[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
No Subject
On Tue, 25 May 93 21:26:20 EDT,
Bill_Stewart <uunet!anchor.ho.att.com!wcs> wrote -
[ ... referring to earlier discussions on TEMPEST, ELINT and
COMINT topics]
> I'm not arguing about whether the stuff works, I believe that :-)
It does, and I can expand further in subsequent paragraphs.
> VT100s and Brother electronic typewriters are two other classic
> emitters; I hadn't heard that the IBM was loud, but it's
> certainly a good target.
He used a very simplistic example, one which is electro-mechanical, as
another list participant already pointed out. The same ELINT
potential eavesdropping techniques exist, which range from keyboard
monitoring (passive and active) to synchronic monitoring of "visual
displays," which by all rights, parallels the electronic equivalent
of monitoring your "visual" data; what is written to your visual
display.
> The wording *is* relevant when you're discussing whether a proposed
> acronym is real or made-up-to-fit, and as I said,
> > I never saw TEMPEST expanded as an acronym in any of the
> > documents I read.
> and the proposed expansions are really stretching credibility,
> as were the quoted article's contentions that using TEMPEST protection
> was illegal.
TEMPEST was/is a specification that was written/developed to
safeguard classified communications which were transmitted
electronically, and rightly so. Digital Cryptanalysis is easy to
record, measure and study; emissions are emissions. Its a well known
fact that INT agencies were/are active in monitoring secure
communications _recording_ for years, simply on the basis that the
keys would be eventually compromised. The technical specifications
of TEMPEST implementations on _SECURE_ systems are classified,
likewise, the tempest requirements on confidential and FOUO (For
Official Use Only) communications are less classified, at least to
the level of their traffic. This was/is done in anticipation of
secure, captured traffic analysis being eventually compromised. I
have reason to believe that this exactly the tactics being mined now
by the FBI/NIST/NSA. (whoops, slap my wrist) Traffic analysis is a
dangerous concept when used in the wrong context, especially in a
big brother capacity.
Additionally (no classified information divulged here!), both the US
INT agencies and the KGB sponsored intelligence agencies, recorded
_all_ intercepted communications regardless of cryptographic
tolerance, eventually under the guise that they would be compromised.
This idealism alluded to the fact that compromised keys could be used
to analyze past communications and provide information on future
strategies.
> *Clipper is a trademark of Intergraph.
Oh, don't be silly. Uncle Sugar has already "officially" re-dubbed
the chip the "Key Escrow" Chip. Silly, isn't it?
Our Government is cheating us. Something needs to be done.
Who's going to do it? Personally, I'm going to take fergp's suggestion
and "question the powers that be." If any of you have a conscious,
I'd suggest doing the same.
To Eric Raymond: Include info on anon remailers and why they are
important. Tell 'em "nobody" sent you. ;-)
Quis Custodiet Ipsos Custodes?