered in the United States, like Google, Facebook, Yahoo! and Twitter. All of these companies are subject to U.S. law, including the provisions of the U.S. Patriot Act, no matter where their services are offered or their servers located. Having the world's Internet traffic routed through the U.S. and having those companies under its jurisdiction give U.S. national security agencies an enormous home-field advantage that few other countries enjoy.
Thursday, the Guardian released a poll conducted on Monday and Tuesday nights by Public Policy Polling looking at America's reaction to the National Security Agency (NSA) controversy. The public appears to be reacting negatively to the revelations – and it seems to be hurting President Obama.
We found 50% of American voters believe the NSA should not be collecting telephone or internet records, compared to the 44% who think they should. The results hold even when respondents were told that the data the government is collecting is "metadata" (and not necessarily actual content of communications).
These results are consistent with a CBS News poll, Fox News poll, and YouGov survey that showed only 38%, 32%, and 35% of Americans respectively approved of phone record collection in order to reduce the chance of a terrorist attack. A Gallup poll was consistent with these, showing only 37% approved monitoring of Americans' phone and internet use.
CBS News announced Friday that correspondent Sharyl Attkisson's computer was hacked by "an unauthorized, external, unknown party on multiple occasions," confirming Attkisson's previous revelation of the hacking.
CBS News spokeswoman Sonya McNair said that a cybersecurity firm hired by CBS News "has determined through forensic analysis" that "Attkisson's computer was accessed by an unauthorized, external, unknown party on multiple occasions in late 2012."
"Evidence suggests this party performed all access remotely using Attkisson's accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data. This party also used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion. CBS News is taking steps to identify the responsible party and their method of access."