Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Accel raises $5B to back late-stage bets

    April 16, 2026

    Google rolls out a native Gemini app for Mac

    April 16, 2026

    Uplift Desk Coupon Codes & Discounts: Up to $570 Off

    April 16, 2026
    Facebook Twitter Instagram
    • Tech
    • Gadgets
    • Spotlight
    • Gaming
    Facebook Twitter Instagram
    iGadgets TechiGadgets Tech
    Subscribe
    • Home
    • Gadgets
    • Insights
    • Apps

      Accel raises $5B to back late-stage bets

      April 16, 2026

      Google rolls out a native Gemini app for Mac

      April 16, 2026

      Can AI judge journalism? A Thiel-backed startup says yes, even if it risks chilling whistleblowers

      April 16, 2026

      AI learning app Gizmo levels up with 13M users and a $22M investment

      April 16, 2026

      Feds will require data centers to show their power bills

      April 16, 2026
    • Gear
    • Mobiles
      1. Tech
      2. Gadgets
      3. Insights
      4. View All

      Uplift Desk Coupon Codes & Discounts: Up to $570 Off

      April 16, 2026

      X’s Big Bot Purge Wiped Out a Lot of People’s Secret Porn Feeds

      April 16, 2026

      AI Slop Is Making the Internet Fake-Happy

      April 16, 2026

      'The Last Airbender' Leaked Online. Some Fans Say Paramount Deserves the Fallout

      April 15, 2026

      March Update May Have Weakened The Haptics For Pixel 6 Users

      April 2, 2022

      Project 'Diamond' Is The Galaxy S23, Not A Rollable Smartphone

      April 2, 2022

      The At A Glance Widget Is More Useful After March Update

      April 2, 2022

      Pre-Order The OnePlus 10 Pro For Just $1 In The US

      April 2, 2022

      Motorola Edge+ Review: It Checks A Lot Of Boxes

      April 2, 2022

      This Smartphone Concept Design Is Different… In A Good Way

      April 2, 2022

      Twitter Just Made Searching Your Direct Messages Better

      April 2, 2022

      That Netflix Price Hike Is Starting To Take Place

      April 2, 2022

      Latest Huawei Mobiles P50 and P50 Pro Feature Kirin Chips

      January 15, 2021

      Samsung Galaxy M62 Benchmarked with Galaxy Note10’s Chipset

      January 15, 2021
      9.1

      Review: T-Mobile Winning 5G Race Around the World

      January 15, 2021
      8.9

      Samsung Galaxy S21 Ultra Review: the New King of Android Phones

      January 15, 2021
    • Computing
    iGadgets TechiGadgets Tech
    Home»Tech»How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers
    Tech

    How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

    adminBy adminMarch 4, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Computers leak secrets. Not just through invasive ad tracking, data-stealing malware, and your ill-advised oversharing on social media, but through physics. The movements of a hard drive’s components, keystrokes on a keyboard, even the electric charge in a semiconductor’s wires produce radio waves, sound, and vibrations that transmit in all directions and can—when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals—reveal your private data and activities.

    This category of spying techniques, originally codenamed TEMPEST by the National Security Agency but now encompassed in the more general term “side-channel attacks,” has been a known problem in computer security for close to eight decades, and it’s one that the United States government carefully considers in securing its own classified information. Now a pair of US lawmakers are launching an investigation into how vulnerable the rest of us are to TEMPEST-style surveillance—and whether the US government needs to push device manufacturers to do more to protect Americans.

    On Wednesday, Senator Ron Wyden and Representative Shontel Brown released a letter they sent to the Government Accountability Office (GAO) demanding an investigation into the vulnerability of modern computers to TEMPEST-style side-channel attacks, the monitoring and deciphering of accidental emanations from PCs, phones, and other computing devices to surveil their operations. In the letter, Wyden and Brown write that these forms of spying “do not just pose a counterintelligence threat to the US government, but these methods can also be exploited by adversaries against the American public, including to steal strategically important technologies from US companies.”

    Along with the letter, Wyden and Brown also commissioned a newly released Congressional Research Service report about the history of TEMPEST and the contemporary threat posed by similar side-channel attacks. It describes the US government’s efforts to protect its devices from those spy techniques, including the use of isolated, radio-shielded spaces for securely accessing secret information known as a Sensitive Compartmented Information Facility, or SCIF. Meanwhile, the government has “neither warned the public about this threat, nor imposed requirements on the manufacturers of consumer electronics, such as smartphones, computers and computer accessories, to build technical countermeasures into their products,” Wyden and Brown point out in the letter. “As such, the government has left the American people vulnerable and in the dark.”

    Wyden and Brown’s letter ends by urging GAO to review a list of TEMPEST-related issues: the scale of the modern privacy threat of side-channel attacks, the “cost and feasibility” of implementing protections against them in modern devices, and “potential policy options to mitigate this threat against the public, including mandating device manufacturers add countermeasures to their products,” suggesting that Congress could apply pressure to tech companies to add more defenses to the devices they sell.

    Just how practical side-channel attacks like TEMPEST are against modern computing devices—and how often they’re actually used in the wild by hackers and spies—remains far from clear. But the possibility of such attacks has been taken seriously by the US government since as early as the 1940s, when Bell Labs discovered that machines it sold to the US military for encrypting messages produced legible signals on an oscilloscope on the other side of the lab.

    The Bell Labs machines were transmitting clues about the inner workings of military cryptography in the radio waves created by their components’ electromagnetic charge. A declassified NSA report from from 1972 later described the problem of the agency’s classified computers transmitting “radio frequency or acoustic energy.” The report added: “These emissions, like tiny radio broadcasts, may radiate through free space for considerable distances” of a half mile or more if the signal is conducted through nearby materials like power lines or water pipes.

    Security,Security / Cyberattacks and Hacks,Security / National Security,Security / Security News,Side-Channelingsurveillance,privacy,cybersecurity,encryption,hacking,security#Vulnerable #Computers #80YearOld #Spy #Technique #Congress #Answers1772626733

    80YearOld answers computers congress cybersecurity encryption hacking privacy Security Spy surveillance Technique Vulnerable
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    admin
    • Website
    • Tumblr

    Related Posts

    Uplift Desk Coupon Codes & Discounts: Up to $570 Off

    April 16, 2026

    X’s Big Bot Purge Wiped Out a Lot of People’s Secret Porn Feeds

    April 16, 2026

    AI Slop Is Making the Internet Fake-Happy

    April 16, 2026
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    January 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    January 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    January 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By admin
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By admin
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By admin
    Advertisement
    Demo
    iGadgets Tech
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Tech
    • Gadgets
    • Mobiles
    • Our Authors
    © 2026 ThemeSphere. Designed by WPfastworld.

    Type above and press Enter to search. Press Esc to cancel.