recommended reading

How the US Government Uses Information From Spying on Foreign Companies

There’s no longer doubt that the US government spies on foreign multinational corporations as well as governments, thanks to the disclosures by former National Security Agency contractor turned international fugitive Edward Snowden.  The NSA vacuums up mountains of classified information from a rich array of sources. The CIA assists by launching digital “black bag” operations aimed at manually penetrating the computer systems of some of the world’s largest foreign multinationals.

Washington isn’t alone, of course; dozens of other governments do the same, in collaboration with each other and individually. But one thing that US officials insist they won’t do is use the information gleaned from industrial espionage to help US corporations, like the Chinese do with their state-run defense, oil and other companies.

Is it really possible that US government spies surreptitiously collect confidential information from foreign multinationals and don’t share it with domestic US business interests to give them a leg up? And why would it collect the information if not for such purposes?

Here are some reasons:

National security. US intel agencies acutely focus on foreign companies, especially defense, technology and telecommunications firms, to gauge what kind of threat they might pose to US interests. That includes finding out what kind of products they are developing, who they’re selling them to and what kind of strategic plans they have. This is particularly the case with weapons manufacturers and those making dual-use products that can be used to build nuclear weapons programs. It’s also done when such companies, like China’s telecommunications firm  Huawei, seek to buy US companies. The information is used to help the Commerce Department and secretive Committee on Foreign Investment in the United Statesassess whether or not the US should object to such sales as being against US national security interests.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.