FacebookTwitterGoogle+RedditEmail

Mass Surveillance is Driven by the Private Sector

Yet another report has surfaced describing how tools created by the malware-industrial complex are being deployed by U.S. security services. While the coverage surrounding this story focuses primarily on federal agencies it’s important to step back for a moment and view the big picture. In particular, looking at who builds, operates, and profits from mass surveillance technology offers insight into the nature of the global panopticon.

A report published by Privacy International as well as an article posted by Vice Motherboard clearly show that both the DEA and the United States Army have long-standing relationships with Hacking Team, an Italian company that’s notorious for selling malware to any number of unsavory characters.

Federal records indicate that the DEA and Army purchased Hacking Team’s Remote Control System (RCS) package. RCS is a rootkit, a software backdoor with lots of bells and whistles. It’s a product that facilitates a covert foothold on infected machines so intruders can quietly make off with sensitive data. The aforementioned sensitive data includes encryption keys. In fact, Hacking Team has an RCS brochure that tells potential customers:

“What you need is a way to bypass encryption, collect relevant data out of any device, and keep monitoring your targets wherever they are, even outside your monitoring domain”

[Note: Readers interested in nitty-gritty details about RCS can check out the Manuals online.]

It’s public knowledge that other federal agencies like the FBI and the CIA have become adept at foiling encryption. Yet this kind of subversion doesn’t necessarily bother high tech luminaries like Bruce Schneier, who believe that spying is “perfectly reasonable” as long as it’s targeted. Ditto that for Ed Snowden. Schneier and Snowden maintain that covert ops, shrouded by layers of official secrecy, are somehow compatible with democracy just so long as they’re narrow in scope.

But here’s the catch: RCS is designed and marketed as a means for mass collection. It violates the targeted surveillance condition. Specifically, a Hacking Team RCS brochure proudly states:

“’Remote Control System’ can monitor from a few and up to hundreds of thousands of targets. The whole system can be managed by a single easy to use interface that simplifies day by day investigation activities.”

Does this sound like a product built for targeted collection?

So there you have it. Subverting encryption en masse compliments of Hacking Team. The fact that there’s an entire industry of companies just like this should give one pause as there are unsettling ramifications regarding the specter of totalitarian control.

Corporate America is Mass Surveillance

Throughout the Snowden affair there’s a theme that recurs. It appeared recently in a foreword written by Glenn Greenwald for Tom Engelhardt’s book Shadow Government:

“I really don’t think there’s any more important battle today than combating the surveillance state [my emphasis]. Ultimately, the thing that matters most is that the rights that we know we have as human beings are rights that we exercise.”

There’s a tendency to frame mass surveillance in terms of the state. As purely a result of government agencies like the CIA and NSA. The narrative preferred by the far right is one which focuses entirely on the government (the so-called “surveillance state”) as the sole culprit, completely ignoring the corporate factions that fundamentally shape political decision making.

American philosopher John Dewey once observed that “power today resides in control of the means of production, exchange, publicity, transportation and communication. Whoever owns them rules the life of the country,” even under the pretense of democratic structures[1].

There are some 1300 billionaires in the United States who can testify to this fact. As can anyone following the developments around the secretive Trans-Pacific Partnership.

Dewey’s observation provides a conceptual basis for understanding how business interests drive the global surveillance apparatus. Mass surveillance is a corporate endeavor because the people who inevitably drive decisions are the same ones who control the resources. For example, the backbone of the internet itself consists of infrastructure run by Tier 1 providers like Verizon and Level 3 Communications. These companies are in a perfect position to track users and that’s exactly what they do.

Furthermore when spying is conducted it’s usually executed, in one form or another, by business interests. Approximately 70 percent of the national intelligence budget end up being channeled to defense contractors. Never mind that the private sector’s surveillance machinery dwarfs the NSA’s as spying on users is an integral part of high tech’s business model. Internet companies like Google operate their services by selling user information to the data brokers. The data broker industry, for example, generates almost $200 billion a year in revenue. That’s well over twice the entire 2014 U.S. intelligence budget.

From a historical vantage point it’s imperative to realize that high tech companies are essentially the offspring of the defense industry. This holds true even today as companies like Google are heavily linked with the Pentagon. For decades (going back to the days of Crypto AG) the private sector has collaborated heavily with the NSA’s in its campaign of mass subversion: the drive to insert hidden back doors and weaken encryption protocols across the board. Companies have instituted “design changes” that make computers and network devices “exploitable.” It’s also been revealed that companies like Microsoft have secret agreements with U.S. security services to provide information on unpublished vulnerabilities in exchange for special benefits like access to classified intelligence.

In a nutshell: contrary to talking points that depict hi-tech companies as our saviors, they’re more often accomplices if not outright perpetrators of mass surveillance. And you can bet that CEOs will devote significant resources towards public relations campaigns aimed at obscuring this truth.

Denouement

A parting observation: the current emphasis on Constitutional freedom neglects the other pillar of the Constitution: equality. Concentrating intently on liberty while eschewing the complementary notion of equality leads to the sort of ugly practices that preceded the Civil War. In fact there are those who would argue that society is currently progressing towards something worse, a reality by the way that the financial elite are well aware of. When the public’s collective misery reaches a tipping point, and people begin to mobilize, the digital panopticon of the ruling class will be leveraged to preserve social control. They’ll do what they’ve always done, tirelessly work to maintain power and impose hierarchy.

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, includingThe Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs.

Notes.

[1] The Later Works of John Dewey, 1925-1953, Volume 9: 1933-1934, Essays, Reviews, Miscellany, and A Common Faith, Southern Illinois University Press, 2008, page 76.

More articles by:

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

February 19, 2019
Richard Falk – Daniel Falcone
Troublesome Possibilities: The Left and Tulsi Gabbard
Patrick Cockburn
She Didn’t Start the Fire: Why Attack the ISIS Bride?
Evaggelos Vallianatos
Literature and Theater During War: Why Euripides Still Matters
Maximilian Werner
The Night of Terror: Wyoming Game and Fish’s Latest Attempt to Close the Book on the Mark Uptain Tragedy
Conn Hallinan
Erdogan is Destined for Another Rebuke in Turkey
Nyla Ali Khan
Politics of Jammu and Kashmir: The Only Viable Way is Forward
Mark Ashwill
On the Outside Looking In: an American in Vietnam
Joyce Nelson
Sir Richard Branson’s Venezuelan-Border PR Stunt
Ron Jacobs
Day of Remembrance and the Music of Anthony Brown        
Cesar Chelala
Women’s Critical Role in Saving the Environment
February 18, 2019
Paul Street
31 Actual National Emergencies
Robert Fisk
What Happened to the Remains of Khashoggi’s Predecessor?
David Mattson
When Grizzly Bears Go Bad: Constructions of Victimhood and Blame
Julian Vigo
USMCA’s Outsourcing of Free Speech to Big Tech
George Wuerthner
How the BLM Serves the West’s Welfare Ranchers
Christopher Fons
The Crimes of Elliot Abrams
Thomas Knapp
The First Rule of AIPAC Is: You Do Not Talk about AIPAC
Mitchel Cohen
A Tale of Two Citations: Rachel Carson’s “Silent Spring” and Michael Harrington’s “The Other America”
Jake Johnston
Haiti and the Collapse of a Political and Economic System
Dave Lindorff
It’s Not Just Trump and the Republicans
Laura Flanders
An End to Amazon’s Two-Bit Romance. No Low-Rent Rendezvous.
Patrick Walker
Venezuelan Coup Democrats Vomit on Green New Deal
Natalie Dowzicky
The Millennial Generation Will Tear Down Trump’s Wall
Nick Licata
Of Stress and Inequality
Joseph G. Ramsey
Waking Up on President’s Day During the Reign of Donald Trump
Elliot Sperber
Greater Than Food
Weekend Edition
February 15, 2019
Friday - Sunday
Matthew Hoh
Time for Peace in Afghanistan and an End to the Lies
Chris Floyd
Pence and the Benjamins: An Eternity of Anti-Semitism
Rob Urie
The Green New Deal, Capitalism and the State
Jim Kavanagh
The Siege of Venezuela and the Travails of Empire
Paul Street
Someone Needs to Teach These As$#oles a Lesson
Andrew Levine
World Historical Donald: Unwitting and Unwilling Author of The Green New Deal
Jeffrey St. Clair
Roaming Charges: Third Rail-Roaded
Eric Draitser
Impacts of Exploding US Oil Production on Climate and Foreign Policy
Ron Jacobs
Maduro, Guaidó and American Exceptionalism
John Laforge
Nuclear Power Can’t Survive, Much Less Slow Climate Disruption
Joyce Nelson
Venezuela & The Mighty Wurlitzer
Jonathan Cook
In Hebron, Israel Removes the Last Restraint on Its Settlers’ Reign of Terror
Ramzy Baroud
Enough Western Meddling and Interventions: Let the Venezuelan People Decide
Robert Fantina
Congress, Israel and the Politics of “Righteous Indignation”
Dave Lindorff
Using Students, Teachers, Journalists and other Professionals as Spies Puts Everyone in Jeopardy
Kathy Kelly
What it Really Takes to Secure Peace in Afghanistan
Brian Cloughley
In Libya, “We Came, We Saw, He Died.” Now, Maduro?
Nicky Reid
The Councils Before Maduro!
Gary Leupp
“It’s All About the Benjamins, Baby”
FacebookTwitterGoogle+RedditEmail