Non-Internet computers are also monitored by US spies

The NSA has developed a "secret technology" that can interfere with the radio waves from which to access the victim's computer without the need for an Internet connection.

The scandals surrounding the US National Security Bureau conducting recent eavesdropping incidents are heated with an information that keeps us all from worrying. If previous eavesdropping cases only happen when a user's computer or device is connected to the Internet, then according to the New York Times , even machines without an Internet connection could be victim of this organization.

Non-Internet computers are also monitored by US spies Picture 1

Derived from a leaked document, the New York Times said the NSA has developed a " secret technology " that can interfere with radio waves from which to access the victim's computer without the need for a connection Internet connection (offline) . Along with eavesdropping software for online installation, this organization has overheard more than 100,000 users worldwide.

According to Times , eavesdropping technology even when this computer is offline depends on a peripheral device capable of transmitting radio waves, such as USB or other types of hardware / accessories. Only when these accessories are connected to the victim's computer can eavesdrop. Eavesdropping hardware may be accidentally plugged in by users, but may also be plugged in by the manufacturer ( computer, accessory ), or an organization. However, the specific identities of participating organizations were not disclosed.

Non-Internet computers are also monitored by US spies Picture 2

The favorite targets of this NSA's eavesdropping program are often Chinese military units that were accused by Washington of having done a lot of digital attacks on the US military. The newspaper said the program also targets Russian military organizations, Mexican police computer systems and drug gangs, European Union trade organizations and allies such as Saudi Arabia. India and Pakistan .

4 ★ | 1 Vote

May be interested

  • 'XP mode' in Windows 7 can be compromised by securityPhoto of 'XP mode' in Windows 7 can be compromised by security
    when released in windows 7 in 2009, microsoft integrated into this operating system a feature called xp mode that enables users and businesses to run applications compatible with windows xp.
  • Google launched a new 'take down' network toolPhoto of Google launched a new 'take down' network tool
    google has just launched a new tool with a feature that helps consumers save significant amounts of money paid for telecommunications service providers.
  • YouTube supports ultra-sharp 4K videoPhoto of YouTube supports ultra-sharp 4K video
    in a rather unexpected move, google has added a 4k video quality display mode (4 times higher than full-hd standard) on youtube video sharing service.
  • Google is more famous than ApplePhoto of Google is more famous than Apple
    google has really exploded in 2013. many products and upgrades of the company in the past year have been actively supported by users. and of course, news about the company is also constantly chasing the media in 2013.
  • AAG cable will be repaired on January 9, 2014Photo of AAG cable will be repaired on January 9, 2014
    from fpt telecom, it is expected that aag submarine cable will be repaired and put into operation on january 9, 2014. currently, fpt telecom has recovered 70% of the capacity lost due to the aag cable incident at the end of last week.
  • More than 1.7 billion cyber attacks in 2013Photo of More than 1.7 billion cyber attacks in 2013
    mobile is a fast growing it sector. in 2013, security issues around mobile devices have reached a new level of increase in both quantity and quality. if 2011 was the year the mobile malware started to attract attraction to hackers, then in 2013, these malicious software became more complete and sophisticated.