Re: Software license detector vans

New Message Reply About this list Date view Thread view Subject view Author view

Paul H. Merrill (paulmerrill@acm.org)
Wed, 18 Mar 1998 22:30:18 -0800


the initial TEMPEST demo was something like 16 miles and three
transformers. But . . . it was teletype

William H. Geiger III wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> In <v04010c06b135c115e206@[192.187.167.52]>, on 03/18/98
> at 11:28 AM, Dave Del Torto <ddt@LSD.com> said:
>
> >At 07:36 am -0700 3/18/98, William H. Geiger III wrote:
> >> [snip]
> >>I *never* do any sensitive work on a network computer. I have a shielded
> >>box that runs on battery power only (extra bonus points if you know why it
> >>isn't connected to the local power grid). [...]
>
> >Probably because of the recent proof (some of us saw it in operation at
> >HIP'97) of a TEMPEST-type kit (from a German researcher whose name I'm
> >forgetting just now) that reconstitutes screen images from any CRT on the
> >power grid of a given building. Half-credit? ;)
>
> >There's good reason to be concerned about this sort of surveillance, I
> >agree. It's become trivially easy to do it, such that even an operative
> >who's otherwise constitutionally restricted while on duty could hack
> >something together in his/her spare time, just for "fun."
>
> Has anyone done any research on transformers and wether they block 100% of
> any data that may be leaked?
>
> While the risk of data leakage through the local power loop has been known
> for a long time it was commonly assumend that this data could not be
> intercepted once you were past the first transfomer.
>
> After reading about one of the power companies (the name excapes me right
> now) finding a way to do network communications over the power grid I
> started having second thoughts. Does anyone have any references on this?
> Are they using some type of bypass on the transformers or have they found
> a way to pass the data through them?
>
> - --
> - ---------------------------------------------------------------
> William H. Geiger III http://users.invweb.net/~whgiii
> Geiger Consulting Cooking With Warp 4.0
>
> Author of E-Secure - PGP Front End for MR/2 Ice
> PGP & MR/2 the only way for secure e-mail.
> OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html
> - ---------------------------------------------------------------
>
> Tag-O-Matic: OS/2: Windows done RIGHT!
>
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a-sha1
> Charset: cp850
> Comment: Registered_User_E-Secure_v1.1b1_ES000000
>
> iQCVAwUBNRB3+o9Co1n+aLhhAQGQNQP/Ts3goLc9HlJk+xaO/Ye6lM9PMIBbFYhR
> VFtnSFIK++5+zhXk6YEZb3Ck1+Hhq5mhHmW5tNQfQN8NyexCUIDCUEyXlgovbZDe
> gsSq0A//HoVzr/eM3bqXND9kMGf7YoHJWw5sMQuZgKpJSPV/HSkZ2YeACth+8Ssr
> ZgmhkkVMsXQ=
> =tnc+
> -----END PGP SIGNATURE-----


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:16:06 ADT