The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main as well.

[EMAIL PROTECTED] (Tom Schmidt) writes:
> I once heard a former CIA spook say that any POS system can be hacked from 
> a truck parked at the curb, if the price/value is right.  (Speaking from a 
> previous lifetime in marketing research.)  Maybe somebody built a proof-of-
> concept device???  (Think: TEMPEST)  

re:
http://www.garlic.com/~lynn/2007h.html#56 T.J. Maxx data theft worse than first 
reported
http://www.garlic.com/~lynn/2007h.html#58 T.J. Maxx data theft worse than first 
reported

and for more topic drift, latest news , hot of the press today

Laptops And Flat Panels Now Vulnerable to Van Eck Methods
http://hardware.slashdot.org/hardware/07/04/20/2048258.shtml
Seeing through walls
http://www.newscientist.com/blog/technology/2007/04/seeing-through-walls.html

from above:

Back in 1985, Wim Van Eck proved it was possible to tune into the radio
emissions produced by electromagentic coils in a CRT display and then
reconstruct the image. The practice became known as Van Eck Phreaking,
and NATO spent a fortune making its systems invulnerable to it. It was a
major part of Neal Stephenson's novel Cryptonomicon.

... snip ...

so as previously noted, there are several countermeasure to evesdropping
and replay attacks ... 1) make sure the attacker can't get the
information, 2) scramble/encrypt, so the information is unintelligible,
3) change the paradigm (ala x9.59) so the evesdropped/harvested
information is useless for replay attacks.
http://www.garlic.com/~lynn/x959.html#x959

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to