In the 1970s, the Soviets managed to intercept top secret communications in the US embassy in Moscow and nobody could figure out how. While an antenna was eventually found hidden in the embassy's chimney, it took years to determine how what data was being collected for transmission and how. As a last resort, all equipment at the embassy was shipped back to the US for analysis. From IEEE Spectrum:
After tens of thousands of fruitless X-rays, a technician noticed a small coil of wire inside the on/off switch of an IBM Selectric typewriter. (NSA engineer Charles) Gandy believed that this coil was acting as a step-down transformer to supply lower-voltage power to something within the typewriter. Eventually he uncovered a series of modifications that had been concealed so expertly that they had previously defied detection.
A solid aluminum bar, part of the structural support of the typewriter, had been replaced with one that looked identical but was hollow. Inside the cavity was a circuit board and six magnetometers. The magnetometers sensed movements of tiny magnets that had been embedded in the transposers that moved the typing “golf ball” into position for striking a given letter.
Other components of the typewriters, such as springs and screws, had been repurposed to deliver power to the hidden circuits and to act as antennas. Keystroke information was stored and sent in encrypted burst transmissions that hopped across multiple frequencies.
For more on this fascinating story, check out former intelligence officer and technologist Eric Haseltine's new book: "The Spy in Moscow Station"
image: IBM Selectric by Oliver Kurmis (CC BY 2.5)
View this post on Instagram sorry for posting my face twice in a row but here’s an old one that seems relevant rn 💅 A post shared by Aiden :) (@aidenarata) on Mar 24, 2020 at 4:49pm PDT Image via EFF / Flickr (CC 2.0)
The Cyber Independent Testing Lab is a security measurement company founded by Mudge Zadko (previously), late of the Cult of the Dead Cow and l0pht Heavy Industries and the NSA's Tailored Access Operations Group; it has a unique method for assessing the security of devices derived from methods developed by Mudge at the NSA.
Well, pretty much everyone saw this lawsuit coming.
Building blocks are among a child’s first, and arguably, most important, toys. Once they start stacking one tentatively on top of another, the blocks not only spark waves of creativity, but actual real-world understanding of scientific principles like engineering and physics. It wouldn’t even be a stretch to call blocks on of the first true […]
Time management and self-motivation, the ability to stay on task and achieve in the office or when you’re working with home, is the true test of any person’s professional mettle. While that’s easier said than done, those skills can be taught and developed as you’ll find in The 2020 Work From Anywhere Hacker Bundle. The […]
It’s easy to be instantly dismissive about most Bluetooth speakers, especially small travel-sized units. Over the past few years, makers of every shape, size, and variety have started pounding out Bluetooth speakers, many barely able to sound much better than your smartphone speaker, let alone provide the bass and volume heft of legitimate portable speakers […]