Skip to content
Gems Press

Gems Press

Books Worth Remembering

  • Books Worth Remembering from Gems Press
  • Classic True Stories
  • Books to Read Free
  • Selected Graphics
  • Shop
  • Toggle search form

Edward Snowden Explains What Happens When You Enter a URL in a Browser

Posted on January 3, 2023 By Gayla

You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons.

Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection” — that is, actively tampering with the users.

You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.”

If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits — malware programs — to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you.

Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them. — Edward Snowden, from his book Permanent Record (read for free)

stories

Post navigation

Previous Post: Like a Fart in a Trance
Next Post: Flower Spirals and the Fibonacci Sequence

Related Posts

Selected English Letters stories
Fanny Stevenson Finds Her Friend’s Grave stories
Rodney Dangerfield Is Born stories
Beethoven’s Personality Remembered as Lacking stories
Rooster Tips stories
Picking Sunflowers That Aren’t Quite Ready stories

A Premium from Gems Press

Sign up for our mailing list (all it takes is your email address), and get a free PDF of the first 70 pages of the Gems Press book, Courtly Quips & Gentry Gems: The Best of Early English Wit*.

Recent Posts

  • Help with Using HTML to Make Kindle Books
  • Selected Graphic Elements
  • Selected Graphics: Decaying Daguerreotypes by Mathew Brady, Circa 1850
  • Selected Graphics: Dante’s Divine Comedy
  • Selected Graphics: Grunty Animals from The Flower of Nature, Circa 1350
  • More Great Books to Read for Free
  • Selected Graphics from The Black Cat, September 1905
  • Selected Graphics from The Black Cat, October 1904
  • About Gems Press
  • The Book of Glimmer: Adventures of Marcus & Stub
  • Courtly Quips & Gentry Gems: The Best of Early English Wit
  • A Collection of Tracts, on the Subjects of Taxing the British Colonies in America, and Regulating Their Trade.: Volume I
  • Gem’s Fascinating Leisure Reader: Volume One
  • Gem’s Fascinating Leisure Reader: Volume Two
  • Health in Your Homes, by J. Fletcher Horne
  • The House I Live In, by J.W. Ford, M.D.
  • How to Work, by Amos R. Wells
  • The Brother Cadfael Medieval Mystery Series, by Ellis Peters
  • List of 63 More Great Books You Can Read for Free
  • Sex Tips for Girls • by Cynthia Heimel
  • Books About Sleep That You Can Borrow
  • French Horn Hell
  • Eppie Lederer Becomes Ann Landers
  • A Love Letter from Dylan Thomas
  • Adventures of Madame Godin in the Country of the Amazons
  • Flower Spirals and the Fibonacci Sequence
  • Edward Snowden Explains What Happens When You Enter a URL in a Browser
  • Like a Fart in a Trance
  • Thomas Edison Explains Electricity in Paris, 1889
  • A Dubious Business Tip from Aristotle Onassis

*As an Amazon Associate, we earn from qualifying purchases.

Sign up for our mailing list and get a free PDF of the first 70 pages of the Gems Press book, Courtly Quips & Gentry Gems: The Best of Early English Wit.*

About Gems Press

Contact us at contact (at) gemspress.earth

Copyright © 2025 Gems Press.

Powered by PressBook Masonry Blogs