Skip to content
Search

Latest Stories

2025 Threat Conference
cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Jumping the Air Gap: How to Breach Isolated Networks

Jumping the Air Gap: How to Breach Isolated Networks

Connectivity continues to enmesh businesses, governments, societies and people – a trend that will only accelerate with the growth of public cloud services and devices linked together in the Internet of Things. But some of the most sensitive sectors are attempting to cordon off their networks from the outside. Highly sensitive information, including that held by military units, intelligence agencies, and companies responsible for transportation, energy, finance and other critical infrastructure elements, is often held within networks disconnected, or “air gapped,” from the global internet. Unlike common hacks that use the internet to reach directly into an organization’s data, a breach into an air-gapped system often requires some level of physical access.

How can hackers jump the air gap and exfiltrate, or extract, data? If an air gap doesn’t truly insulate a highly sensitive network, why use it?

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.
Subscriber+

Related Articles

To Counter China, Reform U.S. Intelligence for the Digital Age

EXPERT PERSPECTIVE / OPINION -- The United States is facing a quiet and rapidly growing threat across the digital landscape, an unseen mathematical [...] More

America's Food Supply Has a Cyber Problem

OPINION — Fine-tuned sensors let farmers know which fields need more water and which crops need more fertilizer. But today, a hacker halfway around [...] More

Hackers are Taking Advantage of Gaps in U.S. Cybersecurity Policy

OPINION — When you press the power button on your computer, it turns on because a specialized code called firmware turns this stimulus into a signal [...] More

A New Year Means Further Transformative Shifts in Cyber

EXPERT PERSPECTIVE — 2023 saw the start of a transformative shift in cybersecurity, bringing both new opportunities and new challenges to the [...] More

DARPA's Focus on 'Manipulated Media' Lays Out Technology for Combatting Disinformation and more

OPINION — “A couple things I haven't talked about that might be worth exploring is, you know, the manipulated media.”That was Dr. Kathleen Fisher, [...] More

We Have a New National Cybersecurity Strategy. Now What?

OPINION — The new National Cybersecurity Strategy is clear and concise, laying out the case for a more robust and engaged approach to defending our [...] More