Non-Internet computers are also monitored by US spies

The NSA has developed a secret technology that can interfere with the radio waves from which to access the victim's computer without the need for an Internet connection.

The NSA has developed a "secret technology" that can interfere with the radio waves from which to access the victim's computer without the need for an Internet connection.

The scandals surrounding the US National Security Bureau conducting recent eavesdropping incidents are heated with an information that keeps us all from worrying. If previous eavesdropping cases only happen when a user's computer or device is connected to the Internet, then according to the New York Times , even machines without an Internet connection could be victim of this organization.

Picture 1 of Non-Internet computers are also monitored by US spies

Derived from a leaked document, the New York Times said the NSA has developed a " secret technology " that can interfere with radio waves from which to access the victim's computer without the need for a connection Internet connection (offline) . Along with eavesdropping software for online installation, this organization has overheard more than 100,000 users worldwide.

According to Times , eavesdropping technology even when this computer is offline depends on a peripheral device capable of transmitting radio waves, such as USB or other types of hardware / accessories. Only when these accessories are connected to the victim's computer can eavesdrop. Eavesdropping hardware may be accidentally plugged in by users, but may also be plugged in by the manufacturer ( computer, accessory ), or an organization. However, the specific identities of participating organizations were not disclosed.

Picture 2 of Non-Internet computers are also monitored by US spies

The favorite targets of this NSA's eavesdropping program are often Chinese military units that were accused by Washington of having done a lot of digital attacks on the US military. The newspaper said the program also targets Russian military organizations, Mexican police computer systems and drug gangs, European Union trade organizations and allies such as Saudi Arabia. India and Pakistan .

Update 25 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile