It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The National Security Agency has implanted software in about 100,000 computers around the world, allowing the United States to surveil those machines while creating a trail that can be used to launch cyber-attacks.
Though most of the software is installed by gaining access to computer networks, the NSA can also employ technology that enters computers and alters data without needing internet access.
The secret technology uses covert radio waves transmitted from small circuit boards and USB cards clandestinely inserted into targeted computers, The New York Times reported. The waves can then be sent to a briefcase-sized relay station intelligence agencies can set up just miles away, according to NSA documents.
The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
Officials told The Times most of the implants, by far, were for surveillance and to serve as early warning for a cyber-attack aimed at the US. One official likened them to buoys used to track submarines.
The US has targeted a Chinese Army unit thought to be responsible for most of the bigger cyber-attacks wielded against the US. Documents from Snowden’s trove show the US has two data centers in China from which it can insert malware into computers.
The US maintains Quantum is not used for economic purposes, as it has complained that Chinese attacks have done.
AthlonSavage
reply to post by Indigent
I wonder how long it will be before people start flooding NSA with law suits.
NSA...are you listening ?
Indigent
reply to post by zeroBelief
NSA...are you listening ?
Its in use since 2008, if you are on the internet they are listening, this new stuff is for isolated terminals not connected to internet.
_R4t_
reply to post by Indigent
Two years ago a friend of mine called me paranoid because I have a triple head setup, I run linux and I have a kde widget embeded in the background of one of my monitors that's constantly monitoring Snort IDS, all incoming/outgoing connections + ports and usblockdown with a strick set of rules that only accept input data from the vendors of the USB devices I own and pops me alert on the widget of anything fishy on my network or if something comes from a USB stick.
NOW WHO'S LAUGHING!!!
Indigent
_R4t_
reply to post by Indigent
Two years ago a friend of mine called me paranoid because I have a triple head setup, I run linux and I have a kde widget embeded in the background of one of my monitors that's constantly monitoring Snort IDS, all incoming/outgoing connections + ports and usblockdown with a strick set of rules that only accept input data from the vendors of the USB devices I own and pops me alert on the widget of anything fishy on my network or if something comes from a USB stick.
NOW WHO'S LAUGHING!!!
no one because it was true? it is a sad newsedit on 15-1-2014 by Indigent because: ''is'' was missing
tencap77
I prefer "tempest", why hack a users computer when you can just look over they're shoulder from a fai distance away and WATCH everyting they are doing with the machine.
When they shut if off and leave it unattended, you have a recording of everything they did, and you can just log right in, to that users computer, and it will LOOK like the actual user is sitting right there!
_R4t_
Indigent
_R4t_
reply to post by Indigent
Two years ago a friend of mine called me paranoid because I have a triple head setup, I run linux and I have a kde widget embeded in the background of one of my monitors that's constantly monitoring Snort IDS, all incoming/outgoing connections + ports and usblockdown with a strick set of rules that only accept input data from the vendors of the USB devices I own and pops me alert on the widget of anything fishy on my network or if something comes from a USB stick.
NOW WHO'S LAUGHING!!!
no one because it was true? it is a sad newsedit on 15-1-2014 by Indigent because: ''is'' was missing
If you take in account it takes a single click to a link thats hooked with codes you'll never see that transparently to the page your going to see if you will, which can then forward you to a server that'll automatically detect which version of browser your using, the operating system its on, guess the version and launch an automated customer attack using those parameters to then exploit a hole in the browser so a payload can be uploaded... Than a post-exploitation script can automatically be fired to kill all traces and erase logs all within minutes. From there all the websites you've been, passwords to all your bank accounts, any credit card number you type on will be caught and sent back to the attacker.
And thats not the NSA champ...
And thats only moderately sophesticated in terms of attack... Thats the stuff most kids with mid grade computer knowledge can find how to do on youtube. You don't want to hear about the more high end stuff trust me... For 20$ at radio shack I can McGiver you a device that plugs into a power socket and stiff ever single damn keystroke of an entire building by pluging it into 1 power socket... As long as they have PS2 keyboards and those are still commonly used.
There's a huge difference between paranoiya and awareness...
Bedlam
tencap77
I prefer "tempest", why hack a users computer when you can just look over they're shoulder from a fai distance away and WATCH everyting they are doing with the machine.
Works with unshielded CRTs. Not so much with LCDs. Sad to say.
When they shut if off and leave it unattended, you have a recording of everything they did, and you can just log right in, to that users computer, and it will LOOK like the actual user is sitting right there!
Not at all. It's a method for getting data from noise leaks, but you absolutely can't "log right in, to that user's computer".
_R4t_
Just a good example of how powerful thinking out of the box can be under the right circumstance... No one would of ever though you could literally sniff high standard encryption keys just by pointing microphones at a PC's power supply... yet its been done...
Bedlam
reply to post by _R4t_
I've seen them pick off encrypted voice comms not by decrypting the traffic but by looking at nearly unmeasurable amplitude and frequency variations caused by the voice amplifiers drawing more or less current and causing the power supply voltages to vary.