-Caveat Lector-   <A HREF="http://www.ctrl.org/">
</A> -Cui Bono?-

from:alt.conspiracy
As, always, Caveat Lector
Om
K
-----
Click Here: <A HREF="aol://5863:126/alt.conspiracy:605920">Listening To Army
Computers</A>
-----
Subject: Listening To Army Computers
From: <A HREF="mailto:[EMAIL PROTECTED]">[EMAIL PROTECTED]</A>
Date: Thu, Mar 30, 2000 2:13 AM
Message-id: <[EMAIL PROTECTED]>

The United States Army is modifying it's computer contracts to
include a special security device that automatically disables the
integrated
microphones that allows a hacker to listen to conversations that
usually includes classified material. The
United
States Army's Small Computer Program, which includes three dozen
contracts for laptops, P.C.s and software is recommending that all
computer users working with classified material purchase the National
Security Agency approved device. The device, which plugs into P.C.s
and laptops and disables the microphones without causing any damage to
the circuits is known as an Erase Plug. The device can be purchased
for around $3 at most stores. The tools to hack into a computer's
microphone have been available for 10 years and allows
any knowledgable intruder to listen in on anybody, anywhere at data
flow rates up to 10 megabits per second and to view compressed images
from video cameras.
Recently an Army manager demonstrated how easily hackers can hack into
a network or individual system and monitor live video cameras and what
is being spoken in the vicinity of the computer by the microphone.
Reportedly
When the January demonstration before the National Security Agency was
performed, the National Security Agency was so upset that they  will
probably modify all contracts to include these and other safeguards.

I don't personally see why The National Security Agency was so upset.
Surely they were aware of these techniques and had probably in
conjunction with their subordinate agency the Central Intelligence
Agency  used these techniques themselves. It doesn't stand to normal
human reasoning that intelligence groups who have been caught hacking
into Swiss bank accounts and stealing money from some of the most
guarded data systems in the world, wouldn't know how to hack into a
computer's microphone and video cameras. In fact I'm sure they were
very much aware of the techniques. Using a  computer's microphone as a
monitoring device isn't new and is a well-known area of intrusion that
is known to a lot of people who read these posts.



-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are not allowed. Substance�not soap-boxing!  These are sordid matters
and 'conspiracy theory'�with its many half-truths, misdirections and outright
frauds�is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to