"Alphabet's [Google] executive chairman, Eric Schmidt, recently joined a Department of Defense advisory panel. Facebook recently hired a former director at the U.S. military's research lab, Darpa. Uber employs Barack Obama's former campaign manager David Plouffe and Amazon.com tapped his former spokesman Jay Carney. Google, Facebook, Uber and Apple collectively employ a couple of dozen former analysts for America's spy agencies, who openly list their resumes on LinkedIn.

These connections are neither new nor secret. But the fact they are so accepted illustrates how tech's leaders -- even amid current fights over encryption and surveillance -- are still seen as mostly U.S. firms that back up American values. Christopher Soghoian, a technologist with the American Civil Liberties Union, said low-level employees' government connections matter less than leading executives' ties to government. For instance, at least a dozen Google engineers have worked at the NSA, according to publicly available records on LinkedIn. And, this being Silicon Valley, not everyone who worked for a spy agency advertises that on LinkedIn. Soghoian, a vocal critic of mass surveillance, said Google hiring an ex-hacker for the NSA to work on security doesn't really bother him. "But Eric Schmidt having a close relationship with the White House does..."

Source: https://www.theguardian.com/technology/201...

"The Intercept has obtained a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States.

The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that can be mounted on vehicles, drones, and piloted aircraft. Some are designed to be used at static locations, while others can be discreetly carried by an individual. They have names like Cyberhawk, Yellowstone, Blackfin, Maximus, Cyclone, and Spartacus. Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement. Nearly a third of the entries focus on equipment that seems to have never been described in public before."

Slides of the catalogue available here, while a stylised version is available here.

Source: https://theintercept.com/2015/12/17/a-secr...

Two articles from Medium by 'Insurge Intelligence,' a crowd-funded investigative journalism project, tell the story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain 'information superiority.'

By Nafeez Ahmed.

 

Part One: How the CIA made Google

From inception, in other words, Google was incubated, nurtured and financed by interests that were directly affiliated or closely aligned with the US military intelligence community: many of whom were embedded in the Pentagon Highlands Forum.

The US intelligence community’s incubation of Google from inception occurred through a combination of direct sponsorship and informal networks of financial influence, themselves closely aligned with Pentagon interests.

The Highlands Forum itself has used the informal relationship building of such private networks to bring together defense and industry sectors, enabling the fusion of corporate and military interests in expanding the covert surveillance apparatus in the name of national security. The power wielded by the shadow network represented in the Forum can, however, be gauged most clearly from its impact during the Bush administration, when it played a direct role in literally writing the strategies and doctrines behind US efforts to achieve ‘information superiority.’

Noting Google's genesis with DARPA funding, the expansion of the empire today in the realm of Google's actions with GeoEye and Keyhole; Boston Dynamics, DeepMind, Nest Labs, Dropcam, etc---the trajectory becomes clear.

 

Part Two: Why Google made the NSA

Mass surveillance is about control. It’s promulgators may well claim, and even believe, that it is about control for the greater good, a control that is needed to keep a cap on disorder, to be fully vigilant to the next threat. But in a context of rampant political corruption, widening economic inequalities, and escalating resource stress due to climate change and energy volatility, mass surveillance can become a tool of power to merely perpetuate itself, at the public’s expense.

A major function of mass surveillance that is often overlooked is that of knowing the adversary to such an extent that they can be manipulated into defeat. The problem is that the adversary is not just terrorists. It’s you and me. To this day, the role of information warfare as propaganda has been in full swing, though systematically ignored by much of the media.

Here, INSURGE INTELLIGENCE exposes how the Pentagon Highlands Forum’s co-optation of tech giants like Google to pursue mass surveillance, has played a key role in secret efforts to manipulate the media as part of an information war against the American government, the American people, and the rest of the world: to justify endless war, and ceaseless military expansionism.


Source: https://medium.com/@NafeezAhmed/how-the-ci...
The Australian government has been building a state-of-the art, secret data storage facility just outside Canberra to enable intelligence agencies to deal with a ‘’data deluge’’ siphoned from the internet and global telecommunications networks.

The high-security facility nearing completion at the HMAS Harman communications base will support the operations of Australia’s signals intelligence agency, the top-secret Defence Signals Directorate.

Privately labelled by one Defence official as ‘’the new black vault’’, the data centre is one of the few visible manifestations of Australia’s deep involvement in mass surveillance and intelligence collection operations such as the US National Security Agency’s PRISM program revealed last week by US intelligence leaker Edward Snowden.

Fairfax Media has confirmed Australian intelligence agencies receive what Defence intelligence officials describe as ‘’huge volumes’’ of ‘’immensely valuable’’ information derived from PRISM and other US signals intelligence collection programs.

Australian agencies assist the US to target foreign nationals and Australian citizens who are of security and intelligence interest to both countries.
Source: http://www.smh.com.au/it-pro/government-it...

Two part documentary from thoughtmaybe.com (About)

The United States of Secrets chronologically accounts the Bush administration’s embrace of illegal and widespread dragnet surveillance and eavesdropping programmes, along with President Obama’s decision to continue them and expand them (despite campaign promises to the contrary) by weaving narratives by those who sought to blow the whistle on these programmes over the decades—culminating with Edward Snowden’s unprecedented dump of insider documents in 2013. We see how and why those inside the NSA and other government agencies came to act; what actions were effective, and what role the mainstream media had and continues to have in keeping such secret projects alive and untouchable in the name of ‘national security.’
   Part 1 -- The Program    Part one details the emergence of a top secret project within the NSA called ‘The Program’ which was a series of mass-surveillance, capture, storage, and data analysis operations that expanded after the events of September 11, 2001. The Program drew on preceding decades of ‘national security’ measures charting back to the Regan administration and beyond, which were embraced by the regime of George W Bush, and expanded with the Obama administration. This first episode ties together the machinations of a dark world of secret surveillance, spoken by those who blew the whistle from the inside, and why.

Part 1 -- The Program

Part one details the emergence of a top secret project within the NSA called ‘The Program’ which was a series of mass-surveillance, capture, storage, and data analysis operations that expanded after the events of September 11, 2001. The Program drew on preceding decades of ‘national security’ measures charting back to the Regan administration and beyond, which were embraced by the regime of George W Bush, and expanded with the Obama administration. This first episode ties together the machinations of a dark world of secret surveillance, spoken by those who blew the whistle from the inside, and why.

   Part 2 -- Privacy Lost    Part two details how companies like Google and Facebook provide excellent data harvesting portals for intelligence agencies such as the NSA, by operating huge infrastructures for targeted advertising—which is is one and the same with surveillance.

Part 2 -- Privacy Lost

Part two details how companies like Google and Facebook provide excellent data harvesting portals for intelligence agencies such as the NSA, by operating huge infrastructures for targeted advertising—which is is one and the same with surveillance.

 Graphic from NSA showing the intent to upscale world-wide automated malware attacks and siphon data to DoD.

Graphic from NSA showing the intent to upscale world-wide automated malware attacks and siphon data to DoD.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

...

When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack.

The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter.

Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.

What’s more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.

Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.
Source: https://firstlook.org/theintercept/article...