How can the NSA monitor computers that are offline?


The latest NSA revelations concern the agency physically installing backdoors that allow them to monitor machines even when they are not connected to the internet. How would this work? How can they monitor something that isn’t online?

Tags: backdoors, NSA
Topic: Security
Answer this Question


2 total
Vote Up (7)

N.S.A. Devises Radio Pathway Into Computers

"The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials."

Vote Up (5)

You can pour out a little chianti in thanks to Guglielmo Marconi for this NSA ability. Radio waves, my friend, radio waves, zipping through thin air straight to the all-seeing eyes of the NSA. Transmitters are installed inside the case, and apparently they are small enough to be concealed in USB cards (or possibly even cables according to some news reports). Of course, the transmitter has to be physically installed, which might seem difficult at first glance, but apparently manufacturers are willing to help the NSA with that when asked so your shiny new machine may come with an express connection to The Brave New World.

Ask a question

Join Now or Sign In to ask a question.
Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.
A U.S. Federal Bureau of Investigation spokesman said Wednesday the agency is working with the Secret Service to determine the "scope" of reported cyberattacks against several financial institutions.
A payment card industry security consortium warned retailers on Wednesday of the urgency to secure their systems against "Backoff," a malicious software program that steals card numbers.
Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011.
Some visitors to several high-profile websites last week were redirected to browser exploits that installed malware on their computers because of malicious advertisements on those sites.
Netflix has released three internal tools it uses to catch hints on the Web that hackers might target its services.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach
McAfee, part of Intel Security, has made improvements to its Server Security Suites portfolio with the introduction of performance optimisation and additional management efficiency to increase security for servers in physical, virtualised and Cloud environments.
The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.
Join us: