Re: How old is TEMPEST? (was Re: New Encryption Regulations have other gotchas)

2000-01-24 Thread P.J. Ponder


By 1970-71 the US Air Force was testing its own facilities for emanations,
and as a low grade enlisted person with a Top Secret/Crypto clearance, I
was allowed to see the results of a test conducted against a facility
where I worked.  The site used KY-8's and KY-28's, and we thought we were
very secure.  The people in the Tempest van read us like a book, having
picked up signals on the way to KY's.

I got the impression Tempest was fairly well institutionalized by then, at
least in the USAF, and that some of the old hands had seen this before. 
I can't recall whether the term 'Tempest' itself was an acronym, although
most sources now say it was not (e.g., online computer dictionary) but
these sources could be wrong.


On Mon, 24 Jan 2000, Arnold G. Reinhold wrote:

> Regarding the question of how far back TEMPEST goes, I took a look at 
> David Kahn's "The Codebreakers" which was copyrighted in 1967. 
> TEMPEST is not listed in the index. However I did find the following 
> paragraph in a portion of the chapter on N.S.A. that discusses 
> efforts to improve the US State Department's communications security 
> (p. 714):
> 
> "... the department budgeted $221,400 in 1964 for 650 KW-7's. ... The 
> per-item cost of $4,500 may be due in part to refinements to prevent 
> inductive or galvanic interaction between the key pulses and the 
> plaintext pulses, which wire tappers could detect in the line pulse 
> and use to break the unbreakable system through its back door. "
> 
> This would be the electro-mechanical equivalent of TEMPEST and 
> suggests that NSA was well aware of the compromising potential of 
> incidental emanations long before the computer communications era.
> 
> Another useful data point would be earliest reports about the BBC's 
> system for detecting unlicensed television receivers. That system 
> used vans equipped to detect a TV's local oscillator, but may well be 
> an offshoot of emanations intelligence research.
> 
> Arnold Reinhold
> 
> 




Re: New Encryption Regulations have other gotchas

2000-01-23 Thread Antonomasia

[EMAIL PROTECTED] (Peter Gutmann):

> I was reading an early-80's paper on OS security and it mentioned
> some work from the 1950's on this.  I've heard comments about knowledge
> of Tempest issues during this time from various people, but this is
> the earliest reference I've found in a published article.  If I can
> re-locate the source I'll post a reference to it.

  Edited by Lance J Hoffman of UCB
  Security and Privacy in Computer Systems
  Wiley 1973
  ISBN 0471 40611 2

This book covers publicly-available crypto of the period (looks very weak now)
and "rings" by Robert Graham and civil liberties threats involving data
storage and aggregation.

Page 77
Passive infiltraton may be accomplished by wiretapping or by electomagnetic
pickup of the traffic at any point in the system.  Although considerable
effort has been applied to counter such threats to defense communications,
nongovernmental approaches to information privacy usually assume that
communication lines are secure, when in fact they are one of the most
vulnerable parts of the system.

Page 84
In addition to the spectrum of threats arising from wiretapping, electro-
magnetic radiation from terminals myst be considered.[12]  Electromagnetic
radiation characteristics will depend heavily on the type of terminal,
and may in some cases pose serious shielding and electrical-filtering
problems.  More advanced terminals using cathode ray tube for information
display may create even greater problems in trying to prevent what has been
called "tuning in the terminal on Channel 4."

12. R.L. Dennis, Security in computer environment, SP2440/000/01,
System Development Corporation, August 18, 1966


Another chapter has (starting on page 101) a section called "THE PARADOX OF
THE SECRECY ABOUT SECRECY" where it says:
It should be noted that this Memorandum has been purposely written to be
unclassified ... the only background information used is that found in the
unclassified literature ...

So can anyone say whether there are interesting things in that ref 12 ?


--
##
# Antonomasia   [EMAIL PROTECTED]  #
# See http://www.notatla.demon.co.uk/#
##



Re: New Encryption Regulations have other gotchas

2000-01-22 Thread Peter Gutmann

John Young <[EMAIL PROTECTED]> writes:

>Phil Karn wrote:
>
>>I believe the anti-Tempest provisions have been in the export regs
>>for some time.
>
>Yes, but when did they appear? We're attempting to trace Tempest's origin --
>not easy because of classification of so much stuff. One classified standard
>dates to 1967.

I was reading an early-80's paper on OS security and it mentioned some work
from the 1950's on this.  I've heard comments about knowledge of Tempest issues
during this time from various people, but this is the earliest reference I've
found in a published article.  If I can re-locate the source I'll post a
reference to it.

Peter.




Re: New Encryption Regulations have other gotchas

2000-01-15 Thread John Young

Phil Karn wrote:

>I believe the anti-Tempest provisions have been in the export regs
>for some time.

Yes, but when did they appear? We're attempting to trace
Tempest's origin -- not easy because of classification of
so much stuff. One classified standard dates to 1967. A
French article on Tempest in December 99 states:

"The initiators of this technique is the Bulgarian secret service
(formed by the KGB) which placed modified vans around 
embassies or important companies."

No date for the initiation. Is the claim accurate?

We've read hints that some of the earliest research concerned
naval vessels whose  metal structure was discovered to be 
acting as unintentional antennas. Then, later, planes, other 
equipment  and architectural/engineering elements of buildings.

We would appreciate information on the history of Tempest.
Not asking for classified/NDA info just dates, say, or what kind of
discoveries led to the technology. And when it went into the
export control regs.

Who knows what emanates compromising information these 
days as the sensitivity of instruments and capabilities of
EM interception and analysis increases.

Thank you very much.






Re: New Encryption Regulations have other gotchas

2000-01-14 Thread David Lesher

{I take no blam^H^Hcredit for spotting this; I just relay it}

 > "a.4. Specially designed or modified to reduce the compromising
 > emanations of information-bearing signals beyond what is necessary
 > for the health, safety or electromagnetic interference standards;"

This seems aimed at "Soft Tempest" work of recent years

And as a noted backhoe tracker mentioned:

|That may be what it is aimed at, however it is important to remember
|standards tend to be by their nature lowest common denominator.  The
|BXA regs appear to create an official government policy you can not
|improve health or safety beyond that required to meet the minimum
|standards.  At the absurd, these regulations appear to prohibit
|the use of surge suppressors, UPSs or isolation transformers.
|
|I knew Radio Shack sold many legally suspect items, but have we
|reached the point of "Freeze, put down that surge supressor or we'll
|shoot!"


-- 
A host is a host from coast to [EMAIL PROTECTED]
& no one will talk to a host that's close[v].(301) 56-LINUX
Unless the host (that isn't close).pob 1433
is busy, hung or dead20915-1433