NSA hacking

Can the NSA hack into a 2000-2007 desktop PC with no internet wire? I believe this affects all of us, so let's try to be honest here. I own desktop PCs from these dates, and I was wondering if the NSA has any method to access this device if I never connect the blue internet wire. It's not supposed to have WiFi, but do you think such backup-hardware exists?

Attached: nrol-800x604.jpg (800x604, 200K)

Other urls found in this thread:

arxiv.org/abs/1804.04014
theregister.co.uk/2018/07/24/russia_us_energy_grid_hackers/
en.wikipedia.org/wiki/NSA_ANT_catalog
wired.com/2016/06/clever-attack-uses-sound-computers-fan-steal-data/
twitter.com/NSFWRedditImage

Please take your meds

No

Do you have a white CAT5 cable? Just connect that one instead of the blue internet wire.

Attached: yousrs.jpg (120x120, 20K)

No one cares about you, fuck off.

Depends, OP. Exactly how much child porn do you have?

not unless they have equipment less than 10m away from your pc

arxiv.org/abs/1804.04014

OP here. People like you are a disgrace to privacy rights. People like you are knucklehead lemmings who don't care about their own liberty. You should be ashamed of yourself.

install gentoo

No memes, absolutely they can.
is just the tip of the iceberg.

No pedo-user they can't. Don't worry your pizzas are safe.

> internet wire
Sad state of g

OP here. This might sound ridiculous to some of you simple-minded ones, but I think putting copper foil or possibly other conductive metal on the wire entrance can prevent some advanced technology from tele-raping entrance into your computer.

>internet wire

And there it is.

OP here. Congratulations, you know how to google-search, just like the rest of us. Shall we give you a prize?

BTW guys, I honestly think this culture of hostility is supported by enemies of anonymity and its affiliated people.

Jow Forums has always had a culture of hostility, you dumb faggot.

Simple solution (?): add machine that converts electrical energy input to mechanical, and then back into electrical and into the computer.

Why would w-they do that?

Attached: Sharing is caring.png (419x964, 54K)

Huh? I run Freenet on a virtual machine stored on a hidden encrypted drive. That's where I download and keep all my child porn. It's basically impossible to be caught this way. Just wondering if you needed any tips.

Unless you're in a 360° faraday cage with a portable power source, you're pretty much shit outta luck. If they really want you that bad, they're just gonna bust the door down.

Just obfuscate the energy form:
Power Co. > electrical > mechanical > electrical > you.
The energy loss in switching shouldn't be too much.

OP here. Thank you for your help guys. You guys are actually good people who use the web to empower yourselves and others.

Yes, tips are great. This is an important subject and people should embrace these threads.

There are techniques (well documented on the internet) to gather information from an air-gapped system.

In your case, if they need to gather info off that machine, they'll just take the easy way and gain physical access.

>execute a traditional raid and seize the computer
or
>quietly slip a hardware bug in the machine and monitor from afar

They'd only ever do the latter if they need to catch you in the act of something.

OP here. You brought up a good point about monitors. It's just as likely that monitors contain such technology. I should mention i'm taking notes about your guy's comments. I think you guys should take notes too.

All I'll say is that some of us wrote book.

What brand of tin foil do you recommend, OP?

>Can the NSA hack into
Russia broke into air-gap separated control room systems, so why not.
theregister.co.uk/2018/07/24/russia_us_energy_grid_hackers/

OP here. Copper foil works better, my friend.

OP here. Disregard that, I suck cocks!

Could you specify a bit more please, user? I've actually never heard of this before.

Specify on what part?
Seizing computers for evidence is nothing new.

For the spook stuff? That's all be thoroughly covered in the news and stuff.
en.wikipedia.org/wiki/NSA_ANT_catalog

Just modern versions of your standard bug that you'd see in a James Bond movie or something. This is distinctly different from mass surveillance of the entire population, just a spy organization doing spy things.

There are some really old Unix workstations that aren't made by Sun which I won't name directly, as well as old VAX and Alpha hardware that runs OpenVMS. These are very secure and rare enough that glowinthedarks don't know how to get into them. The Unix workstations I mentioned have a special set of software with the word "trusted" in the name that offers disk encryption. Getting these machines will cost hundreds or thousands of dollars. I don't mention the names because I don't want normalfags driving up the prices and making them harder to find than they already are.

Attached: 1481932133473.jpg (808x960, 129K)

Yeah but you can't view CP on them so nobody is going to be interested.

Taking reasonable measures to protect yourself from dragnet surveillance is one thing.
Using your computer via a genset in a copper foil covered room to prevent the CIA from reading your private rugrats fanfic is indicitive of mental issues.

Theyve got a device developed by Raytheon called LIGMA that can bridge any air gapped device

LIGMA?

OP here. I for one think you have just a few mental issues of your own. Have you ever heard of the phrase "mind your own business"? Have you ever wondered why it's so popular and includes the word "business"?

NSA no. Feebee yes. NSA drags.
You will amplify signals doing that, effectively the opposite of your intention.

Ligma MF nuts lmafaoo

The NSA is not going to target you, but the other agencies might be interested if your "business" involves drugs, arms, or CP.
In that case, they would just knock down your door and take whatever evidence they need.

The defensive nature of your post leads me to believe that you're probably doing something very illicit, since you're acting very paranoid and aren't just interested in securing yourself, but afraid of the USG's most advanced spying tools.

Yeah, well the offensive nature of your post leads me to believe you work at burger king and you don't brush your teeth.

>3rd grade tier ad-hominem
A little too close to home pal?

Sounds like you have quite a bit

You're new here
Fuck off

>internet wire
wut

The answer is 'probably no' since the OoB wireless technologies baked into intel chips weren't around yet.

>Can the NSA hack into a 2000-2007 desktop PC with no internet wire?
no. they aren't fucking magicians. they're limited to network attacks, not magic.

completely impractical for an mass surveillance network. are you just pretending to be retarded?

> drugs, arms or cp
and all governments, including the almighty nsa, can't even see all of this going down. when they're able to crack tor traffic and algorithms that would take tens of thousands of years to break (even with the fastest super computers on earth), you let me know. until then, they're still relying on humans making fatal mistakes to catch these fuckers.

>can the NSA enter my device if i never have it plugged in to the internet from a pre-2007 device
Are you fucking retarded? Of course they can't. Install HaikuOS on it or netBSD you retarded boomer fuck

>Yeah but you can't view CP on them so nobody is going to be interested.
Pedos are fucking retarded. They're probably using Chrome on Windows 10 to view that garbage.

>Using your computer via a genset in a copper foil covered room to prevent the CIA from reading your private rugrats fanfic is indicitive of mental issues.
Believe it or not, I'm in possession of text files that are fairly valuable. They aren't crypto currency, I'll say that much. That's why I store them offline on tapes, mechanical disks, and flash drives and I have them sealed in watertight containers. I only view these files on machines that I know I can trust, ones that are old, rare, proprietary, and that have no networking hardware.

Attached: 1528565522726.jpg (763x771, 49K)

> boomer
> lereddit quality meme: confirmed
you need to back

If the NSA is collecting our data we can spam them with a shit ton of useless info making searching, storing and finding useful info even harder and If data collecting is triggered by certain apps and keywords you can also use that to spam them with useless info (ex: search on google if you can masturbate with peanut butter if you are a member of isis at 3:00 am)
And if they stop collecting your data after they realize it's useless that's a win-win

Attached: 1531780315637.jpg (600x800, 79K)

Boomer loser

And you didn't use encryption? Encryption is robust, nigga. The reason there are backdoors in everything is because the encryption works and the backdoors are to get around the encryption by pulling keys out of memory and shit

> Pedos are fucking retarded
> running sites for years, hundreds of thousands of users, never getting caught
please, continue telling us how retarded they are.

>I only view these files on machines that I know I can trust, ones that are old
less retarded than you by the looks of things. TOP FUCKING KEK.

BACK TO LEREDDIT. BYE, REDDITLAMER.

*click* *fshh* *mush* *mush* *mush* *fshh* *click* *click* *click* *mush* *mush* *mush* *mush* *mush* *mush*
>yep, them damn NSA's watchin' my desktop over the internet wire!
*CRACK* *sip*

I do use encryption. Encryption is fucking worthless if you're using backdoored hardware. I used to work for a US DoD contractor so I know what I'm doing. My previous company used the same hardware I'm using now, and the company that made these secure systems hasn't made a new workstation in close to 15 years. They haven't existed for 8 or so.

Daily reminder that the FBI had that Cruz shooter kid on a watch list and didn't do shit about him. The cops that were sent up to the school also pussied out. Law enforcement is a bunch of limp dicked cowards. Outsmarting them isn't much of a challenge.

>ElReg as a source of elite hacker news

There is zero information substantiating the claim of remotely infiltrating an "air-gapped network". Most likely explanation - the control room is "air-gapped" from the outside Internet, but connected to a building network that itself had some connection to the Internet, or some operator with an infected device connected to a control room computer.

>what is EMSEC/TEMPEST

It is very much possible to use the EM emissions of computers/monitors to figure out what's being displayed and what the CPU is doing. It is quite the undertaking, however, so the likelihood of some agency going to all that trouble is very small, when they could just use conventional means.

And yeah, they're not going to catch you with CP if you're smart about it, but most pedos (like I assume OP is) are idiots, who at best know how to use tor and wipe disks. The FBI actually took over a pedo onion site, and IIRC they used an exploit to reveal the true IPs of visitors.
Drugs and arms have human buyers and sellers, and are a physical product. In those cases, the seizing the computer is done to get more evidence. It's just too easy to work your way up or down the trafficking chains.

The best way to avoid suspicion under mass surveillance is to have a totally normal profile, and then go "off grid" (so to speak) when you want to do something anonymously.

OP is trying to hide from targeted law-enforcement surveillance, which means he is either mentally ill, has reason to believe they're after him, or some combination of both.
Pedos often fit the latter description, since they're often mentally unstable, and combining that with having actual illegal activity to hide will bring out some real paranoia.

>The FBI actually took over a pedo onion site, and IIRC they used an exploit to reveal the true IPs of visitors.
And they still only caught 1,000 out of the 200,000+ users the site had.

Speaks to the resiliency of TOR imo.

This sort of niche attack (malware intentionally modulating power consumption to exfiltrate data via power line) is only worth the investment for extremely important targets, and probably isn't feasible for a good number of them.

Air gapped networks and hosts are not common for consumers... It's much easier to utilize a hardware or OS backdoor if you can establish network connectivity to the device.

They'd have to be awfully interested in monitoring an individual without giving away their presence to try something like this instead of just breaking into the place and cloning the disk / setting up other surveillance / beating you a tire iron and threatening to ship you to gitmo unless you provide the encryption keys. Seems more like an attack that would be used against a foreign corporation or nation state.

Hahuahua nice one you got me bro

Just delete system32 and you'll be good to go bro. I did that when I thought the government found out about my proof that the mercur-landings were faked.
It's that easy mate.

How can they read/write data from modulating power lines? Surely the magnetic fields generated by the data transfer in the pc doesn't propogate 10m?

Wow, it actually worked

I guess we have our answer

they dont give a shit who is watching/downloading it, only who creates it (unless they need a press story, its just too much paperwork)

hack4r known as Jow Forums here AMA

How will the weather be here tomorrow? Will it rain or no?

Attached: 1510508780378.jpg (2048x1447, 253K)

$100 says that you are doing things you shouldn't and are paranoid about the consequences. Whatever it is stop doing it

They can.
NSA has tools to broadcast bits to your offline devices via radio towers or satellites.
NSA made sure that as soon as computers will become freely available to masses all of them would have some kind of "communication device"
Back then internet wasn't too popular, so NSA made huge progress in electronics to track whoever they want.

No electronic device is safe from NSA.
Make sure to have big enough Faraday's cage to put all your electronics and another one big enough to fit yourself in. (To prevent NSA picking your brainwaves, if you're person of interest)

Contrary to popular belief, Faraday cages don't actually block out all electromagnetic waves. They interfere with a lot of them, but higher frequency waves might still be unobstructed.

Does tin foil help?

My point for using Faraday's cage is that waves can't escape.
So whatever electrical impulses exist inside they're isolated.
No computer generates cancer waves to escape Faraday's cage.
Plus, spectre of waves blocked by cage depends on how cage is made.
You can block any communication waves with cage.

Meant to quote:

No

Honestly, I hate to say it, but at this point, given how utterly nefarious, malicious and technologically advanced spying agencies have become, there's absolutely no way to have a "net" of any kind (even something as simple as an eletrical grid) without it a "botnet". And of course, with evil corporations like google and microsoft, it's impossible to have internet without it also being a botnet.

The bad news is that even living innawoods won't cut it anymore. It turns out that the human brain is more accessible than we had previously thought possible, not to mention that it's practically impossible to hide nowadays if they really want to find you.

The only escape I see personally is death. Whatever evil they can do here, death is the one place where they will never be able to get me. This is quite comforting for me personally.

>getting offended when he insults pedos
Take a seat right over there

>is that waves can't escape.
It depends, different cage/mesh configurations will perform better with some waves (depending on frequency, distance, etc.) and worse with others. It is actually possible for some cell phones to penetrate cages (especially meshes) from within.

If you really want to protect your files get a PowerPC machine, run linux on an encrypted drive

Yes.
They can infect your current, but they'd most likely use something like . You shouldn't have any other devices nearby.

Underrated.

>depwnds of how cage is made
I obviously addressed that simple cage can't block everything.

wired.com/2016/06/clever-attack-uses-sound-computers-fan-steal-data/

kek

Yes but you're not a worthwhile target. Crossing an airgap actually takes effort.

OP here, I have given up coating my computer with tin foil as it is a difficult and complex process which you feeble minded people would not understand.

Instead I have decided to print out and convert my child pornography to vhs tapes and keep it in a safe.