Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

N.S.A. Devises Radio Pathway Into Computers
The New York Times ^ | January 14, 2014 | DAVID E. SANGER and THOM SHANKER

Posted on 01/14/2014 6:00:33 PM PST by John W

WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which has been used by the agency since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers.

(Excerpt) Read more at nytimes.com ...


TOPICS: Front Page News; News/Current Events; War on Terror
KEYWORDS: alterdata; domesticspying; newyork; newyorkcity; newyorkslimes; newyorktimes; nsa; nsascandals; nsaspying; obama; surveillance; yeswescan
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-74 next last

1 posted on 01/14/2014 6:00:33 PM PST by John W
[ Post Reply | Private Reply | View Replies]

To: John W

Surely the NYT has more secrets they can release.


2 posted on 01/14/2014 6:05:00 PM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W
a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers

Yeah, when the NSA guys came to my house the other night, one of them asked if he could use my computer. So THAT'S what he was doing!

3 posted on 01/14/2014 6:12:20 PM PST by Right Wing Assault
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W

One set of paragraphs is subheaded “No Domestic Use Seen” . . . yeah right. They sure won’t be using them to keep Iran or the other Islamic terror nations in check.


4 posted on 01/14/2014 6:14:35 PM PST by Olog-hai
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W
The technology, which has been used by the agency since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers.

I have often thought that it might be a good idea to build a Faraday cage around my computer. Maybe the time has come.

Faraday Cage .

5 posted on 01/14/2014 6:17:10 PM PST by Pontiac (The welfare state must fail because it is contrary to human nature and diminishes the human spirit.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver

If Nixon were in power, they would be screaming to high heaven.


6 posted on 01/14/2014 6:19:14 PM PST by Luke21
[ Post Reply | Private Reply | To 2 | View Replies]

To: John W
Wouldn't it be fun to start hearing stories from all over the country of the mysterious 'disappearance' of droves of these fascist Judas bastards ! ?



</rhetorical ? mark>

7 posted on 01/14/2014 6:23:38 PM PST by tomkat
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W

Reminds me of when I built a complex of servers, and needed to do some testing with some application folks at a remote site. The network guru was giving me grief, and wouldn’t let us past his firewalls in his routers. Brick wall. Time was running short, deadlines coming up, and bureaucracy wasn’t helping.

In desperation, I ran a single cable under the floor tiles from my servers to connections outside of his routers. Applications folks did their testing, then I undid the cable. Of course I protected the security of the network, as I previously had the the job the network manager now had. Sometimes it’s the simple things in life that get you past all the technological roadblocks in your path. What the NSA did is both simple and clever.


8 posted on 01/14/2014 6:23:56 PM PST by roadcat
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W

“N.S.A.’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement.”

Hmmm... seems like I have heard something very similar before. Oh, yeah now I recall:

At the March Senate hearing, Mr. Wyden asked Mr. Clapper, “Does the N.S.A. collect any type of data at all on millions or hundreds of millions of Americans?”

“No, sir,” Mr. Clapper replied. “Not wittingly.”

Mr. Wyden said on Tuesday that he had sent his question to Mr. Clapper’s office a day before the hearing, and had given his office a chance to correct the misstatement after the hearing, but to no avail.

In an interview on Sunday with NBC News, Mr. Clapper acknowledged that his answer had been problematic, calling it “the least untruthful” answer he could give.”

Freegards


9 posted on 01/14/2014 6:25:42 PM PST by Ransomed
[ Post Reply | Private Reply | To 1 | View Replies]

To: Right Wing Assault

You need to keep up. The NSA has been intercepting machines and mod’ing them before they are delivered to the customer (no, not us low level peon’s posting on FR but some key targets and some key geography, yes).


10 posted on 01/14/2014 6:28:54 PM PST by Ghost of SVR4 (So many are so hopelessly dependent on the government that they will fight to protect it.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: John W

as if nobody can open up a computer and see whats in it


11 posted on 01/14/2014 6:30:59 PM PST by GeronL (Extra Large Cheesy Over-Stuffed Hobbit)
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W

There was a time when conservatives cared about the release of sources and methods. Apparently that time has passed.


12 posted on 01/14/2014 6:33:23 PM PST by Ramius (Personally, I give us one chance in three. More tea anyone?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ramius

I do see one, possibly two, of the posts here expressing that.


13 posted on 01/14/2014 6:36:22 PM PST by John W (Viva Cristo Rey!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: John W

that’s right all you need is hardware and a spy to install it… other than that it’s a breeze


14 posted on 01/14/2014 6:38:26 PM PST by Nifster
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W
?transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers.?

now how do they intend to get the physical access to do that??

I sense this story is Progpoganda for that very reason.

what they would want to spread this rumor is beyond me


15 posted on 01/14/2014 6:39:43 PM PST by MeshugeMikey (This Message NOT Approved By The N.S.A.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pontiac

Or buy a large microwave oven...


16 posted on 01/14/2014 6:42:30 PM PST by GOPJ ("Remember who the real enemy is... ")
[ Post Reply | Private Reply | To 5 | View Replies]

To: Ramius

“was a time when conservatives cared about the release of sources and methods. Apparently that time has passed.”

That was when entire swaths of decent patriotic American people were not designated as terrorists by law enforcement, in military exercises, in government propaganda, in the statements of the President, and when they were not the primary targets of our intelligence agencies.

As the Allman Bros sang,,, “that was then,,,, this is now”


17 posted on 01/14/2014 6:46:39 PM PST by DesertRhino (I was standing with a rifle, waiting for soviet paratroopers, but communists just ran for office.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: roadcat
...a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers...

If they can get that close - - just load a program - then hide it. If not, why not... Also, how is what NSA did both simple and clever?

18 posted on 01/14/2014 6:48:25 PM PST by GOPJ ("Remember who the real enemy is... ")
[ Post Reply | Private Reply | To 8 | View Replies]

To: DesertRhino

Nonsense.


19 posted on 01/14/2014 6:51:54 PM PST by Ramius (Personally, I give us one chance in three. More tea anyone?)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Ramius

Baloney,,, your turn.


20 posted on 01/14/2014 7:00:58 PM PST by DesertRhino (I was standing with a rifle, waiting for soviet paratroopers, but communists just ran for office.)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-74 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson