Thursday, August 28, 2014

Issue 406 Computer whisperer August 28, 2014

Well the Israelis have done it again.  When it comes to spy gadgets this one is nothing short of incredible.  You can actually monitor a computer via the sounds it makes.  Well let me explain how it works (compliments of the magazine Economist).  

How it works:  There are two parts to this nifty technology.  The first is the listening device.  Did you know that each key on the keyboard makes a unique sound?  Did you also know that as the computer runs programs that the noise it makes is unique for each of those processes?  So this device can monitor in real time that information and then send it back to a home base.  But this is not all.  If the spy wants to get the data in the computer itself, then they have but to send a fake email and have it opened.  Once accomplished the email sends an encrypted file into the computer which decodes its software and makes it easier to digest information.  What I mean by this is that it allows the device to more easily decode and absorb the electronic noises and thus opens the entire computer and its files to being copied.  So for as long as the device and or the program goes undetected, a spy can monitor everything that goes on with your computer.


Conclusion:  Scary isn't it.  By simply having a listening device setup, you can decode what a person is typing up on a keyboard and what program(s) they may be running.  If you add the decoding program, then you no longer have any privacy on your computer.  The device to monitor the computers noise does not necessarily have to be in the same room, it just has to be able to listen to what's going on (like say from a drone).  And for all we know, they may be able to decode from more things than just sound?  For instance computers generate heat, and also electrons move in the computer as it goes through its various processes.  So who knows if they have the ability to detect and translate that as well?  Everything we do is capable of being monitored, so we have to figure out where our privacy begins and or safety ends.

No comments:

Post a Comment