The NSA has come under a fair bit of criticism over the last couple of months, and now new leaked documents have revealed that the NSA were able to access computers that were offline using radio waves.
According to The New York Times, the NSA has developed a secret technology that connects to a computer using radio waves and device like a USB device or other peripherals that are connected to computers.
The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
How the Technology Works
The NSA’s technology is both sophisticated and covert. The tiny circuit boards and USB cards act as transmitters, sending out radio waves that can be picked up by a relay station. These relay stations, which can be as small as a briefcase, are capable of intercepting the radio waves from miles away. This method allows the NSA to access data on computers that are not connected to the internet, effectively bypassing traditional cybersecurity measures.
The radio waves can penetrate walls and other obstacles, making it difficult for the target to detect the surveillance. The technology can also be used to implant malware or other malicious software onto the target computer, further compromising its security. This method of surveillance is particularly concerning because it can be used without the target’s knowledge or consent.
Implications and Concerns
The revelation of this technology has raised significant concerns about privacy and security. The ability to access offline computers means that traditional methods of protecting sensitive information, such as air-gapping, may no longer be effective. This has implications for both individuals and organizations that rely on these methods to safeguard their data.
For example, government agencies, financial institutions, and other organizations that handle sensitive information may need to reevaluate their security protocols in light of this new threat. Additionally, individuals who are concerned about their privacy may need to take extra precautions to protect their data.
The use of this technology also raises ethical questions about the extent to which intelligence agencies should be allowed to go in their efforts to gather information. While the NSA argues that this technology is necessary for national security, critics argue that it represents a significant invasion of privacy and a potential abuse of power.
You can find out more details about this technology and how it works over at the New York Times at the link below.
Source NYT, The Next Web
Latest Geeky Gadgets Deals
Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.