Secret NSA technology that can hack computers not connected to the Internet

For the really paranoid, for the more security-conscious out there, and for those keeping track of the capabilities of the NSA to spy and track, this will really blow your mind.

According to a New York Times report, the NSA has a secret technology that enables it to hack into and mess with data on computers that are not even connected to the Internet.

And the “secret technology” has been in use since at least 2008. Since I’m not the only person that reads the New York Times, I guess it’s no longer a secret.

According to the report, the technology:

…Relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.

And to think that they were accusing the Chinese of unfettered hacking before this is being made public. You may read the complete report here.

NSA cellphone tracking co-traveler target

Related Posts

Towards a mandatory, always-on and ubiquitous encryption in XMPP networks Now that we know that our online communications are not necessarily private and secure, there is a growing need to have end-to-end encryption built in...
Introducing the Rancher Metadata Service for Docker Rancher has come a long way since its early versions, and is becoming quite good at managing Docker applications and deploying complex services. That ...
Samsung Chromebook 2 will be powered by the Exynos 5 Octa processor The Samsung Chromebook 2 11.6-inch and Chromebook 2 13.3-inch models are the company's latest additions to its line of Chromebook computers. And they ...
Hand of Thief trojan and your favorite Linux distribution The Hand of Thief (HoT) trojan is a commercial form-grabber and backdoor banking trojan released in July (2013) and aimed at Linux distributions. Codi...
Dissecting the Android KorBanker malware KorBanker is a malware currently making the rounds on Android devices. It's only targeting banking customers in South Korea, especially customers ...
482 of the Top500 supercomputers run Linux, and China’s Tianhe-2 is the fastest The November 2013 edition of the list of the world's fastest supercomputers has just been released. Known as the TOP500 List, it is released twice a y...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


3 Comments

  1. ‘ So you can simultaneously display strength stage from the pc, a movie from your Iphone and notes from your i – Pad. Your favorite movie names, what they are called of the cartoon character or favorite band name or names only heroes like Batman, The Dark Knight, Superman, Godzilla, Spartacus, and more. Already it can be being used by mining companies to file a lawsuit governments always keeping them out of protected areas; by banks fighting financial regulation; by the nuclear company contesting Germany’s decision to exchange off atomic power.

  2. And now security-conscious individuals may start investing in faraday cages.

Leave a Comment

Your email address will not be published. Required fields are marked *

*