Re: Claim: Quietness of computers will win out over TEMPEST surveillance

2003-03-13 Thread Bill Frantz
At 3:34 PM -0800 3/12/03, Tim May wrote:
Truly sensitive communications may be best done on laptops, even
laptops in metal mesh bags. (Either with one's head poked into the bag,
or a bag big enough to enclose the user and laptop, etc.)

You probably want to use a fiber optics cable for the link to the outside
of the bag.  Assuming that it is entirely non-conductive (fiber + the
covering), it will not tend to act as an antenna for the RF from your
laptop.

Cheers - Bill


-
Bill Frantz   | Due process for all| Periwinkle -- Consulting
(408)356-8506 | used to be the | 16345 Englewood Ave.
[EMAIL PROTECTED] | American way.  | Los Gatos, CA 95032, USA



Claim: Quietness of computers will win out over TEMPEST surveillance

2003-03-13 Thread Tim May
On Wednesday, March 12, 2003, at 02:40 PM, Thomas Shaddack wrote:
The closest encounter I had with superconductors was when I was 
helping a
friend with some measurements on some uranium-based ceramics. Was both
brief and nice, and I lost fear of liquid nitrogen there.
Rational fear of LN is a good thing, though. Minor splashes aren't bad, 
but enough can cause serious burns.

I also worked with uranium in ceramics, though they were not 
uranium-based (though sometimes we thought they were!).
Jamming is grossly less efficient than detection. If you want an
explanation, let me know and I'll spend 10 minutes writing a small
piece on it. But first, think deeply about why this is so. Think
especially about recovering signals from noise.
Had my brush, though only theoretical, with integrating repeating 
signals
back at school, when I was learning how to interpret NMR spectrums and 
how
they work. (Good old times, it feels like yesterday.)

Sorry, hadn't specified I am not talking about RFID tags anymore; was
thinking about at least partially alleviating/sidestepping the problems
with shielding of standard desktop computers.
But will be definitely interested in the minilecture.
Sounds like you already have the gist. There are many good ways to pull 
weak signals out of noise, either by direct integration over time or by 
chopper techniques (e.g., only looking in narrow time intervals, via 
gated integrators and boxcar averagers).

And if the RF ID tag is sending out a signal over a couple of different 
frequencies, using some pseudorandom sequence for the 
frequency-hopping, then the noise gain can be enormous. That is, an 
attacker trying to jam a spread-spectrum (Direct Sequence Spread 
Spectrum, DSSS, typically) signal will have to match and greatly exceed 
the frequences and times.

Even better, pulse systems which send out ultrawideband signals at 
various coded time points (so-called Gold codes, or Kosami codes, for 
example) are even more difficult to jam.

You mention that your point was about jamming intercepts from 
insufficiently-shielded computers, a la TEMPEST, which, by the way, is 
not an acronym (To Ensure More Private Eavesdropping-Safe 
Telecommunications--NOT).

This is similar to trying to hide phone bugs by running a background 
noise source, like a shower or a television set. But as with those 
attempts, a skilled eavesdropper can strip out nonrandom noise 
sources like music or television, thus improving S/N ratios. Or the 
quasi-random noise of a shower just adds to the baseline of noise 
already present. (And multiple detectors can help in various ways, much 
the way noise-cancellation headphones work...off the shelf consumer 
technology, so imagine what the spooks have.)

More dB of eavesdropping attenuation is gotten by reducing the signal 
than by increasing the noise, short of the equivalent of jet engines. 
Better to whisper than to speak normally but turn on cover noise 
sources elsewhere in a room.

Measuring leakage at a distance of a few centimeters is easy to do. And 
if a leakage signal is very, very small at a few centimeters, the usual 
inverse-square falloff will make it truly tiny at 100 meters or so. 
(Where a van might be parked outside one's flat, for example.)

I'm not saying RF emissions are not an issue. Much was written about 
this some years ago, even here on this list, when Van Eyck Radiation 
(just the RF) was being studied. Ross Anderson at Cambridge and his 
group have been doing lots of work on this.

Truly sensitive communications may be best done on laptops, even 
laptops in metal mesh bags. (Either with one's head poked into the bag, 
or a bag big enough to enclose the user and laptop, etc.)

There are also heads-up LCD displays now costing less than $600, which 
can be used with handheld computers and the like. Besides (likely, but 
don't quote me) low emissions from the start, a mesh hood would be very 
easy to construct, thus knocking probably another 30 dB off the already 
low emissions.

Note that the inverse-square law falloff and the vast number of 
communications is probably why the Osama Bin Laden deputy, Sheik 
Mohammed, wasn't caught because of RF emissions from his laptop, but 
instead because of an informant (as I understand things).

I would strongly bet on quietness of computers winning out over 
increased RF detection capabilities. (Needless to say, detection goes 
as the square of the antenna size, so even really large antennas don't 
have that many dB of extra capture capability, compared to quietness at 
the source.)

--Tim May
The only purpose for which power can be rightfully exercised over any 
member of a civilized community, against his will, is to prevent harm 
to others. His own good, either physical or moral, is not a sufficient 
warrant. --John Stuart Mill



Re: Claim: Quietness of computers will win out over TEMPEST surveillance

2003-03-13 Thread Thomas Shaddack
 Rational fear of LN is a good thing, though. Minor splashes aren't bad,
 but enough can cause serious burns.

You talk about what I call respect. :)

 I also worked with uranium in ceramics, though they were not
 uranium-based (though sometimes we thought they were!).

Black fragile thing looking like fine brick, weakly radioactive. Heavy
fermion superconductor. Memories... :)

 Sounds like you already have the gist. There are many good ways to pull
 weak signals out of noise, either by direct integration over time or by
 chopper techniques (e.g., only looking in narrow time intervals, via
 gated integrators and boxcar averagers).

I briefly seen such jamming generator, they are a real commercial product.
I think it was sensing the computer's emissions, and altering the noise
signal to counteract it. It surely wasn't a simple device.

 And if the RF ID tag is sending out a signal over a couple of
 different frequencies, using some pseudorandom sequence for the
 frequency-hopping, then the noise gain can be enormous. That is, an
 attacker trying to jam a spread-spectrum (Direct Sequence Spread
 Spectrum, DSSS, typically) signal will have to match and greatly
 exceed the frequences and times.

True. How difficult is to detect the PRESENCE of such DSSS signal?

 Even better, pulse systems which send out ultrawideband signals at
 various coded time points (so-called Gold codes, or Kosami codes, for
 example) are even more difficult to jam.

Aren't they an annoying source of noise for everything non-spread-spectrum
around?

 already present. (And multiple detectors can help in various ways, much
 the way noise-cancellation headphones work...off the shelf consumer
 technology, so imagine what the spooks have.)

I think I seen this approach even for receiving of weak TV signals.

 Measuring leakage at a distance of a few centimeters is easy to do.

How? Is there any cheap'n'easy way the interested part of the general
public (thinking about people like on this List, not the Joe Sixpack
cannon-fodder) could use? (Namely, is there some way how the detector
device could be built by someone with not-too-many experiences with high
frequencies?)

 And if a leakage signal is very, very small at a few centimeters, the
 usual inverse-square falloff will make it truly tiny at 100 meters or
 so.  (Where a van might be parked outside one's flat, for example.)

Beware of the signals that spread along the power lines.

 Truly sensitive communications may be best done on laptops, even
 laptops in metal mesh bags. (Either with one's head poked into the bag,
 or a bag big enough to enclose the user and laptop, etc.)

...or a big-enough well-grounded metal cabinet. Could additionally have
the advantage of small, enclosed space that's easier to secure and audit
than a typical room full of junk and books.

Heard LCD screens radiate surprisingly strongly. See at
http://www.eskimo.com/~joelm/tempestmisc.html

 I would strongly bet on quietness of computers winning out over
 increased RF detection capabilities. (Needless to say, detection goes
 as the square of the antenna size, so even really large antennas don't
 have that many dB of extra capture capability, compared to quietness at
 the source.)

RF is bitch. Spare tight all-metal enclosures, properly shielding a
computer system is quite nontrivial. :( A simple RF radiation leakage
detector would be a beneficial thing to have. If possible, it should be
something a slight-above-average sysadmin would be able to handle.

Hope you're right...