VnutZ Domain
Copyright © 1996 - 2024 [Matthew Vea] - All Rights Reserved

Featured Article

TEMPEST Attack on LCDs

[index] [9,405 page views]
Tagged As: Hacking and Security

In movies, surveillance is depicted as a few spooks sitting in an unmarked utility van sipping coffee, allegedly peeking into every aspect of a target's life. It sounds far fetched and unbelievable, but TEMPEST attacks represent a real world electronic surveillance technique dating back to the 1950s. Every electronic device emits RF (radio frequency) noise unless properly shielded. TEMPEST is simply the science of using antennas and detectors coupled with advanced reconstruction techniques to determine what those signals represent.

Previously, TEMPEST attacks saw great success against high RF targets like CRT computer monitors. Analysts could piece together the signals from the ray tube coils and remotely reconstruct what appeared on the screen. At the time, LCD monitors were thought to be more troublesome for TEMPEST detection owing to their reduced emissions. Security researcher Markus Kuhn recently shattered that illusion using refined TEMPEST techniques to remotely reconstruct an LCD image by analyzing signals leaking from the video cable. Proper shielding will restore security from such RF exposure. However, in a 2002 IEEE paper, Markus Kuhn demonstrated the reconstruction of a remote display's contents using nothing more than the ambient reflections of light on a wall (PDF).

More site content that might interest you:

What would I do with a billion dollars? Two chicks at the same time.

Try your hand at fate and use the site's continuously updating statistical analysis of the MegaMillions and PowerBall lotteries to choose "smarter" number. Remember, you don't have to win the jackpot to win money from the lottery!

Tired of social media sites mining all your data? Try a private, auto-deleting message bulletin board.

paypal coinbase marcus