Yeah, that's it.  The IBM Tempest PC.

http://www.amazon.com/Tempest-NACSIM-5100A-Standard-Computer/dp/B007RWH1YC

The bank I worked at had ONE of those when they were rolling out one of the 
first ATM systems in the state.  Even way back in the 70s, the technology the 
FBI had for tapping into the communications systems to see what was going on 
the wire was very impressive to a 20 year old tech newbie.  Heck, punch cards, 
punch card readers and COBOL were impressive to me.

Thanks


Webster

> -----Original Message-----
> From: [email protected]
> [mailto:[email protected]] On Behalf Of Ben Scott
> Sent: Friday, January 30, 2015 8:50 AM
> To: [email protected]
> Subject: Re: [NTSysADM] An Airgap Won�t Secure Your Compute r Anymore
> 
> On Fri, Jan 30, 2015 at 9:05 AM, Miller Bonnie L.
> <[email protected]> wrote:
> > Hacked has a piece about Georgia Institute of Technology researchers
> > keylogging from a distance using the electromagnetic radiation of CPUs.
> 
>   Not really a new threat, although I'm curious if they really mean the
> microprocessor, or just the main system unit.  Picking up keystroke data from
> the microprocessor itself is an impressive trick.
> I'd have expected the density of the circuitry to be more of a problem.
> 
>   FYI, for those who want to Google more, the common name assigned to this
> kind of thing is "TEMPEST", from an old NSA project that investigated the
> phenomenon decades ago.  The more technical and generic term is "EMSEC"
> (Emissions Security), but the TEMPEST name has stuck (prolly because it
> sounds way cooler).  Much of it is still classified.
> 
> -- Ben
> 

Reply via email to