Ever-Evolving Cyber Surveillance

QWERTY KeyboardBy Tom Mullaney

Foreign Affairs

Three years ago, Edward Snowden, a CIA employee, leaked documents revealing the U.S. government’s extensive surveillance of foreign and domestic phone calls. On the anniversary of that explosive disclosure, media outlets are no doubt preparing to revisit questions about data privacy and civil liberties.

What the world might be missing, however, is the way in which surveillance technologies have already extended beyond the interception of phone calls, e-mails, and text messages. In fact, it isn’t too far off to imagine governments being able to spy on your e-mails, Facebook posts, and tweets before you send them. Nor is it unrealistic that states and private firms could intercept and read .docx files, .rtf files, and indeed all text files produced using ostensibly non-transmitting programs.

Finally, it is possible that such surveillance could eventually be conducted in real time, where text documents could be intercepted even before one pressed “save” or committed a file to the cloud.

All of this is speculative, but that doesn’t make it unreal.

For the past decade, I have been working on the history of modern Chinese information technology, with the results due to appear in a pair of books that MIT Press is publishing next year. I had no idea that in the course of my research I would stumble upon something relevant to present-day debates about state surveillance, data privacy, and the Snowden leak that shocked the world. But I did.

In a nutshell: Chinese computing has a “keylogging” function effectively baked in. The technology came about for non-malicious (and rather brilliant) reasons, but it has made it theoretically possible to spy on Chinese computer users in real time—even in cases in which one is using seemingly offline and non-transmitting text programs such as Microsoft Word, NotePad, TextEdit, and more. And current trajectories in media technology strongly suggest that this vulnerability will soon spread beyond China, becoming, in effect, the new normal.

Continue to full article . . .

Picture: MarkBuckawicki (Own work) [CC0], via Wikimedia Commons

Advertisements

Leave a Comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s