How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers