Skip to main content

NSA reportedly using radio waves to tap offline computers


The National Security Agency is using secret wireless technology that allows it to access and alter data on computers, even when they are not connected to the Internet, according to a New York Times report.
Since 2008, the agency has been increasingly using "a covert channel of radio waves" that can transmit from hardware installed in the computers, according to NSA documents and experts interviewed by the Times. Signals can then be sent to briefcase-size relay stations miles away, according to the report.
The NSA has also installed surveillance software on nearly 100,000 computers around the world, according to the Times. The newspaper said the Chinese Army was a frequent target of such technology but said there was no evidence that the agency used either technology inside the US.
Repeating earlier denials that its data collection activities are arbitrary or unconstrained, the NSA rejected any comparison to Chinese attackers who have been accused to planting similar software on computers belonging to US companies and government agencies.
"NSA's activities are focused and specifically deployed against -- and only against -- valid foreign intelligence targets in response to intelligence requirements," the NSA said in a statement. "In addition, we do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of -- or give intelligence we collect to -- U.S. companies to enhance their international competitiveness or increase their bottom line."
The surveillance agency also asserted that a complex web of laws, regulations, and policies governed its use of such tools and that "continuous and selective publication" of the agency's techniques was "detrimental to the security of the United States and our allies."
Last month, a Der Spiegel report detailed how the agency's Office of Tailored Access Operations intercepts deliveries of electronic equipment to plant spyware to gain remote access to the systems once they are delivered and installed. According to that report, the NSA has planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor, Samsung, and Huawei.
The German news magazine also described a 50-page product catalog of tools and techniques used by a program called ANT, which stands for Advanced or Access Network Technology, to send and receive signals to devices.
President Obama is expected to announce on Friday which changes to the NSA he is expected to adopt based on recommendations from a presidential task force. The panel, which was appointed by President Obama in the wake of disclosures made this summer by former NSA contractor Edward Snowden, has reportedly proposed stricter standards for NSA data searches and that a third party be responsible for storing phone records collected by the agency.

Comments

Popular posts from this blog

ESP32-C6 Wi-Fi Logger with Browser GPS + Heat Map Dashboard

This project is an ESP-IDF firmware for the Seeed Studio XIAO ESP32-C6 that turns the board into a self-hosted, secure Wi-Fi scanning logger. It creates its own access point, serves a responsive HTTPS web UI, logs nearby Wi-Fi access points, optionally tags rows with GPS coordinates (provided by the client browser), and exposes battery status from the on-board LiPo input. The end result is a pocket Wi-Fi “survey” tool: scan, track, export logs as CSV, and generate a heat map view to visualize RSSI vs location. Project overview and feature set: :contentReference[oaicite:1]{index=1} What it does AP + Station mode so the device can serve the dashboard while scanning nearby Wi-Fi networks. HTTPS web interface using a bundled certificate/key for local secure access. Single scan and continuous tracking modes. CSV export for analysis and archiving. Persistent logging to SPIFFS at /spiffs/logs.csv . Battery monitoring via ADC with voltage/percentage/status sh...

learn how to sniff wireless passwords with pirni

The thing about the iPod Touch and the iPhone is that they are great portable hacking devices. To the naked eye the iPod Touch/iPhone looks like nothing more than an ordinary mp3 player/cellphone however that is just an understatement to its full potential. Once your Ipod Touch/iPhone is jailbroken you have access to your whole file system meaning that applications generally associated with laptop/desktop hacking can be ported and used on the iPod Touch/iPhone. This opens up a whole lot of possibilities for network sniffing, port scanning and much much more! In this tutorial we are going to take a look at one of these programs called Pirni. What is Pirni? Pirni is an application that was ported to The Ipod Touch/iPhone to be used as a native network sniffer. Pirni is so useful because it gets past the iPod Touch’s/iPhone’s wifi hardware limitation of not being able to be set into promiscious mode (a mode that allows a network device to intercept and read each network packet that arrive...

how to run a GUI application throw SSH using X11

soo all we need is first to install the ssh server on the server - machine we like to control so - 1. sudo su 2. apt-get install openssh-server . . now back to our machine using the ssh : 1. ssh -V -X username@the-server-ip 2. enter the password and that is it now we can run any GUI application that install on the server using his CPU cycles yahhhh great !! for example lets run WireShark : 3. gksudo wireshark & now all that if we runing tow Linux machines !! but what windows users that like to run a linux app??! !! soo we need it tow applications 1. putty you can get it here : http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html 2.Xming you can get it here : http://sourceforge.net/projects/xming/ ok so first we need to install Xming , and after that we going to use butty but we need to cheak Enable X11 forwarding in connection -- > SSH -- > X11 >> Enable x11 forwarding . and that is it free to run any linux application on windows using SSH . have fun ...