Non-Internet computers are also monitored by US spies
The NSA has developed a "secret technology" that can interfere with the radio waves from which to access the victim's computer without the need for an Internet connection.
The scandals surrounding the US National Security Bureau conducting recent eavesdropping incidents are heated with an information that keeps us all from worrying. If previous eavesdropping cases only happen when a user's computer or device is connected to the Internet, then according to the New York Times , even machines without an Internet connection could be victim of this organization.
Derived from a leaked document, the New York Times said the NSA has developed a " secret technology " that can interfere with radio waves from which to access the victim's computer without the need for a connection Internet connection (offline) . Along with eavesdropping software for online installation, this organization has overheard more than 100,000 users worldwide.
According to Times , eavesdropping technology even when this computer is offline depends on a peripheral device capable of transmitting radio waves, such as USB or other types of hardware / accessories. Only when these accessories are connected to the victim's computer can eavesdrop. Eavesdropping hardware may be accidentally plugged in by users, but may also be plugged in by the manufacturer ( computer, accessory ), or an organization. However, the specific identities of participating organizations were not disclosed.
The favorite targets of this NSA's eavesdropping program are often Chinese military units that were accused by Washington of having done a lot of digital attacks on the US military. The newspaper said the program also targets Russian military organizations, Mexican police computer systems and drug gangs, European Union trade organizations and allies such as Saudi Arabia. India and Pakistan .
You should read it
- 13 notes you MUST KNOW to be SAFE ON THE INTERNET
- 10 ways to protect yourself on the Internet
- Top 10 Internet security software
- 2/3 access on the Internet ... not human
- Clear all information on the Internet: Just go to a website
- How to fix when losing Internet connection
- Free 6-month subscription to McAfee Internet Security 2019 license
- How fast should your Internet connection be?
May be interested
- 'XP mode' in Windows 7 can be compromised by securitywhen released in windows 7 in 2009, microsoft integrated into this operating system a feature called xp mode that enables users and businesses to run applications compatible with windows xp.
- Google launched a new 'take down' network toolgoogle has just launched a new tool with a feature that helps consumers save significant amounts of money paid for telecommunications service providers.
- YouTube supports ultra-sharp 4K videoin a rather unexpected move, google has added a 4k video quality display mode (4 times higher than full-hd standard) on youtube video sharing service.
- Google is more famous than Applegoogle has really exploded in 2013. many products and upgrades of the company in the past year have been actively supported by users. and of course, news about the company is also constantly chasing the media in 2013.
- AAG cable will be repaired on January 9, 2014from fpt telecom, it is expected that aag submarine cable will be repaired and put into operation on january 9, 2014. currently, fpt telecom has recovered 70% of the capacity lost due to the aag cable incident at the end of last week.
- More than 1.7 billion cyber attacks in 2013mobile is a fast growing it sector. in 2013, security issues around mobile devices have reached a new level of increase in both quantity and quality. if 2011 was the year the mobile malware started to attract attraction to hackers, then in 2013, these malicious software became more complete and sophisticated.