Vindicator Logo

Keystroke-logging device fit for spies, parents alike

Sunday, October 24, 2010

When I first saw this little electronic marvel, I immediately thought it would be something James Bond might use.

Picture this: Bond’s assignment is to find out which websites the bad guy is visiting, what passwords are being used, and anything else that might be typed on the computer’s keyboard.

Bond sneaks into the computer room, but it’s dark and there’s no power. Besides, turning on the computer would make way too much noise, and there’s no time to install some kind of spyware, anyway.

So instead, he takes out a tiny cylindrical plug. He unplugs the keyboard from the computer, plugs it into one end of the little device and then plugs it back into the computer. It only takes a few seconds, and the job is complete. From now on, anything typed on the keyboard will be instantly captured into the device’s memory.

Later, Bond can return, remove the device and access its data by installing it on his own computer later on. Or he can come back and type a simple password to display its contents on the screen.

Yes, the device really does exist, and it’s called the KEYKatcher. I’m pretty sure its maker, Allen Concepts, didn’t intend for it to be used by sophisticated international spies. But if you are one and you’re reading this column, there you go.

The company suggests the KEYKatcher for parents who wish to monitor what their children are doing on their computers, for employers to monitor employee activities, and for suspicious spouses.

The KEYKatcher is different than spyware, which require you to power up the computer and go through an installation process.

As an external hardware device, the KEYKatcher is totally transparent to the operating system and requires none of the system resources typically required by software spyware applications.

According to its manufacturer, there really isn’t any way to detect its presence via the use of anti-spyware software. In fact, the only way to detect it is to physically inspect the computer and look for the device. And since it looks much like any other power connector, it can easily be overlooked. But if you’ve installed it in a nonsurreptitious manner, heat-shrink tubing is provided to create a tamper-evident seal that cannot be removed without your knowledge.

The KEYKatcher uses a microcontroller and nonvolatile memory to capture all the keystrokes. The latter means no power is required to maintain the memory contents of the KEYKatcher. Removing it from the computer does not result in the loss of its contents.

To see the contents, just open any word processor or WordPad document and type in your password. A menu will then appear. As soon as the “View Memory” option has been selected, every word that has been typed will be displayed on the notepad.

All typing is displayed, including chat rooms, e-mail, Web addresses and instant messaging. After the full contents of the memory are displayed, you can save the file to your hard drive as a word-processing document.

The “NETPatrol” option flags words that have to do with online activities, such as “www,” “.com” or “http,” making them easier to spot.

Other options let you search for keywords and change the KEYKatcher’s password.

The KEYKatcher comes in memory capacities of 256k ($49), 64k ($32.99) or 4 megabytes ($99).

For more information, visit www.keykatcher.com.

Craig Crossman is a national newspaper columnist writing about computers and technology. He also hosts the No. 1 daily national computer radio talk show, Computer America, heard on the Business TalkRadio Network and the Lifestyle TalkRadio Network. For more information, visit his website at www.computeramerica.com.

2010, McClatchy-Tribune Information Services

Copyright 2010 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.