The tempest version of the Z-150 had 100+ screws holding the cover on. 30 years later, I still remember removing them for the dozen or so units that I was sent to Germany to upgrade & prep for use.
Bud Durland Director of Information Technology 1 Plant St. Plattsburgh, NY 12901 Office: 518.561.1812 Direct: 518.324.4850 Cell: 518.726.0967 Weatherchem.com | Moldriteplastics.com | Stulltech.com > -----Original Message----- > From: [email protected] > [mailto:[email protected]] On Behalf Of Kent, Larry J CTR > USARMY 93 SIG BDE (US) > Sent: Friday, January 30, 2015 10:07 AM > To: [email protected] > Subject: RE: [NTSysADM] An Airgap Won t Secure Your Compute r Anymore > (UNCLASSIFIED) > > Classification: UNCLASSIFIED > Caveats: FOUO > > Zenith made Tempest models as well. The Z-150 had a thick metal case that > had about 50 screws that had to be removed just to get the cover off. > > -----Original Message----- > From: [email protected] > [mailto:[email protected]] On Behalf Of Webster > Sent: Friday, January 30, 2015 10:01 AM > To: [email protected] > Subject: RE: [NTSysADM] An Airgap Won t Secure Your Compute r Anymore > > Yeah, that's it. The IBM Tempest PC. > > http://www.amazon.com/Tempest-NACSIM-5100A-Standard- > Computer/dp/B007RWH1YC > > The bank I worked at had ONE of those when they were rolling out one of > the first ATM systems in the state. Even way back in the 70s, the technology > the FBI had for tapping into the communications systems to see what was > going on the wire was very impressive to a 20 year old tech newbie. Heck, > punch cards, punch card readers and COBOL were impressive to me. > > Thanks > > > Webster > > > -----Original Message----- > > From: [email protected] > > [mailto:[email protected]] On Behalf Of Ben Scott > > Sent: Friday, January 30, 2015 8:50 AM > > To: [email protected] > > Subject: Re: [NTSysADM] An Airgap Won t Secure Your Compute r > Anymore > > > > On Fri, Jan 30, 2015 at 9:05 AM, Miller Bonnie L. > > <[email protected]> wrote: > > > Hacked has a piece about Georgia Institute of Technology researchers > > > keylogging from a distance using the electromagnetic radiation of CPUs. > > > > Not really a new threat, although I'm curious if they really mean > > the microprocessor, or just the main system unit. Picking up > > keystroke data from the microprocessor itself is an impressive trick. > > I'd have expected the density of the circuitry to be more of a problem. > > > > FYI, for those who want to Google more, the common name assigned to > > this kind of thing is "TEMPEST", from an old NSA project that > > investigated the phenomenon decades ago. The more technical and > generic term is "EMSEC" > > (Emissions Security), but the TEMPEST name has stuck (prolly because > > it sounds way cooler). Much of it is still classified. > > > > -- Ben > > > > > Classification: UNCLASSIFIED > Caveats: FOUO > NOTE -- This message contains legally privileged and confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. Thank you.

