Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
Galaxy S26 vs. Pixel 10 vs. OnePlus 15: Which Android flagship actually deserves your money?

Galaxy S26 vs. Pixel 10 vs. OnePlus 15: Which Android flagship actually deserves your money?

5 March 2026
This 5.1 Soundbar Bundle Is 0 Off

This 5.1 Soundbar Bundle Is $100 Off

5 March 2026
OpenAI releases ChatGPT 5.3 Instant and says it’s less “cringe”

OpenAI releases ChatGPT 5.3 Instant and says it’s less “cringe”

5 March 2026
Facebook X (Twitter) Instagram
Just In
  • Galaxy S26 vs. Pixel 10 vs. OnePlus 15: Which Android flagship actually deserves your money?
  • This 5.1 Soundbar Bundle Is $100 Off
  • OpenAI releases ChatGPT 5.3 Instant and says it’s less “cringe”
  • How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers
  • The MacBook Neo may be Apple’s cleverest bait to catch them young
  • What AI Models for War Actually Look Like
  • Ubisoft Gives Updates On Assassin’s Creed Franchise, Including Hexe And Invictus, Alongside Black Flag Remake Tease
  • This smart device stops sneaky AI gadgets from listening to your conversations
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers
News

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

News RoomBy News Room5 March 20264 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers
Share
Facebook Twitter LinkedIn Pinterest Email

Computers leak secrets. Not just through invasive ad tracking, data-stealing malware, and your ill-advised oversharing on social media, but through physics. The movements of a hard drive’s components, keystrokes on a keyboard, even the electric charge in a semiconductor’s wires produce radio waves, sound, and vibrations that transmit in all directions and can—when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals—reveal your private data and activities.

This category of spying techniques, originally codenamed TEMPEST by the National Security Agency but now encompassed in the more general term “side-channel attacks,” has been a known problem in computer security for close to eight decades, and it’s one that the United States government carefully considers in securing its own classified information. Now a pair of US lawmakers are launching an investigation into how vulnerable the rest of us are to TEMPEST-style surveillance—and whether the US government needs to push device manufacturers to do more to protect Americans.

On Wednesday, Senator Ron Wyden and Representative Shontel Brown released a letter they sent to the Government Accountability Office (GAO) demanding an investigation into the vulnerability of modern computers to TEMPEST-style side-channel attacks, the monitoring and deciphering of accidental emanations from PCs, phones, and other computing devices to surveil their operations. In the letter, Wyden and Brown write that these forms of spying “do not just pose a counterintelligence threat to the US government, but these methods can also be exploited by adversaries against the American public, including to steal strategically important technologies from US companies.”

Along with the letter, Wyden and Brown also commissioned a newly released Congressional Research Service report about the history of TEMPEST and the contemporary threat posed by similar side-channel attacks. It describes the US government’s efforts to protect its devices from those spy techniques, including the use of isolated, radio-shielded spaces for securely accessing secret information known as a Sensitive Compartmented Information Facility, or SCIF. Meanwhile, the government has “neither warned the public about this threat, nor imposed requirements on the manufacturers of consumer electronics, such as smartphones, computers and computer accessories, to build technical countermeasures into their products,” Wyden and Brown point out in the letter. “As such, the government has left the American people vulnerable and in the dark.”

Wyden and Brown’s letter ends by urging GAO to review a list of TEMPEST-related issues: the scale of the modern privacy threat of side-channel attacks, the “cost and feasibility” of implementing protections against them in modern devices, and “potential policy options to mitigate this threat against the public, including mandating device manufacturers add countermeasures to their products,” suggesting that Congress could apply pressure to tech companies to add more defenses to the devices they sell.

Just how practical side-channel attacks like TEMPEST are against modern computing devices—and how often they’re actually used in the wild by hackers and spies—remains far from clear. But the possibility of such attacks has been taken seriously by the US government since as early as the 1940s, when Bell Labs discovered that machines it sold to the US military for encrypting messages produced legible signals on an oscilloscope on the other side of the lab.

The Bell Labs machines were transmitting clues about the inner workings of military cryptography in the radio waves created by their components’ electromagnetic charge. A declassified NSA report from from 1972 later described the problem of the agency’s classified computers transmitting “radio frequency or acoustic energy.” The report added: “These emissions, like tiny radio broadcasts, may radiate through free space for considerable distances” of a half mile or more if the signal is conducted through nearby materials like power lines or water pipes.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe MacBook Neo may be Apple’s cleverest bait to catch them young
Next Article OpenAI releases ChatGPT 5.3 Instant and says it’s less “cringe”

Related Articles

Galaxy S26 vs. Pixel 10 vs. OnePlus 15: Which Android flagship actually deserves your money?
News

Galaxy S26 vs. Pixel 10 vs. OnePlus 15: Which Android flagship actually deserves your money?

5 March 2026
This 5.1 Soundbar Bundle Is 0 Off
News

This 5.1 Soundbar Bundle Is $100 Off

5 March 2026
OpenAI releases ChatGPT 5.3 Instant and says it’s less “cringe”
News

OpenAI releases ChatGPT 5.3 Instant and says it’s less “cringe”

5 March 2026
The MacBook Neo may be Apple’s cleverest bait to catch them young
News

The MacBook Neo may be Apple’s cleverest bait to catch them young

5 March 2026
What AI Models for War Actually Look Like
News

What AI Models for War Actually Look Like

5 March 2026
This smart device stops sneaky AI gadgets from listening to your conversations
News

This smart device stops sneaky AI gadgets from listening to your conversations

5 March 2026
Demo
Top Articles
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024111 Views
Costco partners with Electric Era to bring back EV charging in the U.S.

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202499 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
What AI Models for War Actually Look Like News

What AI Models for War Actually Look Like

News Room5 March 2026
Ubisoft Gives Updates On Assassin’s Creed Franchise, Including Hexe And Invictus, Alongside Black Flag Remake Tease Gaming

Ubisoft Gives Updates On Assassin’s Creed Franchise, Including Hexe And Invictus, Alongside Black Flag Remake Tease

News Room5 March 2026
This smart device stops sneaky AI gadgets from listening to your conversations News

This smart device stops sneaky AI gadgets from listening to your conversations

News Room5 March 2026
Most Popular
The Spectacular Burnout of a Solar Panel Salesman

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025137 Views
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024111 Views
Our Picks
How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

5 March 2026
The MacBook Neo may be Apple’s cleverest bait to catch them young

The MacBook Neo may be Apple’s cleverest bait to catch them young

5 March 2026
What AI Models for War Actually Look Like

What AI Models for War Actually Look Like

5 March 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2026 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.