You are incorrect. None of the companies we are talking about would build this backdoor interface and grant access like that to a shell company or contractor. If they wouldn’t do it for the TLAs directly, why on earth would they do it for a third party?