Researchers say that small devices called "JitterBugs" could piggyback onto network connections to discreetly send passwords and other sensitive data over the Internet. \n\nLike the current keylogger hardware used by the FBI and criminals alike to record passwords and other data, JitterBugs are small devices that attach to a keyboard and record what users type. Unlike current keyloggers, which store the data to internal memory, JitterBugs do not have to be retrieved before captured data can be read.\n\nAlthough no such device has been found "in the wild" yet, researchers have developed a working prototype, and they postulate that similar ideas may have already been used in unnoticed attacks. \n\nIn a paper titled Keyboards and Covert Channels, University of Pennsylvania grad students explain that the device could encode data in keystrokes by introducing an extra delay between when a key is pressed and when the keyboard tells the computer that the key has been pressed. \n\nIn applications such as telnet and remote desktop, a packet is sent every time a user presses a key. By causing calculated "jitters" in keyboard input while such a program is running, a JitterBug could slightly delay data sent over the network. Certain amounts of delay could represent a one or a zero in each packet that is linked to keyboard use, allowing an attacker to send secret information in otherwise innocuous data without modifying software or initiating any new connections. \n\nAlthough one bit per packet is not a great deal of space, an application like telnet could send enough packets to transmit a password or another small, important piece of data. \n\nTo intercept this data, a spy would need to use a packet sniffer to intercept a connection from the target computer. This would require that the attacker have access to a network somewhere between the victim and the victim's destination - not a trivial goal, but probably easier than attaching the JitterBug in the first place. \n\nEven if the connection is encrypted, data encoded in the delays would likely be visible to an attacker. Although additional delays could ruin the careful pattern introduced by the JitterBug, the device has some level of tolerance for this issue. \n\nResearchers say that in tests, the JitterBug was able to transmit data from the University of Pennsylvania to the National University of Singapore fairly reliably. \n\nResearchers believe that such devices could pose a security threat not only because they are difficult to detect and work across a wide variety of software and hardware but also because they could be inconspicuously deployed on a large scale. \n\nIn what the paper's authors term a "supply chain attack," manufacturers would build a JitterBug into their keyboards. Such a vulnerability would be extremely difficult to detect - neither the keyboard nor the victim's computer would appear to be doing anything unusual - but anyone who knew of the devices could decode the data they sent, getting backdoor access to thousands of computers. \n\nThis threat, however far-fetched, seems particularly relevant in light of the U.S. government's decision in May to use computers built by Lenovo only for processing unclassified data. The Chinese government owns 28% of Lenovo, information that has sparked fears of espionage. As it turns out, numerous keyboards are also manufactured in China. \n\nTo be sure, JitterBugs are a purely theoretical threat as far as anyone can tell, and intercepting the data they send is not a trivial matter. Still, they could be much easier to deploy and read than today's keyloggers - and those have been, and probably still are, used for spying. \n\nRyan DeBeasi, email@example.com.