Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • KV Cache Is Eating Your VRAM. Here’s How Google Fixed It With TurboQuant.
    • OneOdio Focus A1 Pro review
    • The 11 Best Fans to Buy Before It Gets Hot Again (2026)
    • A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)
    • ‘Euphoria’ Season 3 Release Schedule: When Does Episode 2 Come Out?
    • Francis Bacon and the Scientific Method
    • Proxy-Pointer RAG: Structure Meets Scale at 100% Accuracy with Smarter Retrieval
    • Sulfur lava exoplanet L 98-59 d defies classification
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, April 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Technology»How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers
    Technology

    How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

    Editor Times FeaturedBy Editor Times FeaturedMarch 4, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Computer systems leak secrets and techniques. Not simply by invasive ad tracking, data-stealing malware, and your ill-advised oversharing on social media, however by physics. The actions of a tough drive’s elements, keystrokes on a keyboard, even the electrical cost in a semiconductor’s wires produce radio waves, sound, and vibrations that transmit in all instructions and may—when picked up by somebody with sufficiently delicate gear and sufficient spycraft to decipher these alerts—reveal your non-public knowledge and actions.

    This class of spying methods, initially codenamed TEMPEST by the Nationwide Safety Company however now encompassed within the extra common time period “side-channel attacks,” has been a recognized downside in laptop safety for near eight a long time, and it is one which the US authorities rigorously considers in securing its personal categorized info. Now a pair of US lawmakers are launching an investigation into how weak the remainder of us are to TEMPEST-style surveillance—and whether or not the US authorities must push system producers to do extra to guard Individuals.

    On Wednesday, Senator Ron Wyden and Consultant Shontel Brown launched a letter they despatched to the Authorities Accountability Workplace (GAO) demanding an investigation into the vulnerability of contemporary computer systems to TEMPEST-style side-channel assaults, the monitoring and deciphering of unintentional emanations from PCs, telephones, and different computing gadgets to surveil their operations. Within the letter, Wyden and Brown write that these types of spying “don’t simply pose a counterintelligence menace to the US authorities, however these strategies may also be exploited by adversaries towards the American public, together with to steal strategically necessary applied sciences from US corporations.”

    Together with the letter, Wyden and Brown additionally commissioned a newly launched Congressional Research Service report concerning the historical past of TEMPEST and the modern menace posed by comparable side-channel assaults. It describes the US authorities’s efforts to guard its gadgets from these spy methods, together with using remoted, radio-shielded areas for securely accessing secret info often called a Delicate Compartmented Info Facility, or SCIF. In the meantime, the federal government has “neither warned the general public about this menace, nor imposed necessities on the producers of shopper electronics, comparable to smartphones, computer systems and laptop equipment, to construct technical countermeasures into their merchandise,” Wyden and Brown level out within the letter. “As such, the federal government has left the American individuals weak and at the hours of darkness.”

    Wyden and Brown’s letter ends by urging GAO to overview an inventory of TEMPEST-related points: the dimensions of the trendy privateness menace of side-channel assaults, the “price and feasibility” of implementing protections towards them in trendy gadgets, and “potential coverage choices to mitigate this menace towards the general public, together with mandating system producers add countermeasures to their merchandise,” suggesting that Congress may apply strain to tech corporations so as to add extra defenses to the gadgets they promote.

    Simply how sensible side-channel assaults like TEMPEST are towards trendy computing gadgets—and the way usually they’re really used within the wild by hackers and spies—stays removed from clear. However the potential of such assaults has been taken significantly by the US authorities since as early because the Nineteen Forties, when Bell Labs found that machines it bought to the US navy for encrypting messages produced legible alerts on an oscilloscope on the opposite aspect of the lab.

    The Bell Labs machines have been transmitting clues concerning the interior workings of navy cryptography within the radio waves created by their elements’ electromagnetic cost. A declassified NSA report from from 1972 later described the issue of the company’s categorized computer systems transmitting “radio frequency or acoustic power.” The report added: “These emissions, like tiny radio broadcasts, could radiate by free area for appreciable distances” of a half mile or extra if the sign is performed by close by supplies like energy strains or water pipes.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    The 11 Best Fans to Buy Before It Gets Hot Again (2026)

    April 19, 2026

    Hisense U7SG TV Review (2026): Better Design, Great Value

    April 19, 2026

    Best Meta Glasses (2026): Ray-Ban, Oakley, AR

    April 19, 2026

    How Can Astronauts Tell How Fast They’re Going?

    April 19, 2026

    The ‘Lonely Runner’ Problem Only Appears Simple

    April 19, 2026

    Asus TUF Gaming A14 (2026) Review: GPU-Less Gaming Laptop

    April 19, 2026

    Comments are closed.

    Editors Picks

    KV Cache Is Eating Your VRAM. Here’s How Google Fixed It With TurboQuant.

    April 19, 2026

    OneOdio Focus A1 Pro review

    April 19, 2026

    The 11 Best Fans to Buy Before It Gets Hot Again (2026)

    April 19, 2026

    A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)

    April 19, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Five arrested in Calgary for alleged casino fraud following staff investigation

    December 9, 2025

    OpenAI signs massive AI compute deal with Amazon

    November 4, 2025

    Meet the Pitch Competition finalists of the EU-Startups Summit 2026!

    March 12, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.