My favorite part:<p>"The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers."<p>Oh, so they only need physical access to the machine, and then they can do stuff to it? It's like magic!