1985 - Van Eck phreaking is the process of eavesdropping on the contents of a CRT or LCD display by detecting its electromagnetic emissions. It is named after Dutch computer researcher Wim van Eck, who in 1985 published the first paper on it, including proof of concept.[1] Phreaking is the process of exploiting telephone networks, used here because of its connection to eavesdropping.
2009 - A simple experiment showing how to intercept computer keyboard emissions.
It is notable that there is:
• no connection to the Internet;
• no connection to power lines (battery operation);
• no computer screen in use (eliminates the screen emissions possibility);
• and no wireless keyboard or mouse.
Intercepted emissions are solely from the hard-wired keyboard.
The interception antenna is located about one meter away. (This is why we look for antenna wires under desks, and metal parts on desks to which wiring is attached.)
(video 1) (video 2)
The point is, if one can get an antenna withing close proximity of your computer, what you type belongs to them.
December 2012 - Not satisfied with pulling information from your keyboard, injecting information becomes a concern (pay attention investment firms).
"The roughly half-dozen objectives of the Tactical Electromagnetic Cyber Warfare Demonstrator program are classified, but the source said the program is designed to demonstrate ready-made boxes that can perform a variety of tasks, including inserting and extracting data from sealed, wired networks.
Being able to jump the gap provides all kinds of opportunities, since an operator (spy) doesn’t need to compromise the physical security of a facility to reach networks not connected to the Internet. Proximity remains an issue, experts said, but if a vehicle can be brought within range of a network, both insertion and eavesdropping are possible." (more)
2013 is going to be an interesting year. ~Kevin
Friday, 11 January 2013
Van Eck Grown Up - Time to look at eavesdropping on computer emissions again.
Posted on 07:31 by Unknown
Posted in advice, computer, data, eavesdropping, espionage, FutureWatch, government, historical, IT, keystroke, leaks, spybot, TEMPEST, Wireless, wiretapping
|
No comments
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment