Like us on Facebook!

Company Blog


By Lumistar's Chief Scientist

June 15, 2015

Thermal Camera Observes Computer Hack Using Heat

Highly secure computer systems, referred to as “air-gapped systems”, are not connected to the internet or connected to other systems connected to the internet so their data can’t be hacked and stolen. These systems are used in military complexes, payment systems, or systems that control critical infrastructure, to name a few examples. But investigators have found a new way to hack into these systems — using heat. Researchers are also using thermal infrared cameras to observe the process (see above video). By having an infected computer that is connected to internet placed near the non-internet connected computer, for example, a laptop that goes home with a worker and returns to the office placing it near the air-gapped classified system, the internet hacker manipulates the laptop’s temperature in a pattern creating 0’s and 1’s communicating to the air-gapped system via it’s thermal sensor that is normally used for its cooling fan. At present time, the rate of information exchanged via heat signals back and forth is slow but information such as password transmission has been demonstrated. Researchers are determining if internet connected air conditioning systems can also communicate with these offline classified computers sometime in the future as this method develops.

Learn More


  1. I really like your writing style, fantastic information, thank you for putting up : D.

    Comment by thermb — June 15, 2014 @ 17:45


  3. This post was definitely worth the time to read and take in. Most times I read a post I just skim over the contents, but not this one. Good job!

    Comment by Classical — June 17, 2015 @ 13:26


  5. What will ‘they’ think up next!

    Comment by John Appleseed — June 18, 2015 @ 15:36


  7. Sometimes I want to use heat on my computer, aka blowtorch, but not to hack.

    Comment by Comment Bro — June 20, 2015 @ 08:52


  9. I hate the fact that cpu’s still run so hot they need a cooling fan and therefore thermal sensor to begin with. Hopefully by the time this tech comes to fruition there won’t be fans in our computers.

    Comment by Drop-Kick BO — June 23, 2015 @ 14:54


  11. As soon as I found this internet site I went on reddit to share some of the love with them.

    Comment by Napa Auto — June 26, 2015 @ 08:33


  13. is genius, i love it

    Comment by Rock Maker — June 28, 2015 @ 14:38


  15. The heat is on, the heat is on on.

    Comment by Mark L. — July 7, 2015 @ 10:34


  17. I’m not sure where you are getting your info, but great topic. I needs to spend some time learning more or understanding more. Thanks for magnificent info I was looking for this info detailed and explained concisely.

    Comment by xguide — July 14, 2015 @ 05:40


  19. Getting hacked with heat is nuts, this is something right out of a sci-fi movie.

    Comment by Hzc — August 13, 2015 @ 15:07


  21. Many people will pour water to cool off computer. Imagine a coolant system that fights off attack and gives false information in loop. Replace with fruit, nuts, trail mix and rice cakes! what?!?!

    Comment by HeatLoss — August 25, 2015 @ 16:56


  23. A good monitoring system is due to be invented.

    Comment by austin texas — September 14, 2015 @ 14:25


  25. Hello I simply love your awesome site thank you and pls keep the ball rolling

    Comment by 226 ers — September 16, 2015 @ 15:17


  27. I take it both computers need to be infected… Which leads to how to employ a stop-gap policy to stop the air-gap from being crapped on.

    Comment by Heater — September 19, 2015 @ 11:50


  29. It’s the best time to install antivirus and malware protection. I’ve read this post and I wish to read more things about it! Maybe you could write next articles referring to this article?

    Comment by 100 Sounds — September 21, 2015 @ 17:35


  31. Ah ha ha ha, some of these comments made me giggle! SPONTOON!

    Comment by Cartier love — September 28, 2015 @ 20:21


  33. Hello! Your computer is hot for my computer. great article.

    Comment by Q7 Funny — October 20, 2015 @ 00:21


  35. – Hey there, I think your website might be having browser compatibility issues. When I look at your blog in Chrome, it looks fine but when opening in Internet Explorer, it has some overlapping. I just wanted to give you a quick heads up! Other than that, great blog!

    Comment by Ojo — October 23, 2015 @ 17:47


  37. Thanks for visiting our blog. What version of Internet Explorer are you using? We are using the latest version IE 11 and don’t see any errors. Your help is appreciated.

    Comment by Lumistar — October 23, 2015 @ 19:43


  39. It is very important that you take time to learn the way each of these work, and exactly how they can be integrated. Another drawback is the way IT developers interact with these Sense programs and get targeted traffic to it. New databases are needed via modern programming languages, for example, Python and Perl.

    Comment by windowNo.9 — November 6, 2015 @ 14:28


  41. Thanks to my father who shared with me regarding this website, this website is actually amazing.

    Comment by WomanIR — November 19, 2015 @ 05:02


  43. hiya, good info.

    Comment by unixstorm — November 20, 2015 @ 13:10


  45. Just get a good antivirus, anti spyware already!!!

    Comment by fad dilemmas — November 25, 2015 @ 17:29


  47. So, everything that you have shared so far is simply merely a drop of water from an ocean. So I recommend keeping up the great work.

    Comment by Dr. Galapalous — November 25, 2015 @ 23:15


  49. I stumbled over here different website and thought I might check things out. I like what I see so I am just following you.
    Look forward to looking at your web page again.

    Comment by Saul — November 26, 2015 @ 20:34


  51. Great and helpful piece of information. I’m glad that you shared this useful info with us.

    Please keep us up to date like this. Thanks for sharing.

    Comment by howdy — November 27, 2015 @ 01:56


  53. Computer malware is like toxins, which are bodily wastes, they need to be periodically flushed out of the system.

    There are tons of programs to use to monitor heuristics of these type of hacks which cannot happen without the infection.

    Comment by Julietta — November 27, 2015 @ 18:54


  55. Heat, Heat, Heat! (ala Marsha, Marsha, Marsha!)

    Comment by RemasterY — November 27, 2015 @ 19:00


  57. Just wait for when they hack your 3D ‘hologram’.

    Comment by Holograms — December 2, 2015 @ 21:31


RSS feed for comments on this post.

Sorry, the comment form is closed at this time.