Forgot your password?
typodupeerror
Printer Crime Government Privacy IT

FBI's Washington Post Investigation Shows How Your Printer Can Snitch On You (theintercept.com) 99

alternative_right quotes a report from The Intercept: Federal prosecutors on January 9 charged Aurelio Luis Perez-Lugones, an IT specialist for an unnamed government contractor, with "the offense of unlawful retention of national defense information," according to an FBI affidavit (PDF). The case attracted national attention after federal agents investigating Perez-Lugones searched the home of a Washington Post reporter. But overlooked so far in the media coverage is the fact that a surprising surveillance tool pointed investigators toward Perez-Lugones: an office printer with a photographic memory. News of the investigation broke when the Washington Post reported that investigators seized the work laptop, personal laptop, phone, and smartwatch of journalist Hannah Natanson, who has covered the Trump administration's impact on the federal government and recently wrote about developing more than 1,000 government sources. A Justice Department official told the Post that Perez-Lugones had been messaging Natanson to discuss classified information. The affidavit does not allege that Perez-Lugones disseminated national defense information, only that he unlawfully retained it.

The affidavit provides insight into how Perez-Lugones allegedly attempted to exfiltrate information from a Secure Compartmented Information Facility, or SCIF, and the unexpected way his employer took notice. According to the FBI, Perez-Lugones printed a classified intelligence report, albeit in a roundabout fashion. It's standard for workplace printers to log certain information, such as the names of files they print and the users who printed them. In an apparent attempt to avoid detection, Perez-Lugones, according to the affidavit, took screenshots of classified materials, cropped the screenshots, and pasted them into a Microsoft Word document. By using screenshots instead of text, there would be no record of a classified report printed from the specific workstation. (Depending on the employer's chosen data loss prevention monitoring software, access logs might show a specific user had opened the file and perhaps even tracked whether they took screenshots).

Perez-Lugones allegedly gave the file an innocuous name, "Microsoft Word - Document1," that might not stand out if printer logs were later audited. In this case, however, the affidavit reveals that Perez-Lugones's employer could see not only the typical metadata stored by printers, such as file names, file sizes, and time of printing, but it could also view the actual contents of the printed materials -- in this case, prosecutors say, the screenshots themselves. As the affidavit points out, "Perez-Lugones' employer can retrieve records of print activity on classified systems, including copies of printed documents." [...] Aside from attempting to surreptitiously print a document, Perez-Lugones, investigators say, was also seen allegedly opening a classified document and taking notes, looking "back and forth between the screen corresponding the classified system and the notepad, all the while writing on the notepad." The affidavit doesn't state how this observation was made, but it strongly suggests a video surveillance system was also in play.

This discussion has been archived. No new comments can be posted.

FBI's Washington Post Investigation Shows How Your Printer Can Snitch On You

Comments Filter:
  • Surprised (Score:4, Interesting)

    by liqu1d ( 4349325 ) on Wednesday January 21, 2026 @10:09PM (#65940978)
    Would have expected these systems to flag and lockdown the moment it detected something like a screenshot taking place. It's not like it's a novel idea to bypass security.
    • by jhoegl ( 638955 )
      Honestly surprised they care at all about state secrets these days. There must be some reason they went after this person and not all the public people who publicly leaked information in public ways.
    • I would have expected these systems to have disabled the screenshot ability. At the very least the systems should mimic what DRM videos did 20 years ago and not be able to screenshot certain portions of the screen.

    • by Anonymous Coward

      Maybe I can just ask Grok for a copy. I'm sure what Elon did was perfectly legal and didn't retain anything when he syphoned all our info into his privately owned super computers.

    • Sadly, most of this stuff is hidden because it's unethical and underhanded. If these powerful people were doing good, they'd all be bragging. All this secrecy not only breeds corruption, it is a sure sign of it. Welcome to economic slavery and the decline of this civilization. Done in by classism and elitism once again.

    • by Anonymous Coward
      Manning accessed and copied something like 700k classified documents completely undetected, even beyond the scope of their need to know. No alarms. No "access denied." Just a straight up dump. They only got caught after telling someone else who then reported it to the FBI. Similar things happened with Snowden, and later, Winner. The US Department of War is highly incompetent when it comes to securing information.
  • by Valgrus Thunderaxe ( 8769977 ) on Wednesday January 21, 2026 @10:15PM (#65940984)
    He worked in some super-secret place and they had auditing in place on the printers. Your printer probably is spying on you, but not in this way.
    • by gweihir ( 88907 )

      Regular home-office printers do not even have non-volatile storage.

      • Not quite the same thing, but If you print your threat/demand/ransom in color, a document is traceable to the specific printer.

        • by gweihir ( 88907 ) on Wednesday January 21, 2026 @11:46PM (#65941116)

          And that is why you stay black and white if you do not want the printer serial in yellow dots on the paper.

          A lot of practical OpSec is just knowing how things work.

          • by dargaud ( 518470 )
            How are you sure that selecting B&W on your printer won't print the yellow dots anyway ?
            • I guess we know now why your printer won't print anything, not even B&W, if you run out of any one color.... /s

            • Re: (Score:2, Insightful)

              by Anonymous Coward

              To be fair he said "stay black and white", not print in b&w on a color printer.
              It's easy to be sure your printer isn't printing yellow dots when there is nothing but black toner in it ;)

              Also to be fair again, while this obviously can't help with workplace printers you have no input into selecting, it looks like it was the person they responded to that derailed the conversation.

              My input is that if you have a color capable laser printer manufactured after about 1995, it will always print the yellow encodi

            • by gweihir ( 88907 )

              Did I say "selecting"? No, I did not. If you do this on a color printer, you are deeply stupid and deserve what you get. You need to do this on a b/w printer that cannot print yellow. As anybody with 2 working braincells will immediately see.

          • by Chelloveck ( 14643 ) on Thursday January 22, 2026 @01:14PM (#65942174)

            This is why my printer is an aged monk with a calligraphy pen. Even his yellow security dots are lavishly illuminated works of art. The only problem is that his pages-per-day output is in the low single digits. That's more than offset by his vow of silence, though. He never talks back or blasphemes by telling me PC LOAD LETTER.

          • by BenBoy ( 615230 )
            This is why I print everything with a solid yellow background :-) (ed. no he doesn't, that'd be fiendishly expensive)
        • A smart person uses this feature to hide the documents they want to exfil, then brings home pictures of cats.

      • I read somewhere years ago that all printers create a watermark of sorts on every printout that is not detectable with human eyes, as per a law that was passed. A series of light dots are used throughout the printout that identifies the printer and other information. Perhaps this is what gave the documents away as well.

      • wouldn't the upgradeable firmware reside in non-volatile storage?
      • Sure but they have dark patterns that guide you to enable cloud printing. They don't need storage to save your printed documents.
        • by gweihir ( 88907 )

          Probably. But anybody smart stays away from anything "cloud" (where it is not needed) anyways. One of the reasons my few remaining Windows systems do not have MS accounts. That seems to be the only way to reliably prevent things getting placed on one-drive.

      • Sure they do. Not enough to store images (or at least not many) but where do you think they keep their re-flashable firmware and configuration?

        In any case, that's surely not how this was found. They are doing a very normal thing: retaining print spooler queues for a period of time in case something like this very thing needs to be reviewed. It's not a default setting in most server OSes, but it's a simple configuration. There is nothing at all unique here for anyone even tangentially familiar with comp
      • by tlhIngan ( 30335 )

        Yeah, but enterprise printers do. They often have a hard drive and can be configured to save a copy of every print job to the hard drive. And the filenames and usernames are logged, I've seen the status messages and print logs on them (they're usually accessible to users if you go for the recent prints screen to see if you printed your file to that printer).

        But I've also seen options to save printouts to hard drive for later retrieval and printing, so it's not too big a stretch to imagine a printer that can

      • I can't remember the last time I powered down my home printer though. I should probably do that just for power saving reasons
    • by Himmy32 ( 650060 )

      It's not like secure print servers aren't restricted to Top Secret facilities. Like a doctor's office handling HIPAA data would likely have a secure print server with pull printing.
    • Most workplaces use centralized print servers before handing the data off to the printer. So technically it isn't the printer spying on you, it's the company's Papercut (or similar) print server. The only way to get around it would be to surreptitiously connect to USB - but then your PC might snitch on you for having a different printer than everyone else, or maybe to use a flash drive - but they aren't allowed in high security facilities.
    • My printer and my TV frequently send packets to each other and some source in china. Often the webcam I got on Aliexpress joins in. Usually when I'm in front of it.

  • by PPH ( 736903 ) on Wednesday January 21, 2026 @10:16PM (#65940988)

    The affidavit doesn't state how this observation was made, but it strongly suggests a video surveillance system was also in play.

    Forgot to cover that little laptop camera with tape, did we?

  • by ebunga ( 95613 ) on Wednesday January 21, 2026 @10:28PM (#65941004)

    There would be things like government offices and doctors offices and banks and such that would sell off old printers, or more usually, a leased printer being sold on the used market after it was replacedd, and the local hard drives in those things would have years worth of printed documents stored on them? That's still a thing, but now there are printer and "enterprise output management" systems that can help reign in silly things like some idiot printing 53 collated copies of an 1100 page document five times, or tracking down who printed that check that some random person cashed at a check cashing place next state over, or what idiot winner was printing classified documents and giving it to The Intercept.

  • And that's to memorize the info. I don't think they can yet scan your brain for retained info.

    Of course, the bandwidth of this method is low, depending on how much you can memorize at a time.

  • Not a crime (Score:3, Funny)

    by ArchieBunker ( 132337 ) on Wednesday January 21, 2026 @11:19PM (#65941064)

    Is there something wrong with retaining classified documents? All the bigly important people do it.

  • ...archives. It's not even the printer itself that would do this, but the print server, print queue on the local box, and probably third party logging/archival tools.

    To be surprised by this is to be surprised by the idea that video cameras record video to a central server and might also have some local storage.

    • It's not even the printer itself that would do this, ...

      Actually, that's incorrect - and it's been a security concern some people have warned about for quite some time. Most multifunction printers contain hard drives, and those drives often hold onto copies of files long after they've been printed.

      • by Himmy32 ( 650060 )
        It can be both. Specialized print servers exist to enable pull printing for secure handling of documents, often paired with a smart card and a specialized app on the MFP.
  • I remember messing with a linux box for a print server and nas for my parents 20 years ago and coming across a configuration option to retain jobs sent to the printer (in postscript, of course).

    Maybe I'm imagining it. Or maybe if you dig deep into the weeds of the printer, maybe it's running cups under the hood, or the windows print server active directory whatever they got going has an analogous option.

    Supposedly Reality Winner's trial for similar shenanigans revealed the following gem: on her office compu

    • by gweihir ( 88907 )

      There is really nothing special in retaining print jobs. What you mostly need is a lot of storage. No idea whether CUPS does it out of the box, but CUPS can spool to disk and making copies of that is very easy to patch in.

  • > In an apparent attempt to avoid detection, Perez-Lugones, according to the affidavit, took screenshots of classified materials .. that Perez-Lugones's employer could see not only the typical metadata stored by printers, such as file names, file sizes, and time of printing, but it could also view the actual contents of the printed materials ..

    Did Perez-Lugones print-out the files or take screenshots?
    • Yes. Printed out screenshots of one document pasted into a new document. It would evade some DLP systems I guess. But probably no highly secure ones, and clearly not this one.
  • They have a system in place that basically retains screenshots of every document printed?

    Great, now that looks like a juicy target for an attacker.

    This is the same as stupid people installing a SSL MITM proxy on some shitty VM that instantly wipes out any encryption-security that CAs (and sometimes the companies themselves) go great lengths for (and a lot of money) to achieve.

    The other problem with these highly classified, compartmentalized and monitored environments is of course that it gets more and more

    • They have a system in place that basically retains screenshots of every document printed?

      No. It stores the last n megabytes of documents printed, in case you want to reprint them. They eventually get overwritten. Some enterprise printers used to allow you to attach external HDDs for this purpose. Then they went internal. then they went to flash. You're just now finding out about this?

    • by flink ( 18449 )

      It's a printer in a SCIF. That thing is not connected to the internet for just any attacker to go after. Not that it is 100% secure, but you need some degree of access to physical infrastructure guarded by guys with guns.

      The logging is likely just saving the documents to a file server. Where do you think he likely got the files in the first place in order to print them? Some other file server. The print-log store is likely more locked down that anything else because no one needs routine access to it, a

  • I can't find the part about "How Your Printer Can Snitch On You." The submitter appears to have sent the wrong link, to an unrelated story about "How Someone Else's Printer Can Snitch On You," which amusingly takes place in a SCIF.
  • Holy shit, is no one going to talk about that? Now they have all 1000 sources not just this one guy. This is classic authoritarian stuff and Ars has a nice article that touches on that

    In April 2025, the Trump administration rescinded a Biden-era policy that limited searches and subpoenas of reporters in leak investigations. But even the weaker Trump administration guidelines “make clear that it’s a last resort for rare emergencies only,” according to Stern. “The administration may no

  • It may be a surprise when it is a feature, but in general office printers have hard drives (or now flash drives) to store full print jobs and one can recover data from it. The question is, if one needs to do it after getting conspicuous, or if the device actively snitches on you.

  • I wonder how Hannah Natanson is able to get 1000 sources for classified material?

I have ways of making money that you know nothing of. -- John D. Rockefeller

Working...