GO
Loading...

Is Big Brother really watching you?

As you type an email or use a cellphone, hackers just might be tracking your every move.

Edward Snowden, the former National Security Agency contractor who exposed intelligence abusestold NBC News last week that intelligence agencies can gather data from cellphones and monitor emails being typed. "The problem is the capabilities themselves are unregulated, uncontrolled and dangerous," he said.

But experts told CNBC that while intelligence agencies like the NSA may have these capabilities, such sophisticated strategies are used only in rare circumstances. Although the threat of so-called Big Brother watching does exist, consumers' biggest cyberthreat remains cybercriminals, who are after financial data and money.

In a statement, a NSA spokeswoman did not comment on specific foreign intelligence activities, but said, "all of NSA's efforts are strictly conducted under the rule of law and provide appropriate protection for privacy rights. The Agency collects data to meet specific security and intelligence requirements such as counterintelligence, counterterrorism, counterproliferation, cybersecurity, force protection for U.S. troops and allies, and combating transnational crime."

Edward Snowden
Sunshinepress | Getty Images
Edward Snowden

Snowden told NBC News that surveillance technology can be conducted at rapid speed.

"The NSA, the Russian intelligence service, the Chinese intelligence service, any intelligence service in the world that has significant funding and a real technological research team can own that phone the minute it connects to their network. As soon as you turn it on, it can be theirs," he told NBC News. "They can turn it into a microphone, they can take pictures from it, they can take the data off it."

Can the government control your phone?

Snowden also claimed the NSA could spy on individuals even if phones are turned off, by remotely accessing and powering up the devices.

Robert Graham, chief executive of cybersecurity company Errata Security, told CNBC that the NSA can turn on your phone, but only if it's able to physically touch the phone to install hardware or software.

Cellphones also aren't the most effective tools to access national data, said Dickie George, a former technical director of the NSA's information assurance directorate.

"Just because an agency would have that capability, it still costs to do something like that. … Intelligence agencies are interested in government strategic information, and the cellphone is not really a good way to do that," George said in a phone interview. Hackers are more likely to target cellphones for financial gain, he added.

Read MoreThe anatomy of an Android smartphone cyberattack

George, who worked at the NSA for 41 years, also played down the likelihood that the U.S. government is resorting to advanced tactics to monitor personal emails in the name of national security.

George said the bigger problem remains average cyberthieves using commonplace hacking tools. Keylogger, for example, is a computer program used by hackers to capture keystrokes, often without individual knowledge.

Read MoreData breach! U.S. tops list of victims, study shows

"If you have a legitimate intelligence need, then you're going to try and get the information you need in any way you can, and that's [keylogger] one of the tools you might want to use," George said.

An increasingly popular option for criminals after money are remote access tools, or RATs, which allow criminals to watch individuals through webcams and can be purchased for as little as $40.

Read MoreHackers are watching you on infected webcams

By CNBC's Jennifer Schlesinger.

For more CNBC coverage of cybersecurity, visit HackingAmerica.cnbc.com

  • CNBC's senior correspondent and lead investigative reporter, Scott Cohn also appears on "NBC Nightly News with Brian Williams," "Today" and on MSNBC.

  • “Squawk on the Street” Co-Anchor

  • CNBC Washington Reporter

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

Technology Explained