Edward Snowden Said Contractors Can “Watch Your Ideas Form as You Type.” How Does That Work?

<a href="http://www.shutterstock.com/cat.mhtml?lang=en&search_source=search_form&version=llv1&anyorall=all&safesearch=1&searchterm=matrix&search_group=#id=127879991&src=nYSU3tIFJqPuDbNBMKWAMQ-1-72">photobank.kiev.ua </a>/Shutterstock

Get your news from a source that’s not owned and controlled by oligarchs. Sign up for the free Mother Jones Daily.


Among the revelations made last week by NSA leaker Edward Snowden, few were more jarring than the suggestion that private security contractors have the capability to monitor your every online communication seemingly on a whim, in real-time. As he told the Washington Post, “They quite literally can watch your ideas form as you type.”

Like most everything else Snowden disclosed, it seemed like something out of a spy movie. But with the caveat that no one outside the NSA truly knows the extent of the agency’s reach, cybersecurity experts say that Snowden’s charge rings true, at least in part. According to PowerPoint slides Snowden provided to the Post and the Guardian, PRISM collected stored communications information from sites such as Facebook, Skype, Google, and Yahoo, boasting of access to online social networking details, email, file transfers, photos and video and voice chats.

Barring direct access (physically installing some sort of keystroke capture, for example) analysts probably don’t have the capability to jump into a random Skype conversation and see what’s being typed—nor would they want to. “Are they probably actually doing that for like arbitrary people?,” asked Julian Sanchez, a research fellow at the Cato Institute who specializes in tech privacy. “Probably not because that would take a lot of time and not be very useful.”

In that context, Snowden’s “quite literally” assertion shouldn’t be taken literally. It’s more of a broader statement about how much the agency can learn about you. “Given search queries, given other kinds of information they could get from this whole nexus of information he’s been leaking, it’s more sort of like you’re exposed in all aspects of your life,” said Joe Hall a technologist at the Center for Democracy and Technology. “It’s more a statement of inference than it is a statement about peering into your brain and watching you type.”

But Sanchez points to a program like Google Search, which transmits data to a server with every keystroke, as an example of what the NSA might be capable of, if they had access to a specific target. “If they have back-end access to a device there then there is no reason that that would not in principle be possible,” said Sanchez. “I don’t know whether it is literally something that is done on a regular basis. it sounds like for the most part what they’re doing is querying a database for stored record.”

“It’s sort of a combination of him using flowery language and the one pull quote from that session with him that’s a really good shocking tidbit, but this is more about inference,” said Hall.

“But then,” he added, “I’ve been surprised quite a bit lately.”

The truth needs defenders. Be one.

Tomorrow is the last day of our Spring Membership Drive, and we need to raise 1,000 new donations to fund the critical investigations our team is hard at work on. As of today, we’re still less than halfway there—and we can’t afford to fail!

Our nonprofit newsroom is funded by donors from every state in the union—blue, red, and purple, all part of a community of readers who care about the future of our democracy.

We’re independent from corporations and uninfluenced by those in power. Our commitment is solely to the truth. That’s only possible because of readers like you, who believe in the importance of independent, fearless journalism.

Be the reason these stories get told. Make a donation today.

The truth needs defenders. Be one.

Tomorrow is the last day of our Spring Membership Drive, and we need to raise 1,000 new donations to fund the critical investigations our team is hard at work on. As of today, we’re still less than halfway there—and we can’t afford to fail!

Our nonprofit newsroom is funded by donors from every state in the union—blue, red, and purple, all part of a community of readers who care about the future of our democracy.

We’re independent from corporations and uninfluenced by those in power. Our commitment is solely to the truth. That’s only possible because of readers like you, who believe in the importance of independent, fearless journalism.

Be the reason these stories get told. Make a donation today.

We Recommend

Latest

Sign up for our free newsletter

Subscribe to the Mother Jones Daily to have our top stories delivered directly to your inbox.

Get our award-winning magazine

Save big on a full year of investigations, ideas, and insights.

Subscribe

Support our journalism

Help Mother Jones' reporters dig deep with a tax-deductible donation.

Donate