Over the last couple of years several clients have asked about our recommendation of replacing wireless computer keyboards with wired keyboards. This article explores a recent article from a hacker website on Keystroke Intercept.
This article will provide additional justification for my long-standing recommendation to replace wireless keyboards with hardwired units. Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a computer keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
The below website link is an in-depth explanation and workings of a Keystroke Sniffer. This device covertly installed within a wall charger records the keystrokes from a nearby wireless keyboard. This is just one example of a covert package; the electronics could be housed in any small package. The manufactures label on the keyboard underside of this Microsoft keyboard lists the operational frequency of the transmitted keystroke signal. This Keystroke Sniffer stores that transmitted signal and can be retrieved at a later date by the eavesdropper. The described housing is plugged into an electrical outlet for power and can also use an internal battery. The Sniffer can transmit the stored keystroke information to the suspect rather than retrieving the unit from the wall. Wireless keyboards are not allowed in government facilities or most high profile companies. Are any of these within your workplace?