بخش‌هایی از گزارش «تهدیدهای سایبری متأثر از قطعنامه‌ی 2231» منتشر شده در «۲۸ مرداد ۱۳۹۴» پلت شماره ۲: سازوکار پروژه‌ی کوانتوم How the N.S.A. Uses Radio Frequencies to Penetrate Computers The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications. 1. Tiny transceivers are built into USB plugs and inserted into target computers. Small circuit boards may be placed in the computers themselves. 2. The transceivers communicate with a briefcase- size N.S.A. field station, or hidden relay station, up to eight miles away. 3. The field station communicates back to the N.S.A.’s Remote Operations Center. 4. It can also transmit malware, including the kind used in attacks against Iran’s nuclear facilities. منبع: http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html 🌐 https://cysp.ut.ac.ir 🆔 @ut_cyber