Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Chicks just love a Geek in Uniform.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » January 2013 » Attacking networks using electromagnetic interference

Attacking networks using electromagnetic interference


Contributed by: Email on 01/17/2013 02:39 PM [ comments Comments ]


According to a report in Defense News, the Intelligence and Information Warfare Directorate (I2WD), a research section of the US Army, is looking at ways of using electromagnetic waves to infiltrate sealed networks. The report states that the army is running the Tactical Electromagnetic Cyber Warfare Demonstrator program with objectives which include both extracting data from and injecting data into sealed cable networks.

Such capabilities would, for example, make it possible to inject a government trojan into a network by briefly parking a vehicle in front of the building housing the target network. This could in theory also be achieved using an unmanned aircraft flying over the target building. Networks used for critical activities are usually sealed off from the outside world, meaning that injecting a worm requires physical access to the network.

Iran's uranium enrichment facility at Natanz, for example, was infected using a specially prepared USB flash drive containing the Stuxnet worm. In response, such drives were then banned from the facility. The use of USB drives is also banned in many other critical areas. Injection using electromagnetic radiation would therefore provide a welcome alternative – and not just for the US government.

According to Defense News, its expert sources have led it to understand that the relevant technology already exists and is sufficiently light and compact to be carried by a single individual. There are, however, still significant range and bandwidth limitations. The transmission system has to be very close to the target network and transmission of complex data still takes a long time. For confidentiality reasons, the unnamed expert did not wish to provide the magazine with further details, making it hard to assess the reliability of their statements.

The idea that electromagnetic emissions from electronic devices can be used for espionage is not new – the NSA has been carrying out research in this area for decades under the code name TEMPEST. It is based on the principle that cables in electronic devices also act as antennas, broadcasting data transferred over them. Eavesdropping attacks on keyboards and monitors using this technique have already been demonstrated.






« openSUSE 12.3 Beta released · Attacking networks using electromagnetic interference · Aaron's Law hopes to blunt US computer crime law »




Comments
comments powered by Disqus

MajorGeeks.Com » News » January 2013 » Attacking networks using electromagnetic interference

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition