Wednesday, January 15, 2014

Your Computer Could Be Accessed Even When Not Connected to the Internet

As if right out of a James Bond movie, the New York Times reported today that there is technology that has been in use since 2008 that allows your computer to be monitored, even when it is not connected to the internet.  This is done through a tiny specially designed radio chip that can be implanted into a computer allowing activity on the non-connected computer to be monitored.  The tiny chips operate off of radio frequencies and are typically installed by a spy, a manufacturer or an unwittingly user.  I would add hackers to that list as well.

It was recently reported that the NSA is able to intercept packages of computer equipment sent through the mail and divert them to a facility where they carefully open the packages and install monitoring software (a process called interdiction).  I would certainly think that these chips would be part of the 'standard surveillance package' secretly inserted into these computers during interdiction.

The monitoring part happens when anyone with access to these chips activates the one inside your computer.  They can be miles away and send a radio wave to your computer and your computer will communicate back to them allowing access to your files or even allowing them to reactivate your internet connection.  Science fiction becomes reality.

Most computers parts today are made in China, Japan and Taiwan.  One has to wonder if these countries are already installing such equipment on these computers without anyone's knowledge.  After all, while China may be the premier trading partner with the US, socially, culturally and otherwise the Chinese and US governments have many differences.  What a great way for the Chinese government to learn all about what Americans are doing by simply implanting these tiny chips into the computers they ship.

That this technology exists is the most worrisome part.  Your computer could be compromised by hackers or others looking to do you harm even when you aren't connected.  The computer you are using now could have been interdicted and infected.  The chip could have been implanted by the manufacturer, by the NSA, by a postal service crime organization, by your company's IT department or by someone who broke into your home.  If you bought your computer used, the chances are even higher because you don't know who has had access to that computer and installed this bug.

Privacy Action Plan - How to protect the data on your computer when it is not connected to the internet
PRS - Level 4

Thankfully, the solution to gaining privacy in this area is simple.  Turn your computer off when you are not using it.  Since many computers still have many areas that are 'on' even after the computer is shut down, you should unplug it and remove the battery as well.  If you don't want to remove the battery each time you shut down, a Faraday Bag should work since these bugs reportedly work off of covert, but ordinary radio waves.

No comments:

Post a Comment