The latest leak from former National Security Agency contractor turned whistleblower Edward Snowden, published by the New York Times on Tuesday, revealed that the NSA has been using old-school technology to spy on offline computers. The NSA has used the secret program, codenamed Quantum, to monitor about 100,000 offline computers around the world.
The report comes just days before President Obama is expected to announce new restrictions on surveillance programs that will curtail the NSA's activities.
With Quantum, the NSA accesses computers through radio waves emitted from a variety of customized devices. One, nicknamed “Cottonmouth I,” is a USB card modified to contain a tiny radio transceiver that can secretly transmit and receive data to and from the computer.The NSA also used tiny circuit boards installed into laptop computers that broadcast to the agency even when the computer is completely isolated from the Internet.These circuit boards communicate with a briefcase-sized relay station that the NSA calls “Nightstand.” Nightstand can attack a computer from as far as eight miles away and insert packets of data faster than traditional methods, allowing the NSA to deliver false information faster than authentic downloads.
i don't know if it's true shades of "GET SMART", but those agencies of the gov't for decades never talked to each other i do believe that culture still exist just not as tight fisted as before. no doubt the technology probably exist and if so they would definitely exploit it.
to blame Pres. is wrong contrary to public belief you don't get the 411 on everything especially secret agencies example "AREA 51", the government has withheld and imposed many things on us we are not aware of it would be naive to think this is not possibly true. still no kudo's for the traitor, there are better ways to expose other than to foreign opposition in the secret business, traitor.
In addition to spying, Quantum helps the NSA to transmit malware to computers and launch coordinated cyberattacks.Quantum also targets iPhones and network servers. Over time, the NSA has updated the technology to make it easier to access the computer systems without needing physical access.The reported indicated that the NSA has used this technology in attacks against Iran’s nuclear facilities and to monitor networks in China, Russia, the European Union, Saudi Arabia, India and Pakistan, and those of drug cartels.
this info is good to know if you are a criminal or involved in something you want secret from your spouse or co-workers other than that i don't know we say we want to be safe, the republicans got Bush in by saying they were the only ones who could protect us some voted for him and later found out about phone co.'s tapping your phone and sending info to CIA, but no one asked how. if we are not willing to lose somethings we never had in the first place to feel safe do we really feel it or imposed and spied upon.
AT WHAT PRICE IS FREEDOM"?
