For more Tempest information, go here.
http://www.eskimo.com/~joelm/tempest.html
It's an extensive site with tons of links to related info.
Mikus
A bit from the main page of the site...
"Breaking News
-skip the news and go to the introduction-
January 14, 2001 - John Young has released a FOIA version of NACSEM 5112,
NONSTOP Evaluation Techniques. This is the first public document to come to
light on NONSTOP surveillance techniques. The document has been heavily
redacted. We do know NONSTOP testing is very similar to TEMPEST testing. In
Side Channel Cryptanalysis of Product Ciphers (Postscript format), John
Kelsey, Bruce Schneier, David Wagner, and Chris Hall speculate that NONSTOP
and HIJACK refer to the compromise of cryptographic devices through nearby
radio transmitters (such as a cell phone, handheld radio, intercom). One of
the more interesting things about the document is toward the end. "It is
further noted that UNCLASSIFIED information concerning NONSTOP should not be
discussed or made available to persons without a need-to-know. No
information related to NONSTOP should be released for public consumption
through the press, advertising, radio-TV or other public media." The
original document came out in 1975, and has gone through several updates."
TEMPEST is a code word that relates to specific standards used to reduce
electromagnetic emanations. In the civilian world, you'll often hear about
TEMPEST devices (a receiver and antenna used to monitor emanations) or
TEMPEST attacks (using an emanation monitor to eavesdrop on someone). While
not quite to government naming specs, the concept is still the same.
>From: "David McNab" <[EMAIL PROTECTED]>
>
>What you're talking about is a technology called 'Tempest', which allows a
>van up to 1000 metres away from a PC to receive and decode radio waves
>emnating from that PC, and to accurately see all keystrokes and screen
>images. Tempest technology is already well-developed.
>
>Also, research is progressing into ways to embed unique 'beacons' into
>software, which causes a unique radio transmission which easily pinpoints
>the PC running a specific piece of software. I have no idea how far this
>'beacon' technology has progressed, or how many (if any) programs already
>have such beacons installed.
>
>Technology (such as RF shielding) exists to suppress such emnations, but
>there seems to be a ban on sale of anti-tempest equipment to non-government
>(and especially non-US) personnel.
>
>I think Aaron's right - there must be a way to counteract these emnations
>via software.
>Hopefully, we'll soon see programs which can jam such emanations with white
>noise, and make tempesting virtually impossible.
>
>David
_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com
_______________________________________________
Chat mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/chat