Add this Page to Facebook!   Submit to Twitter   Submit to Reddit   Submit to Stumble Upon   Pin It!   Fark It!   Tell A Friend  
Printer Friendly Page Save As Favorite Save As Favorite View Article Stats
5 comments

OpEdNews Op Eds

NSA Turns Cookies (And More) Into Surveillance Beacons

By (about the author)     Permalink       (Page 1 of 2 pages)
Related Topic(s): ; ; ; , Add Tags Add to My Group(s)

Must Read 3   News 3   Valuable 2  
View Ratings | Rate It

Headlined to H2 12/12/13
Become a Fan
  (2 fans)

opednews.com

by Adi Kadmar, Rainey Reitman and Seth Schoen 

Tuesday, we learned that the NSA is using Google cookies--the same cookies used for advertisements and search preferences--to track users for surveillance purposes.

These Google cookies--known as "PREF" cookies--last two years and can uniquely identify you. Sniffing one off the Internet as it goes past allows the NSA to recognize your browser whenever you interact with Google from any location or network. Every person who visits a Google site will receive a PREF cookie, regardless of whether they log in or even have an account with Google. Using Google Search without logging in tags you for two years, and that unique tag is sent over the network every time you search even if it's on a different network (or in a different country).


(image by eff)

According to documents just published by the Washington Post, the NSA is using this to "enable remote exploitation" (hacking into people's computers)--an act aided by the ability to uniquely identify individuals on the Internet.

Google didn't mean for its cookies to be used this way, but their popularity and pervasive use of cookies has turned their services into an enabling factor. This revelation should serve as a wakeup call for web sites on the steps they could have taken to prevent this from happening. This cookie surveillance is only possible when browsers make insecure connections to web servers. As part of our calls for ubiquitous web encryption, EFF has advocated both for HTTPS by default and for the use of secure cookies--cookies that are only transmitted over secure connections. Google already knows how to use secure cookies; they use them for the authentication of your Gmail accounts. However, Google has chosen not to use secure cookies for certain types of online activities--such as when you change your search preferences, browse YouTube, or load ads on Google sites. Google could have chosen to use secure cookies for all of the cookies it deposits on peoples' computers, to prevent these cookies from ever being sent over insecure connections.

The Guardian previously reported on the use of intercepted advertising cookies to recognize individuals--it appears in the "Tor Stinks" presentation it posted in October, which talks about recognizing people from their DoubleClick cookies. DoubleClick is also owned by Google, but the use of DoubleClick cookies had no apparent connection to the use of PREF cookies. This goes to show that spy agencies are keen to find any available way to recognize a particular user by their devices' behavior on the Internet, and that cookies sent with unencrypted web requests are one of the easiest and most straightforward ways of picking out an individual device even as it moves from network to network.

As Ed Felten explains, "The easiest way to protect users against this threat is to refrain from tracking." But if tracking is to happen, the "approach that does work is for the tracking entity to use https, the secure web protocol, for its communication with the user's computer." When HTTPS is turned on, eavesdroppers recording Internet traffic can't see the contents of cookies sent inside the secure connection. EFF's HTTPS Everywhere software may provide a degree of protection against the measures reported by the Post because it makes a user's browser use HTTPS exclusively on certain sites where it would otherwise be optional. But we can't protect connections where servers don't make HTTPS an option.

Anonymous User Tracking? The Fragility of Anonymity

The Google PREF cookie is typical of the tracking cookies used by many different Internet sites. (The PREF cookie stands out partly because Google's services are so popular and so omnipresent, not because there aren't a number of other cookies that might be used to track people in the same ways.) A typical one looks like

PREF=ID=7994dc5cd38ff052&...

The value after the "ID" is a random number that Google makes up on the spot the first time you visit a Google service in a particular browser. This number is chosen by Google and isn't derived from anything distinctive about you. But your web browser will remember it for two years, unless you've changed your browser settings, and send it out over the Internet every time you interact with any Google web service.

The advertising industry and many website operators have often suggested that cookies like Google's PREF are "anonymous" or "non-personally-identifiable" if they don't contain a person's name or e-mail address. Unfortunately, a persistent cookie can easily become associated with a person's identity, whether that's by the website that set the cookie, by a third-party website, or by a spy agency.

For example, suppose you at some point put something in a Google search that allows an eavesdropper to figure out who you are (or do anything else from that same computer that the eavesdropper manages to link to your identity). If the eavesdropper also sees your Google PREF cookie, that eavesdropper knows the real-life identity that's associated with that cookie, and can remember this association for as long as the cookie lasts, and recognize you wherever else you go. The supposed "anonymity" of any individual tracking cookie is incredibly fragile; it can be lost forever at a moment's notice.

Fighting Nonconsensual Tracking

These revelations make it ever clearer that we need to fight back against nonconsensual tracking of web users, by deploying and adopting technology that allows users to block online tracking. In the past we've been concerned about the profiles that web companies could build up about users without their knowledge or consent. Now we've seen that this tracking technology is also being hijacked for government surveillance of Internet users.

NSA Overhears Mobile Apps Reporting Their Location

The Post also reported on other kinds of information that are being scooped up by NSA and used to track and identify individuals. A program called HAPPYFOOT listens to mobile apps that send geolocation information about the current whereabouts of a user's device back to an app developer or service provider. Tapping these communications lets NSA find a user's physical location by sitting back and letting the user's own mobile device inform on their whereabouts. Some of these apps are transmitting this information solely for advertising purposes in ways that users may not even understand or expect. (As the Post reminds us, parts of the mobile app industry have been keen to collect user data for no user benefit: as the newspaper reported last week, even a mobile flashlight app actively gathered data on people's whereabouts.) Yet if it's sent unencrypted, NSA can scoop it up to figure out where people are at any moment, even by passively listening to distant Internet links.

Even when location information is sent for a purpose that the user actively understands and wants (say, to enable a location-based service like Yelp or Foursquare), it can still be intercepted and used for location tracking if a particular mobile app fails to encrypt it. Mobile app developers can address this kind of surveillance by encrypting any communications that include a user's location details.

All of this goes to show that spy agencies have a vast array of tools for tracking people around the Internet and the physical world. As we discuss in an accompanying post, it's important that technology developers confront these privacy problems head-on.

Reprinted from eff.org

Next Page  1  |  2

 

http://www.eff.org



Add this Page to Facebook!   Submit to Twitter   Submit to Reddit   Submit to Stumble Upon   Pin It!   Fark It!   Tell A Friend
The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.

Writers Guidelines

Contact Author Contact Editor View Authors' Articles

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Demolishing Eight Common Excuses People Make for NSA Mass Surveillance

How NSA Mass Surveillance is Hurting the US Economy

TPP Leak Confirms the Worst: US Negotiators Still Trying to Trade Away Internet Freedoms |

TPP Won't Wrap Up This Year, But Fast Track Remains a Threat

The House Intelligence Committee's Misinformation Campaign About the NSA

NSA Turns Cookies (And More) Into Surveillance Beacons

Comments

The time limit for entering new comments on this article has expired.

This limit can be removed. Our paid membership program is designed to give you many benefits, such as removing this time limit. To learn more, please click here.

Comments: Expand   Shrink   Hide  
3 people are discussing this page, with 5 comments
To view all comments:
Expand Comments
(Or you can set your preferences to show all comments, always)

What are the folks in power so afraid of?... by Mark Adams JD/MBA on Thursday, Dec 12, 2013 at 4:26:35 PM
Mark, I don't think they're afraid.  Quite th... by Robert James on Thursday, Dec 12, 2013 at 8:22:57 PM
Interesting.  I'll check it out, but I don't ... by Mark Adams JD/MBA on Friday, Dec 13, 2013 at 11:59:57 AM
I've had ghostery for some time now and it's an ex... by Amy Schreiner on Friday, Dec 13, 2013 at 1:00:27 PM
Also, I don't think that the PTB are afraid of us ... by Amy Schreiner on Friday, Dec 13, 2013 at 1:39:31 PM