Bitcoin Forum

Alternate cryptocurrencies => Altcoin Discussion => Topic started by: TEMPESTSALE on March 15, 2017, 02:53:41 PM



Title: Tempest Machine
Post by: TEMPESTSALE on March 15, 2017, 02:53:41 PM
All electronic equipment emit (or transmit) some level of radio frequency (RF) noise that can be picked up by any nearby piece of metal that could act like an antenna. While the piece of computer equipment might have a wireless network interface card (NIC), the transmissions in question are not coming through it. ”(Gehling, Ashley, & Griffin 2007)

Emissions Security Problem
https://youtu.be/8gRWlmxom7I (https://youtu.be/8gRWlmxom7I)

Van Eck Phreaking is not new. The capabilities to spy on a computer from a van outside someone's home has been possible since the 80s. Computer monitors typically would emit enough radiation that it would be possible to use Van Eck Phreaking techniques to determine exactly what they were doing on the computer. In 2016 we could expect that technology has advanced significantly since the 1980s and if the trend holds then I would expect attackers to be favored over defenders as is the case in general in the realm of cybersecurity.

References

Vacca, John R. Computer and Information Security Handbook. Amsterdam: Elsevier, 2009. Print.

Tosaka, T., Yamanaka, Y., & Fukunaga, K. (2011). Method for Determining Whether or Not Information is Contained in Electromagnetic Disturbance Radiated From a PC Display. IEEE Transactions On Electromagnetic Compatibility, 53(2), 318-324. doi:10.1109/TEMC.2010.2103562

Ab-Rahman, M., Azizan, L., Hassan, M., & Shuhaimi, N. (2011). Single Source Analytical Study on the Performance of Visible Light Communication. Journal Of Applied Sciences Research, 7(11), 1567-1572.

Goodrich, Michael T., and Roberto Tamassia. Introduction to Computer Security. Boston: Pearson, 2011. Print.

Ntogari, G., Kamalakis, T., Walewski, J., & Sphicopoulos, T. (n.d). Combining Illumination Dimming Based on Pulse-Width Modulation With Visible-Light Communications Based on Discrete Multitone. Journal Of Optical Communications And Networking, 3(1), 56-65.

Vibin, A. M., & Prince, S. (2011). Visible Light Wireless Communication for Audio Signals. AIP Conference Proceedings, 1391(1), 377-379. doi:10.1063/1.3643554

Degardin, V., Laly, P., Lienard, M., & Degauque, P. (2011). Compromising Radiated Emission from a Power Line Communication Cable. Journal Of Communications Software & Systems, 7(1), 16-21.

Gehling, R., Ashley, C., & Griffin, T. (2007). Electronic Emissions Security: Danger in the Air. Information Systems Management, 24(4), 305-310. doi:10.1080/10580530701586011

Wang, R., He, F., Wan, Y., & Qi, Y. (2012). Preparation and characterization of a kind of magnetic carbon fibers used as electromagnetic shielding materials. Journal Of Alloys & Compounds, 51435-39. doi:10.1016/j.jallcom.2011.10.061

Ganguly, S. S., Mukhopadhayay, S. K., & Guha, S. K. (2011). Stress to Human Health Due to Electromagnetic Radiation Emitted from Mobile Phone. International Journal Of Bio-Resource & Stress Management, 2(3), 369-372.

Kocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential Power Analysis." Cryptography.com. Cryptography Research, 1998. Web. 18 Mar. 2012.

Electromagnetic Spectrum - Introduction. (n.d.). Imagine The Universe! Home Page. Retrieved March 18, 2012, from http://imagine.gsfc.nasa.gov/docs/science/know_l1/emspectrum.html

How Printers can breach our privacy: Acoustic Side-Channel attacks on Printers. (n.d.). Information Security and Cryptography Group. Retrieved from http://www.infsec.cs.uni-saarland.de/projects/printer-acoustic/

Oswald, E., & Preneel, B. (n.d.). A Survey on Passive Side-Channel Attacks and their Countermeasures for the NESSIE Public-Key Cryptosystems. COSIC COmputer Security and Industrial Cryptography. Retrieved March 22, 2012, from https://www.cosic.esat.kuleuven.be/nessie/reports/phase2/kulwp5-027-1.pdf

Pasini, S., & Vuagnoux, M. (n.d.). Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux and Sylvain Pasini. LASEC. Retrieved March 23, 2012, from http://lasecwww.epfl.ch/keyboard/

Information Assurance Business Affairs and Research - NSA/CSS. (n.d.). Welcome to the National Security Agency. Retrieved March 25, 2012, from http://www.nsa.gov/applications/ia/tempest/index.cfm