It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Because most modern computers, especially laptops, have built-in microphones and speakers, air-gap malware is designed to communicate secure information acoustically, at frequencies near or beyond the limit of human hearing. The technique is limited to computers in close physical proximity (about 65 feet (20 m)[2]), and is also limited by the requirement that both the transmitting and receiving machines be infected with the proper malware to form the communication link. The physical proximity limit can be overcome by creating an acoustically linked mesh network, but is only effective if the mesh network ultimately has a traditional ethernet connection to the outside world by which the secure information can be removed from the secure facility.
National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government, and is a very serious threat.
originally posted by: AutumnWitch657
What's even funnier is that people think these computers are all connected to each other and run by the government. My phone , my water, my electric, my cable, the gas line, the drains... everything is private enterprise not run by the government. But some people will believe anything. If it sounds good. Or even if it doesn't. reply to: Shadoefax
PS I love your screen name.
originally posted by: AutumnWitch657
I'm not buying that story. Sorry just too sci-fi. Air gap...yeah sure. No WiFi cards and still. Yeah sure...must have been a 4G phone system. Ping ping ping...from one cell tower to the next...yep. They called and asked if their refrigerator was running...a reply to: jadedANDcynical
originally posted by: Thorneblood
a reply to: AutumnWitch657
I take it you don't understand air gapping malware
Because most modern computers, especially laptops, have built-in microphones and speakers, air-gap malware is designed to communicate secure information acoustically, at frequencies near or beyond the limit of human hearing. The technique is limited to computers in close physical proximity (about 65 feet (20 m)[2]), and is also limited by the requirement that both the transmitting and receiving machines be infected with the proper malware to form the communication link. The physical proximity limit can be overcome by creating an acoustically linked mesh network, but is only effective if the mesh network ultimately has a traditional ethernet connection to the outside world by which the secure information can be removed from the secure facility.
originally posted by: Dolby_X
what about electric cable network communication ? www.netgear.com...
Power cables can be considered linear antennas . . . Whenever PLC signals overlay frequency ranges of wireless services, interference may occur.8
Another research paper, published by the British Broadcasting Corporation, states:
there is the difficulty for radio-system users that the signals [PLC] injects do not simply travel from point to point along the wiring, they also escape as radiated emissions [emphasis in original]6
Espionage using the antenna effect
The United States and the Soviet Union both started on preventing snooping by wireless means on their teleprinters, cryptosystems and computers in the 1950s. Even though these machines are not considered wireless transmitters, they have unintended wireless emissions and create dirty electricity, which can be used to decipher the secret messages.
Computers housing the world’s most sensitive data are usually “air-gapped” or isolated from the internet. They’re also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too. Sometimes, workers are not even allowed to bring mobile phones within range of the computers. All of this is done to keep important data out of the hands of remote hackers.
But these security measures may be futile in the face of a new technique researchers in Israel have developed for stealthily extracting sensitive data from isolated machines—using radio frequency signals and a mobile phone.
The attack recalls a method the NSA has been secretly using for at least six years to siphon data in a similar manner. An NSA catalogue of spy tools leaked online last year describes systems that use radio frequency signals to remotely siphon data from air-gapped machines using transceivers—a combination receiver and transmitter—attached to or embedded in the computer instead of a mobile phone. The spy agency has reportedly used the method in China, Russia and even Iran. But the exact technique for doing this has never been revealed.
The researchers in Israel make no claims that theirs is the method used by the NSA, but Dudu Mimran, chief technology officer at the Israeli lab behind the research, acknowledges that if student researchers have discovered a method for using radio signals to extract data from hard-to-reach systems, professionals with more experience and resources likely have discovered it, too.
originally posted by: rigel4
This is bull#.. I don't believe it.
Many of these examples given are off-line scada networks.
someone is hiding something behind this.
originally posted by: Thorneblood
a reply to: Aazadan
Oh I understand all that, there is actually a fascinating article in Wired all about it...
A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security.
The hacked software is used to control complex industrial operations like oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants. Shutting down or damaging any of these vital public utilities could severely impact hundreds of thousands of Americans.