Whether it's a computer, a smartphone, or any other networked device, connecting to a network means you're already exposed to a security threat. In recent years, in particular, the rapid development of spyware and various kinds of spy tools has led to the increasing efficiency of hacker organizations and intelligence agencies in stealing intelligence.
Now the question is: if the computer, mobile phones are broken network, will also be hacked?
Computer experts with a strong sense of security will have special settings for computers that have confidential files, which will remain offline and unable to connect to the network. The technology that protects data security is called the air-gapping (Air gap System), which is completely isolated and not connected to the Internet or any other Internet device.
This is the most effective way to protect confidential data, such as banking systems, military secrets, payment systems, and so on.
However...... Even so, there is no guarantee that data 100% security! Even if the device is not networked and completely isolated from the outside world, hackers still have the means to steal the data.
Method One: Electromagnetic radiation espionage
General knowledge, any operating equipment (computer, mobile phone ...) All require power consumption, no electricity supply, and equipment does not work properly. However, as long as the equipment in the power consumption will produce electromagnetic radiation, as long as there is radiation can intercept information. The United States and the Soviet Union have confirmed the technology.
Kaspersky Lab explains:
These radiation can be used to remotely record keystrokes, the accuracy rate is quite high.
Method Two: Power consumption review
Now that we've talked about electromagnetic radiation and electricity, let's talk about power review. Security researchers have confirmed that electricity can be used to collect information about electronic products related activities.
Monitor the current and voltage transitions using the load monitoring system, which allows for a better understanding of the consumption of electricity monitoring. Similar systems have been used by power bureaus to fully understand the load and electricity usage in various regions, and to identify specific causes of energy change.
Japan has pioneered the use of non-invasive electrical load monitoring systems (which work through neural networks), designed specifically for residential residents to determine what equipment the residents are using.
In addition, some health care industry security experts have developed a similar monitoring system, through the analysis of the use of electricity, detection equipment was injected with malicious programs.
Method Three: The smartphone accelerometer is used as a keyboard recorder
The Smartphone accelerator (a sensor that tracks the tilt of the phone) can be used as a keyboard recorder. If the phone and the computer are on the same desktop, tapping the keyboard and the accelerometer will generate resonance, thus calculating the input information of the keyboard.
This is a way to steal user keystroke records, but it is generally not used by customers because of their low accuracy.
Method Four: Take the subway? You've been tracked by hackers!
The three researchers at Nanjing University's computer Technology and Technology department said that using the accelerometer data in the smartphone could track the whereabouts of the passengers of the CRC, up to 92% accuracy. This is partly due to the fact that data accessing the Android platform does not require permission or consent.
The results of this study are very threatening, in big cities, Subway is the most popular way to travel, which means that the problem affects a wide range of traffic, in addition, the subway whereabouts can be inferred from the passenger's other private information, such as daily whereabouts, life, work place, and so on, the lawless elements may cause harm to the user's personal safety.
Method Five: The computer keyboard is also a hacker invasion of a portal
According to security researcher Andrea Barisani and Daniele Bianco, voltmeter and laser beams can also be used to sniff computer keystrokes, as detailed in the Black Hat convention at Las Vegas.
When you use a computer keyboard, each tapping of the keyboard produces a voltage signal that the hacker can capture through the voltmeter. The computer keyboard is not shielded line, so these signals will be uploaded to the computer main cable ground. The voltmeter captures the bit stream (bit stream) and voltage fluctuations generated by the keyboard, and then determines the specific key being tapped.
The second method of attack is laser. First need to find a computer table reflective items or computer reflective part of the laser beam, and then use the receiver to record the resonance produced by the keyboard (the process applied the light of the principle of reflection, the knowledge of their own), and then analyze the key situation.
Method VI: Use radio signals and mobile phones to intercept confidential information
In some cases, the keyboard recorder also cannot get the data stored on the computer. The Kaspersky Lab says that even if the device is not networked, some malicious programs can be used to infect the target computer. such as the previous network worm, it has successfully infected some important infrastructure of the computer. Once the target computer is infected with a malicious program, it starts spying and then leaks the confidential data through the physical media.
Israeli security researchers have also developed a new eavesdropping software that can adjust the electromagnetic radio signals emitted by different computer hardware.
Method Seven: The heat emitted by the computer
Computers with confidential documents are often placed in a hermetically sealed room and completely isolated from the external network, and even if the precautions are so good, hackers use these methods to access confidential data.
Researchers at Ben-Gurion University in Israel have developed a way to get data from a computer equipped with an air gap system using only a computer's heat dissipation and a built-in thermal sensor. In this way, the hacker can attack the computer and data transmission network near or already controlled, obtain its password and protect key. In addition, hackers can send malicious commands to other systems that have the same heat and use the same thermal sensor through the transmission network.
The disadvantage of this method is that the process of stealing is slow and cannot transmit data on a large scale.
Method VIII: Access to data through heavy steel barriers
Do you think it's safe to put a computer with confidential data in a completely isolated room and not connect to the network? Won't the data leak? Of course not, because ultrasonic technology can still leak sensitive data.
Video Demo
Dr Tristan Lawry has developed a new spy device that can efficiently transmit data even if it has a thick solid steel barrier. This is a very secretive technology that has been adopted by British intelligence agencies.
Note : More wonderful tutorials Please pay attention to the triple computer tutorial section, triple Computer office group: 189034526 welcome you to join