Wednesday, January 15, 2014

NSA Able to Target Off-Line Computers Using Radio Waves

Chris Carrington
Activist Post

A report by RT states that the NSA has implanted software in computers around the world that enables them to use surveillance of those machines even when they are off-line.

According to the report:
The secret technology uses covert radio waves transmitted from small circuit boards and USB cards clandestinely inserted into targeted computers, The New York Times reported. The waves can then be sent to a briefcase-sized relay station intelligence agencies can set up just miles away, according to NSA documents, computer experts and US officials. 
The radio frequency technology – which often needs to be physically inserted by a spy, manufacturer or unwitting user – has helped US spies access computers that global adversaries have gone to great lengths to protect from surveillance or cyber-attack. 
The NSA calls use of the infiltration software and radio technology – all part of a program known as Quantum -“active defense”against cyber-attacks, though it has condemned use of similar software by Chinese attackers against American companies or government agencies. 
“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,”James Andrew Lewis, cyber security expert at the Center for Strategic and International Studies in Washington, told The Times.“Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”

Russia and China have been frequent targets of the technology, as have Mexican authorities and drug cartels.

Edward Snowden has released documents showing the locations of around 100,000 implanted computers around the globe, and last month Der Spiegel published details of the NSA ANT product data.

(Image from

The NSA maintains that the implanted systems gives an early warning of cyber attacks aimed at the US…something that many technology experts say is not strictly true.

The debacle over the NSA and its techniques has circled the globe, and there’s no sign yet that the firestorm of accusation against the department is going to stop anytime soon.

Chris Carrington is a writer, researcher and lecturer with a background in science, technology and environmental studies. Chris is an editor for The Daily Sheeple, where this first appeared. Wake the flock up!

This article may be re-posted in full with attribution.


If you enjoy our work, please donate to keep our website going.


Anonymous said...

I think this means that from now on, no person can be held responsible for anything that is found on their computer since any number of people have access to it.

Dusty Drawer said...

Could be true... then again, if the some gov't wingnut wanted to scare patriots, "wingers," and "baggers" into not using their computers for storage or communication, the way to do it would be to announce a boogeyman technology like this. If the story ~is~ true, then whoever went public with it ~could be~ guilty of something akin to treason... ~if~ the TRUE intent of the technology was to save American lives and/or property and/or intellectual property.

elle pavlova said...

Dusty, placing people under surveillance without a warrant, investigations using parallel construction, denying free speech and manipulation of communications including snail mail, denying people liberty by placing them on watchlists, using surveillance role players and stasi community "help" programs, gangstalking people...THOSE are treasonous actions...whistleblowers to corruption are not treasonous.

Anonymous said...

Dusty is an idiot.

Anonymous said...

Did anyone stop to notice the cost? In groups of 50, only $20,300 EACH! When some Americans are starving, this is just wrong.

Anonymous said...

Not much longer until Skynet becomes self-aware. The human condition will no longer apply.

Bob Williams said...

It's back to the pre-1995 MAC, with only 5 holes for NSA to wiggle through.

Keshet Israel said...

I want to see the 100,000 locations! To know if my computer is one of them!
Notice the 'declassify' 2032!! They just wanted to (violate our constitutional Rights) by collecting all of our private data for 25 years, using 'covert' op as a 'reason' for violating the constitution!? How do you stop a Covert Black Ops program that kills people as part of their job, so that they can continue their corrupt plans!? Will Eric Holder bring Charges against the NSA? Or quit, since if he doesn't he's not doing his job!?

Anonymous said...

i'm glad i build my own shyt, i know my setup intimately. lol thats kinda funny considering that movie that just come out with the guy who falls in love with his cpu

Anonymous said...

For 15 years now, or more, the NSA has been acesssing every form of electronic communiation on earth, such as email, telephone, radio, TV, etc etc. The MIT professor that designed the system said so on major metwork talk radio many years ago, and Major Moorer of Army intelligence confirmed it in a series of live lectures that I attened moe than five years ago.

They can access your computer even when you think it is turned off, take everything off of it, or insert things into it. I sat quietly in my office late on night and wtched them remotely turn it on and take everything off of it. This way about three weeks after 911. I was target by them because I have been active in controversial politics. The only way to be safe from this is to unplug and disconect everything. If they really want you badly enough, they could plant child porno on your computer and report you to the FBI. Have fun in prison. Or, I know for a fact, they could call the White House using your phone number and make a death threat. Have fun in the federal supermax for the next 20 years.

Post a Comment