Skip to comments.N.S.A. Devises Radio Pathway Into Computers
Posted on 01/14/2014 6:00:33 PM PST by John W
WASHINGTON The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.
While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.
The technology, which has been used by the agency since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers.
(Excerpt) Read more at nytimes.com ...
Surely the NYT has more secrets they can release.
Yeah, when the NSA guys came to my house the other night, one of them asked if he could use my computer. So THAT'S what he was doing!
One set of paragraphs is subheaded “No Domestic Use Seen” . . . yeah right. They sure won’t be using them to keep Iran or the other Islamic terror nations in check.
I have often thought that it might be a good idea to build a Faraday cage around my computer. Maybe the time has come.
If Nixon were in power, they would be screaming to high heaven.
</rhetorical ? mark>
Reminds me of when I built a complex of servers, and needed to do some testing with some application folks at a remote site. The network guru was giving me grief, and wouldn’t let us past his firewalls in his routers. Brick wall. Time was running short, deadlines coming up, and bureaucracy wasn’t helping.
In desperation, I ran a single cable under the floor tiles from my servers to connections outside of his routers. Applications folks did their testing, then I undid the cable. Of course I protected the security of the network, as I previously had the the job the network manager now had. Sometimes it’s the simple things in life that get you past all the technological roadblocks in your path. What the NSA did is both simple and clever.
N.S.A.s activities are focused and specifically deployed against and only against valid foreign intelligence targets in response to intelligence requirements, Vanee Vines, an agency spokeswoman, said in a statement.”
Hmmm... seems like I have heard something very similar before. Oh, yeah now I recall:
At the March Senate hearing, Mr. Wyden asked Mr. Clapper, Does the N.S.A. collect any type of data at all on millions or hundreds of millions of Americans?
No, sir, Mr. Clapper replied. Not wittingly.
Mr. Wyden said on Tuesday that he had sent his question to Mr. Clappers office a day before the hearing, and had given his office a chance to correct the misstatement after the hearing, but to no avail.
In an interview on Sunday with NBC News, Mr. Clapper acknowledged that his answer had been problematic, calling it the least untruthful answer he could give.”
You need to keep up. The NSA has been intercepting machines and mod’ing them before they are delivered to the customer (no, not us low level peon’s posting on FR but some key targets and some key geography, yes).
as if nobody can open up a computer and see whats in it
There was a time when conservatives cared about the release of sources and methods. Apparently that time has passed.
I do see one, possibly two, of the posts here expressing that.
that’s right all you need is hardware and a spy to install it other than that it’s a breeze
Or buy a large microwave oven...
“was a time when conservatives cared about the release of sources and methods. Apparently that time has passed.”
That was when entire swaths of decent patriotic American people were not designated as terrorists by law enforcement, in military exercises, in government propaganda, in the statements of the President, and when they were not the primary targets of our intelligence agencies.
As the Allman Bros sang,,, “that was then,,,, this is now”
If they can get that close - - just load a program - then hide it. If not, why not... Also, how is what NSA did both simple and clever?
Baloney,,, your turn.