Snowden Trove: NSA Uses Browser Advertising Cookies To Track, Hack Targets


Another day, another not-at-all shocking revelation about the NSA’s spy dragnet from the trove of classified information Edward Snowden supplied to The Washington Post and The Guardian.

The latest reveal comes from the Post, which reported Tuesday the National Security Agency tracks and singles out targets for hacking by following the same modus operandi advertisers use to tailor their Internet come-ons to the preferences and habits of individual computer users.

That involves placing third-party tracking cookies – small files that remain on a computer after a browser has visited, and then left, a website – which can relay information about the user’s browsing habits and history the next time he visits the same site. They’re used by advertisers to create long-term browsing histories for what companies presume to be a single individual, or small number of individuals using a single device, so that the ads that appear on a website continually reflect advertisers’ best guesses, based on the user’s browsing habits, at what that person is most likely to want to buy.

The NSA is, of course, not interested in selling anything. But by using a proprietary, Google-developed iteration of cookie – coupled with GPS location data—on unsuspecting computer or mobile phone users, government spies can identify a target and even create a gateway for warrantless, secret hacking.

From the story:

According to the documents, the NSA and its British counterpart, GCHQ, are using the small tracking files or “cookies” that advertising networks place on computers to identify people browsing the Internet. The intelligence agencies have found particular use for a part of a Google-specific tracking mechanism known as the “PREF” cookie. These cookies typically don’t contain personal information, such as someone’s name or e-mail address, but they do contain numeric codes that enable Web sites to uniquely identify a person’s browser.

In addition to tracking Web visits, this cookie allows NSA to single out an individual’s communications among the sea of Internet data in order to send out software that can hack that person’s computer. The slides say the cookies are used to “enable remote exploitation,” although the specific attacks used by the NSA against targets are not addressed in these documents.

By using the GPS location data Apple and other computer and smartphone software companies pre-install on computing devices, NSA can link an individual’s physical whereabouts with their internet activities, giving the government, under most circumstances, a very refined idea of who you are and what you’re doing.

Read the story, including some newly-released slides that show how the NSA characterizes its track-and-hack abilities for employee training, here.

Personal Liberty

Ben Bullard

Reconciling the concept of individual sovereignty with conscientious participation in the modern American political process is a continuing preoccupation for staff writer Ben Bullard. A former community newspaper writer, Bullard has closely observed the manner in which well-meaning small-town politicians and policy makers often accept, unthinkingly, their increasingly marginal role in shaping the quality of their own lives, as well as those of the people whom they serve. He argues that American public policy is plagued by inscrutable and corrupt motives on a national scale, a fundamental problem which individuals, families and communities must strive to solve. This, he argues, can be achieved only as Americans rediscover the principal role each citizen plays in enriching the welfare of our Republic.

Join the Discussion

Comment Policy: We encourage an open discussion with a wide range of viewpoints, even extreme ones, but we will not tolerate racism, profanity or slanderous comments toward the author(s) or comment participants. Make your case passionately, but civilly. Please don't stoop to name calling. We use filters for spam protection. If your comment does not appear, it is likely because it violates the above policy or contains links or language typical of spam. We reserve the right to remove comments at our discretion.