On Wednesday, March 12, 2003, at 02:40 PM, Thomas Shaddack wrote:
The closest encounter I had with superconductors was when I was
helping a
friend with some measurements on some uranium-based ceramics. Was both
brief and nice, and I lost fear of liquid nitrogen there.
Rational fear of LN is a good thing, though. Minor splashes aren't bad,
but enough can cause serious burns.
I also worked with uranium in ceramics, though they were not
uranium-based (though sometimes we thought they were!).
Jamming is grossly less efficient than detection. If you want an
explanation, let me know and I'll spend 10 minutes writing a small
piece on it. But first, think deeply about why this is so. Think
especially about recovering signals from noise.
Had my brush, though only theoretical, with integrating repeating
signals
back at school, when I was learning how to interpret NMR spectrums and
how
they work. (Good old times, it feels like yesterday.)
Sorry, hadn't specified I am not talking about RFID tags anymore; was
thinking about at least partially alleviating/sidestepping the problems
with shielding of standard desktop computers.
But will be definitely interested in the minilecture.
Sounds like you already have the gist. There are many good ways to pull
weak signals out of noise, either by direct integration over time or by
chopper techniques (e.g., only looking in narrow time intervals, via
gated integrators and boxcar averagers).
And if the RF ID tag is sending out a signal over a couple of different
frequencies, using some pseudorandom sequence for the
frequency-hopping, then the noise gain can be enormous. That is, an
attacker trying to jam a spread-spectrum (Direct Sequence Spread
Spectrum, DSSS, typically) signal will have to match and greatly exceed
the frequences and times.
Even better, pulse systems which send out ultrawideband signals at
various coded time points (so-called Gold codes, or Kosami codes, for
example) are even more difficult to jam.
You mention that your point was about jamming intercepts from
insufficiently-shielded computers, a la TEMPEST, which, by the way, is
not an acronym (To Ensure More Private Eavesdropping-Safe
Telecommunications--NOT).
This is similar to trying to hide phone bugs by running a background
noise source, like a shower or a television set. But as with those
attempts, a skilled eavesdropper can strip out nonrandom noise
sources like music or television, thus improving S/N ratios. Or the
quasi-random noise of a shower just adds to the baseline of noise
already present. (And multiple detectors can help in various ways, much
the way noise-cancellation headphones work...off the shelf consumer
technology, so imagine what the spooks have.)
More dB of eavesdropping attenuation is gotten by reducing the signal
than by increasing the noise, short of the equivalent of jet engines.
Better to whisper than to speak normally but turn on cover noise
sources elsewhere in a room.
Measuring leakage at a distance of a few centimeters is easy to do. And
if a leakage signal is very, very small at a few centimeters, the usual
inverse-square falloff will make it truly tiny at 100 meters or so.
(Where a van might be parked outside one's flat, for example.)
I'm not saying RF emissions are not an issue. Much was written about
this some years ago, even here on this list, when Van Eyck Radiation
(just the RF) was being studied. Ross Anderson at Cambridge and his
group have been doing lots of work on this.
Truly sensitive communications may be best done on laptops, even
laptops in metal mesh bags. (Either with one's head poked into the bag,
or a bag big enough to enclose the user and laptop, etc.)
There are also heads-up LCD displays now costing less than $600, which
can be used with handheld computers and the like. Besides (likely, but
don't quote me) low emissions from the start, a mesh hood would be very
easy to construct, thus knocking probably another 30 dB off the already
low emissions.
Note that the inverse-square law falloff and the vast number of
communications is probably why the Osama Bin Laden deputy, Sheik
Mohammed, wasn't caught because of RF emissions from his laptop, but
instead because of an informant (as I understand things).
I would strongly bet on quietness of computers winning out over
increased RF detection capabilities. (Needless to say, detection goes
as the square of the antenna size, so even really large antennas don't
have that many dB of extra capture capability, compared to quietness at
the source.)
--Tim May
The only purpose for which power can be rightfully exercised over any
member of a civilized community, against his will, is to prevent harm
to others. His own good, either physical or moral, is not a sufficient
warrant. --John Stuart Mill