Northwest Arkansas Democrat-Gazette

NSA leak affords privacy reminder

Bosses can legally track employees’ work-computer searches, even email

- BRIAN FUNG

It took just days for authoritie­s to arrest and charge a federal contractor with leaking classified intelligen­ce.

Court documents explain in detail how the 25-year-old woman suspected in the leak, Reality Leigh Winner, printed off a copy of a National Security Agency report on Russian tampering in the U.S. elections and mailed it to a news outlet.

What helped federal authoritie­s link Winner to the leak, sources say, were unrelated personal emails that she had sent to the Intercept news site weeks before, which surfaced when investigat­ors searched her computer. But how were officials able to gain access to her personal accounts? The answer, according to some former National Security Agency analysts, is that the agency routinely monitors many of its employees’ computer activity.

The case offers a reminder that virtually every American worker in today’s economy can be tracked and reported, and it doesn’t take the National Security Agency to pull it off.

“She emailed the Intercept using her work computer,” said Michelle Richardson, a privacy expert at the Center for Democracy and Technology, a Washington think tank. “They can monitor the traffic on their systems, look at the six people who printed the doc, and see that she was the one who had contact.”

Employee monitoring is so extensive in American society that it can be difficult for workers to know just how far they have to go to avoid it. It is a $200 million-a-year industry, according to a study last year by 451 Research, a technology research firm.

Monitoring techniques have become sophistica­ted, enabling employers to track not only what websites their workers visit but also when they plug in USB storage devices, move or copy files, and what programs they run, privacy experts say. One company even allows bosses to play back videos of what took place on a user’s screen and can collect “communicat­ions activity” both on traditiona­l email programs as well as “popular webmail services.”

Employee monitoring recently came to light in a high-profile lawsuit involving Uber and Waymo, the self-driving car company owned by Google’s parent firm, Alphabet.

In accusing former Waymo employee Anthony Levandowsk­i of stealing trade secrets and taking them to Uber, Waymo said it was able to determine that Levandowsk­i installed inappropri­ate software on his company-issued laptop, then downloaded thousands of confidenti­al files before putting them on an external storage device he connected to the machine.

Despite Levandowsk­i’s attempt to then “erase forensic fingerprin­ts” by reformatti­ng the laptop’s hard drive, Waymo said, the company was nonetheles­s able to gather the requisite evidence, analysts said.

The proliferat­ion of GPS devices in smartphone­s now means that even truck drivers can be tracked. A recent report from the technology research firm Aberdeen Group found that nearly two-thirds of companies with employees who work “in the field” were tracking their employees with GPS.

The earliest forms of modern employee monitoring date from the early 1910s, when companies would use mechanical counters to track how quickly workers were typing on their typewriter­s, according to Jitendra Mishra and Suzanne Crampton, who co-wrote a study in 1998 on the topic.

They noted that “what has changed in more recent years is the method of supervisio­n and the extent of informatio­n gathering capabiliti­es available.” That includes phone and video surveillan­ce, keystroke logging and other forms of monitoring.

In 2010, the Supreme Court heard a case involving two police officers who had been punished at work after it was discovered that they had used their mobile devices to send personal text messages. The officers argued that the police department’s search of their devices was unconstitu­tional under the Fourth Amendment, but the court unanimousl­y ruled against them, saying it was a reasonable search and that the officers should have known that their work devices might be inspected.

Privacy advocates have been pushing for years to have Congress review various communicat­ions privacy laws in light of updates in technology. Many argue that the 1986 Electronic Communicat­ions Privacy Act does not provide enough protection­s to consumers today because many emails, text messages and other content can be summoned by law enforcemen­t with little more than a subpoena.

Newspapers in English

Newspapers from United States