BitWhisper
,
,
Another capability this method features is instructing a pre-installed spyware on the target computer, and ’pump’ it for data and info. A computer used for spying does not feature any special sensors, and it is situated within 50 cm from the target system.
Much like many other surveillance means, this capability too is complimentary, and it will remains so even when it matures. Such means abound in today’s market, with some requiring intelligence agencies to become integrators of numerous technological capabilities and gain intelligence-operational understanding thereof, in order to have complete situational awareness.
The NSA too attaches high importance to gathering intelligence from stand-alone computers which are impervious to the internet. According to various reports, the NSA has been installing, since 2008, tiny circuits on USB devices, which relay data at radio frequencies to receivers imbedded in suitcase. The material is subsequently relayed to the NSA’s installations. The distance between the USB device and the nearest receiver could reach up to nearly 13 km. It has been alleged that the espionage and relay have been targeting not only computers but also network elements such as routers and so on.
Having to hide classified data and the counter need to reveal it, are ultimately going to make for source of livelihood for many people. Ben Gurion University is home to an original and interesting method of providing partial solution to the aggressor vis-à-vis the target.
=============================================================
Article courtesy : iHLS – Israel Homeland Security
Get Citizensjournal.us Headlines free SUBSCRIPTION. Keep us publishing – DONATE
Scroll down to post a comment









