Advertisement
Edward Snowden
World

US security agencies swap data with thousands of companies

Programmes with 'trusted partners' extend far beyond what was revealed by Edward Snowden

4-MIN READ4-MIN
Illustration: Henry Wong

Thousands of technology, finance and manufacturing companies are working with US national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, said four people familiar with the process.

These programmes, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure that the NSA is collecting millions of US residents' telephone records and the computer communications of foreigners from Google and other internet companies under court order.

Many of these companies voluntarily provide US intelligence organisations with additional data, such as equipment specifications, that don't involve private communications of their customers, the four people said.

Advertisement

Makers of hardware and software, banks, internet security providers, satellite telecommunications firms and many other companies also participate in the programmes. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.

Along with the NSA, the Central Intelligence Agency, the Federal Bureau of Investigation and branches of the US military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of US intelligence or cyberwarfare units, according to the people, who have either worked for the government or in companies that have these accords.

Advertisement

Microsoft, the world's largest software firm, provides intelligence agencies with information about bugs in its software before it releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.

Advertisement
Select Voice
Select Speed
1.00x