NSA and GCHQ tracked Google cookies

Cookie eating monster surveillance is alleged to have occurred.

Cookies

Leaked NSA documents have revealed that the spy agency used Google's advertising cookies to identify and track targets in a hacking operation.

According to reports by the Washington Post, based on documents leaked by NSA whistle-blower Edward Snowden, both the NSA and GCHQ used the cookies to help track users across the internet.

The operation used Google's PREF cookies, which are used by the search giant to provide personalised web pages for users based on previous browsing habits and preferences.

While the cookies don't contain information such as usernames or email addresses, they do contain details such as location, language preference, search engine settings, number of search results to display per page as well as other bits of information that advertisers can use to identify a particular browser.

The newspaper said that these cookies along with those from other companies have allowed the NSA to track user habits and allow remote exploitation of computers.

While the document does not say how the NSA obtained the cookies, other documents unearthed by Washing Port reporters said the agency could have made a direct request to Google using a Fisa order. Under the Fisa law, Google would not have been allowed to inform users of such an action by the NSA.

The cookies were collected by NSA's Special Source Operations (SSO) unit and are sent to the agency's Tailored Access Operations (TAO) unit. This specialises in offensive operations such as infecting target computers and networks with malware designed to obtain information and create backdoors.

As reported by sister publication PC Pro, a Lib Dem MP is pushing for greater protection for UK citizens from online spying. Former minister David Heath called for new laws to prevent spy agencies from tapping emails and calls without a warrant.

Heath wants loopholes in the Regulation of Investigative Powers Act 2000 and the Intelligence Services Act 1994 that allow wholesale data collection to be closed. 

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020