It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
RADIO hackers have reverse-engineered some of the wireless spying gadgets used by the US National Security Agency. Using documents leaked by Edward Snowden, researchers have built simple but effective tools that can be attached to parts of a computer to gather private information in a host of intrusive ways.
Ossmann specialises in software-defined radio (SDR), an emerging field in which wireless devices are created in software rather than constructed from traditional hardware such as modulators and oscillators. Instead of such circuits, an SDR uses digital-signal-processing chips to allow a programmer to define the wave shape of a radio signal, the frequency it uses and the power level. It operates much like a computer's sound card, but instead of making sounds or processing incoming audio, it makes and receives radio signals. And a single SDR can be changed to any band instantly, including AM, FM, GSM and Bluetooth.
One reflector, which the NSA called Ragemaster, can be fixed to a computer's monitor cable to pick up on-screen images. Another, Surlyspawn, sits on the keyboard cable and harvests keystrokes. After a lot of trial and error, Ossmann found these bugs can be remarkably simple devices – little more than a tiny transistor and a 2-centimetre-long wire acting as an antenna.
The Thing, also known as the Great Seal bug, was one of the first covert listening devices (or "bugs") to use passive techniques to transmit an audio signal. Because it was passive, being energized and activated by electromagnetic energy from an outside source, it is considered a predecessor of current RFID technology.[1]
originally posted by: JiggyPotamus
what we are talking about here is definitely not a large scale spying or information gathering tool. This is intrusive, aside from stealing private data, mainly because it must be physically planted at the scene.
originally posted by: JiggyPotamus
I imagine that technology within the intelligence community improves all the time, but what we are talking about here is definitely not a large scale spying or information gathering tool. This is intrusive, aside from stealing private data, mainly because it must be physically planted at the scene. I think that these agencies avoid such actions whenever possible, preferring instead to rely on remote gathering procedures. One of the main reasons this is still the case is when they do not wish for a person to know they are being spied on, which could cause them to immediately eliminate that means of communication. Someone who found out their phone was bugged would not use their phone to talk about whatever it is they don't want others hearing about. But phone bugs are ancient technology now where the intel community is concerned. That doesn't mean they aren't effective.
originally posted by: VoidHawk
originally posted by: JiggyPotamus
what we are talking about here is definitely not a large scale spying or information gathering tool. This is intrusive, aside from stealing private data, mainly because it must be physically planted at the scene.
I'm not so sure thats true. A pc has many data lines running at rf frequencies. It may be possible to simply send a PC a piece of code that could modulate one or more of those data lines. That would then mean anyone close by could capture the signal.