-Caveat Lector- <A HREF="http://www.ctrl.org/"> </A> -Cui Bono?- from:alt.conspiracy As, always, Caveat Lector Om K ----- Click Here: <A HREF="aol://5863:126/alt.conspiracy:605920">Listening To Army Computers</A> ----- Subject: Listening To Army Computers From: <A HREF="mailto:[EMAIL PROTECTED]">[EMAIL PROTECTED]</A> Date: Thu, Mar 30, 2000 2:13 AM Message-id: <[EMAIL PROTECTED]> The United States Army is modifying it's computer contracts to include a special security device that automatically disables the integrated microphones that allows a hacker to listen to conversations that usually includes classified material. The United States Army's Small Computer Program, which includes three dozen contracts for laptops, P.C.s and software is recommending that all computer users working with classified material purchase the National Security Agency approved device. The device, which plugs into P.C.s and laptops and disables the microphones without causing any damage to the circuits is known as an Erase Plug. The device can be purchased for around $3 at most stores. The tools to hack into a computer's microphone have been available for 10 years and allows any knowledgable intruder to listen in on anybody, anywhere at data flow rates up to 10 megabits per second and to view compressed images from video cameras. Recently an Army manager demonstrated how easily hackers can hack into a network or individual system and monitor live video cameras and what is being spoken in the vicinity of the computer by the microphone. Reportedly When the January demonstration before the National Security Agency was performed, the National Security Agency was so upset that they will probably modify all contracts to include these and other safeguards. I don't personally see why The National Security Agency was so upset. Surely they were aware of these techniques and had probably in conjunction with their subordinate agency the Central Intelligence Agency used these techniques themselves. It doesn't stand to normal human reasoning that intelligence groups who have been caught hacking into Swiss bank accounts and stealing money from some of the most guarded data systems in the world, wouldn't know how to hack into a computer's microphone and video cameras. In fact I'm sure they were very much aware of the techniques. Using a computer's microphone as a monitoring device isn't new and is a well-known area of intrusion that is known to a lot of people who read these posts. ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, All My Relations. Omnia Bona Bonis, Adieu, Adios, Aloha. Amen. Roads End <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are not allowed. Substance�not soap-boxing! These are sordid matters and 'conspiracy theory'�with its many half-truths, misdirections and outright frauds�is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
