Email exchanges between National Security Agency Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt suggest a far cozier working relationship betweensome tech firms and the U.S. governmentĀ than was implied by Silicon Valley brass after last yearās revelations about NSA spying.
Disclosures by former NSA contractor Edward Snowden about the agencyās vast capability for spying on Americansā electronic communications prompted a number of tech executives whose firms cooperated with the government to insist they had done so only when compelled by a court of law.
But Al Jazeera has obtained two sets of email communications dating from a year before Snowden became a household name that suggest not all cooperation was under pressure.
On the morning of June 28, 2012, an email from Alexander invited Schmidt to attend a four-hour-long āclassified threat briefingā on Aug. 8 at a āsecure facility in proximity to the San Jose, CA airport.ā
āThe meeting discussion will be topic-specific, and decision-oriented, with a focus onĀ Mobility Threats and Security,ā Alexander wrote in the email, obtained under a Freedom of Information Act (FOIA) request, the first of dozens of communications between the NSA chief and Silicon Valley executives that the agency plans to turn over.
Alexander, Schmidt and other industry executives met earlier in the month, according to the email. But Alexander wanted another meeting with Schmidt and āa small group of CEOsā later that summer because the government needed Silicon Valleyās help.
āAbout six months ago, we began focusing on the security of mobility devices,ā Alexander wrote. āA group (primarily Google, Apple and Microsoft) recently came to agreement on a set of core security principles. When we reach this point in our projects we schedule a classified briefing for the CEOs of key companies to provide them a brief on the specific threats we believe can be mitigated and to seek their commitment for their organization to move ahead ⦠Googleās participation in refinement, engineering and deployment of the solutions will be essential.ā
Jennifer Granick, director of civil liberties at Stanford Law Schoolās Center for Internet and Society, said she believes information sharing between industry and the government is āabsolutely essentialā but āat the same time, there is some risk to user privacy and to user security from the way the vulnerability disclosure is done.ā
The challenge facing government and industry was to enhance security without compromising privacy, Granick said. The emails between Alexander and Google executives, she said, show āhow informal information sharing has been happening within this vacuum where there hasnāt been a known, transparent, concrete, established methodology for getting security information into the right hands.ā
The classified briefing cited by Alexander was part of a secretive government initiative known as the Enduring Security Framework (ESF), and his email provides some rare information about what the ESF entails, the identities of some participant tech firms and the threats they discussed.
Alexander explained that the deputy secretaries of the Department of Defense, Homeland Security and ā18 US CEOsā launched the ESF in 2009 to ācoordinate government/industry actions on important (generally classified) security issues that couldnāt be solved by individual actors alone.ā
āFor example, over the last 18 months, we (primarily Intel, AMD [Advanced Micro Devices], HP [Hewlett-Packard], Dell and Microsoft on the industry side) completed an effort to secure the BIOS of enterprise platforms to address a threat in that area.ā
āBIOSā is an acronym for ābasic input/output system,ā the system software that initializes the hardware in a personal computer before the operating system starts up. NSA cyberdefense chief Debora Plunkett in December disclosed that the agency hadĀ thwarted a āBIOS plotāĀ by a ānation-state,ā identified as China, to brick U.S. computers. That plot, she said, could have destroyed the U.S. economy. ā60 Minutes,ā which broke the story, reported that the NSA worked with unnamed ācomputer manufacturersā to address the BIOS software vulnerability.
But some cybersecurity expertsĀ questioned the scenarioĀ outlined by Plunkett.
āThere is probably some real event behind this, but itās hard to tell, because we donāt have any details,ā wroteĀ Robert Graham, CEO of the penetration-testing firm Errata Security in Atlanta, on his blog in December. āItās completely false in the message it is trying to convey. What comes out is gibberish, as any technical person can confirm.ā
And by enlisting the NSA to shore up their defenses, those companies may have made themselves more vulnerable to the agencyās efforts to breach them for surveillance purposes.
āI think the public should be concerned about whether the NSA was really making its best efforts, as the emails claim, to help secure enterprise BIOS and mobile devices and not holding the best vulnerabilities close to their chest,ā said Nate Cardozo, a staff attorney with the Electronic Frontier Foundationās digital civil liberties team.
He doesnāt doubt that the NSA was trying to secure enterprise BIOS, but he suggested that the agency, for its own purposes, was ālooking for weaknesses in the exact same products theyāre trying to secure.ā
The NSA āhas no business helping Google secure its facilities from the Chinese and at the same time hacking in through the back doors and tapping the fiber connections between Google base centers,ā Cardozo said. āThe fact that itās the same agency doing both of those things is in obvious contradiction and ridiculous.ā He recommended dividing offensive and defensive functions between two agencies.
Two weeks after the ā60 Minutesā broadcast, the German magazine Der Spiegel, citing documents obtainedĀ by Snowden, reported that theĀ NSA inserted back doors into BIOS, doing exactly what Plunkett accused a nation-state of doing during her interview.
Googleās Schmidt was unable to attend to the mobility security meeting in San Jose in August 2012.
āGeneral Keith.. so great to see you.. !āĀ Schmidt wrote. āIām unlikely to be in California that week so Iām sorry I canāt attend (will be on the east coast). Would love to see you another time. Thank you !ā Since the Snowden disclosures, Schmidt has been critical of the NSA and said itssurveillance programs may be illegal.
ArmyĀ Gen.Ā MartinĀ E.Ā Dempsey,Ā chairmanĀ of theĀ Joint Chiefs of Staff,Ā did attend that briefing. Foreign Policy reported a month laterĀ thatĀ Dempsey and other government officialsĀ ā no mention of Alexander āĀ were in Silicon Valley āpicking the brains of leaders throughout the valley and discussing the need to quickly share information on cyber threats.ā Foreign Policy noted that the Silicon Valley executives in attendance belonged to the ESF. The story did not say mobility threats and security was the top agenda item along with a classified threat briefing.
A week after the gathering, Dempsey said during a Pentagon press briefing, āI was in Silicon Valley recently, for about a week, to discuss vulnerabilities and opportunities in cyber with industry leaders ⦠They agreed āĀ we all agreed on the need to share threat information at network speed.ā
Google co-founder Sergey Brin attended previous meetings of the ESF group but because of a scheduling conflict, according to Alexanderās email, he also could not attend the Aug. 8 briefing in San Jose, and itās unknown if someone else from Google was sent.
A few months earlier, Alexander had emailed Brin to thank him for Googleās participation in the ESF.
āI see ESFās work as critical to the nationās progress against the threat in cyberspace and really appreciate Vint Cerf [Googleās vice president and chief Internet evangelist], Eric Grosse [vice president of security engineering] and Adrian Ludwigās [lead engineer for Android security] contributions to these efforts during the past year,ā Alexander wrote in a Jan. 13, 2012, email.
āYou recently received an invitation to the ESF Executive Steering Group meeting, which will be held on January 19, 2012. The meeting is an opportunity to recognize our 2012 accomplishments and set direction for the year to come. We will be discussing ESFās goals and specific targets for 2012. We will also discuss some of the threats we see and what we are doing to mitigate those threats ⦠Your insights, as a key member of the Defense Industrial Base, are valuable to ensure ESFās efforts have measurable impact.ā
A Google representative declined to answer specific questions about Brinās and Schmidtās relationship with Alexander or about Googleās work with the government.
āWe work really hard to protect our users from cyberattacks, and we always talk to experts ā including in the U.S. government ā so we stay ahead of the game,ā the representative said in a statement to Al Jazeera. āItās whyĀ SergeyĀ attended thisĀ NSAĀ conference.ā
Brin responded to Alexander the following day even though the head of the NSA didnāt use the appropriate email address when contacting the co-chairman.
āHi Keith, looking forward to seeing you next week. FYI, my best email address to use is [redacted],ā Brin wrote. āThe one your email went to ā [email protected] ā I donāt really check.ā
ZNetwork is funded solely through the generosity of its readers.
Donate