US firms in bed with intelligence agencies in info swap – report
RT | June 14, 2013
Thousands of US tech, finance, and manufacturing firms have secret agreements with national security agencies to trade sensitive information in return for classified intelligence, Bloomberg’s sources revealed.
The firms involved are referred to as ‘trusted partners’ by US intelligence organizations such as the National Security Agency (NSA), Central Intelligence Agency (CIA), the Federal Bureau of Investigation (FBI) and branches of US military.
In fact, thousands of US companies voluntarily provide US agencies with data (i.e. equipment specifications), Bloomberg’s four sources, who either worked for the government or in companies that have these agreements, said. And the information received can be used to gain access to computers of America’s rivals.
Cooperation between companies and intelligence agencies is legal, reported Bloomberg. And the fact that the companies provide information voluntarily means there is no need for US agencies to get court orders and no oversight is required under the Foreign Intelligence Surveillance Act, one out of four sources said.
Also, some of the companies’ executives are guaranteed immunity from civil actions related to transfer of information.
For example, Microsoft passes on information about bugs in its software before it publicly releases a fix to the problem, two sources confirmed. This kind of information can protect US government computers, as well as help to infiltrate those used by foreign governments by exploiting vulnerabilities in the Microsoft’s system.
Microsoft is reportedly not told how the US government uses the information passed on down to it, according to one official. Spokesman for Microsoft Frank Shaw confirmed such releases and stated that they give the government a chance to get “an early start: on risk assessment and mitigation.”
McAfee, America’s global computer security software company, is another ‘trusted partner’ and is known for its cooperation with the NSA, CIA, and FBI. It can share valuable data including malicious internet traffic, one of the sources said.
The company’s worldwide chief technology officer, Michael Fey, rebuffed the claim that the company does not share any personal information with the government.
“McAfee’s function is to provide security technology, education, and threat intelligence to governments … [including] emerging new threats, cyber-attack patterns and hacker group activity,” he stated.
Due to the sensitivity of information being traded, these kinds of agreements are usually made strictly between companies’ chief executive officers and heads of the US agencies. At times the chief executives could clear a few trusted people to work directly with the agencies.
Sharing info: Out of ‘patriotism’ or for ‘classified’ info?
In return for their cooperation, companies are showered with attention and gratitude.
“If I were the director and had a relationship with a company who was doing things that were not just directed by law, but were also valuable to the defense of the Republic, I would go out of my way to thank them and give them a sense as to why this is necessary and useful”, Michael Hayden, former director of the NSA and the CIA said.
One of the sources said that public would be surprised how much help the government is seeking in terms of collecting information. Reportedly, it is currently implementing a new expensive program called Einstein 3. The program was developed by the NSA to protect the government from hackers by analyzing billions of emails being sent to the government computers.
Five of America’s major internet companies, including AT&T and Verizon, have agreed to install the program on their servers and have received immunity guarantees, which specify that they would not be held liable under US wiretap laws, one of the sources revealed.
In the past companies like AT&T, Verizon and BellSouth were already reportedly involved for eavesdropping on behalf of the NSA. In 2006 sources revealed that the companies collected call records of tens of millions of Americans and shared them with NSA.
US companies are willing to participate in these kinds of agreements because they either believe they are helping to protect the nation and/or helping to advance their own interests by receiving classified information in return, sources said.
Google’s co-founder Sergey Brin, for example, was given sensitive government information a year into its data sharing agreement with NSA. The info provided linked the 2010 attack on Google to a specific unit within the Chinese military – the People’s Liberation Army – one of the sources confirmed. Brin was even given a classified clearance to attend a secret briefing on the subject.
Google was reportedly one of the participants in the secret NSA PRISM program that was revealed by ex-CIA staffer and whistleblower Edward Snowden. The program uses data mining surveillance to access emails, videos, chats, photos and search queries from nine worldwide tech giants.
Snowden also disclosed a secret NSA program called Blarney, which gathers metadata on computers and devices that send emails or browse the Internet through principal data routes, known as a backbone.
The whistleblower was last seen Monday, checking out of his hotel in Hong Kong, where he stayed for three weeks after leaving the US.
Snowden is hoping that staying in Hong Kong would help him avoid any extradition attempts on behalf of the US. In terms of the US-Hong Kong Extradition Treaty, both Hong Kong and Beijing have the power to stymie Snowden’s extradition. China for its part has no extradition treaty with the United States.
China has thus far refrained from making statements on the Snowden case. But a popular Chinese Communist Party-backed newspaper has printed an article demonstrating the benefits of not sending Snowden back to US, arguing that his knowledge of US surveillance programs are key to China’s national interest.
The article comes after Snowden resurfaced and gave an exclusive interview to the South China Morning Post, revealing top-secret US government records that show dates and IP addresses of computers in Hong Kong and on the mainland that were hacked by the NSA over a four-year period.
In the meantime, the FBI has launched an investigation into Snowden leaking US top secret surveillance tactics and has promised to hold the whistleblower accountable.
Related article
- Snowden Shows South China Morning Post Details of NSA Hacking in China (nakedcapitalism.com)
Share this:
Related
June 14, 2013 - Posted by aletho | Civil Liberties, Corruption, Deception, Full Spectrum Dominance, Timeless or most popular | Central Intelligence Agency, CIA, Crime, Hacking, Human rights, Information Technology, National Security Agency, NSA, Security, United States, USA
No comments yet.
Featured Video
U.S. General Caine Warns: STRIKING IRAN is a HUGE RISK
or go to
Aletho News Archives – Video-Images
From the Archives
Stealth Bombers and Bunker Busters
Analysis of the so-called 12-Day War, and the triumphantly celebrated Operation Midnight Thunder

By William Schryver | imetatronink | November 28, 2025
The GBU-57 is a big fat gravity bomb with fins. To achieve effective precision, a B-2 bomber must drop it on its intended target from no further than about five nautical miles — essentially right on top of the target.
Its penetration depth is claimed to be 200 feet. But that capability has NEVER been tested against a seriously hardened deep-underground target encased in layers of high-performance concrete, and topped with a few dozen meters of solid rock. In that sort of real-world scenario, the GBU-57 would be lucky to drill down 50 feet, if that.
It was always ridiculous silly talk to suggest the GBU-57 was the wonder weapon it was made out to be. There is a good reason the US only produced a couple dozen of them and then stopped: they understood its acute limitations in a non-permissive combat environment.
And, notwithstanding the hyperbolic Israeli propaganda, there was never any credible evidence that Iranian medium- and long-range air defenses against fixed-wing aircraft were attrited to any significant degree. And Iranian short-range air defenses were increasingly effective against long-range Israeli drones with each passing day.
As for the B-2: it is a big fat subsonic aircraft. It flies at airliner speeds. A strike on Fordow would entail flying at least 500 miles in and out of Iran. … continue
Blog Roll
-
Join 2,403 other subscribers
Visits Since December 2009
- 7,392,796 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen Zionism
Aletho News- Drug traffickers trained in Ukraine attack state forces in Mexico
- The tragic reality of Brazilian mercenaries in the Ukrainian conflict
- Zelensky Refused to Discuss Druzhba Pipeline Issue – Fico
- U.S. General Caine Warns: STRIKING IRAN is a HUGE RISK /Glenn Diesen & Lt Col Daniel Davis
- Israel designates five Palestinian media outlets as ‘terrorist organizations’
- Israel, not America, first: Carlson’s Huckabee interview lays bare US foreign policy priorities
- Israeli troops executed Palestinian aid workers at ‘point blank range’: Report
- Iran war What if today’s Iran is resigned to a long, hellish war with the US?
- Why Israel Is Escalating Its War Crimes Against Lebanon
- Iran in the face of the armed diplomacy of imperialism
If Americans Knew- The NY Times on the “MAGA” Split Over Israel & USS Liberty
- In Gaza, Ramadan without mosques, imams – Not a ceasefire Day 137
- Footage Shows Israeli Troops Waiting in Ambush, Then Opening Fire on a Palestinian Teen
- The US is on the brink of a major new war that Trump has not even bothered explaining
- Latest Epstein document dump is one more cover-up
- No Protection, No Justice: US Citizens Killed with Impunity by Israel
- Maria Farmer: Epstein Victim Reveals Explosive Information Covered Up by Media
- Average of five Palestinians killed by Israel every day in Gaza since ceasefire – Not a ceasefire Day 136
- Palestinian church leaders admonish Christian Zionist Mike Huckabee – Not a ceasefire Day 135
- Ominous messaging from Trump’s “Board of Peace” – Not a ceasefire Day 134
No Tricks Zone- Surprising Discovery: Sahara Is Greening…Billions Of Trees Where Once Thought To Be Barren
- New Research Reaffirms Clouds, Aerosols, And Surface Solar Radiation Are ‘Driving The Climate System’
- Germany: Electric Car Catches Fire At Charging Station, Sets Off Local “Inferno”, Widespread Damage
- New Study: Canada’s New Brunswick Was 1°C Warmer Than Today During The Medieval Warm Period
- Coal Power Back In Trend As Globe Tries To Keep Pace With Growing Demand For Power
- New Study: A 4°C Warmer Beaufort Sea Had ‘No Sea Ice’ 11,700 – 8200 Years Ago
- Unfudging The Data: Dutch Meteorological Institute Reinstates Early 20th Centruy Heat Waves It Had Erased Earlier
- German Gas Crisis…Chancellor Merz Allegedly Bans Gas Debate Ahead of Elections!
- Pollen Reconstructions Show The Last Glacial’s Warming Events Were Global, 10x Greater Than Modern
- Germany’s Natural Gas Storage Level Dwindles To Just 28%… Increasingly Critical
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.

Leave a comment