[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: TEMPEST



At 12:32 PM 1/18/95, Timothy C. May wrote:
> ... And if nothing is seen with our $10K of equipment, what does this
>prove against an attacker who can easily afford to spend 20 or 30
>times that amount to equip a van?
>
>Cypherpunks have been exploiting technology that is comparatively
>_much cheaper_ and which changes the equation.
>
> ... In general, for reasons many of us have written about here before, and in
>particular, because I think spending $10,000 to prove what we already
>know--that RF emissions can be detected and demodulated--is a poor use
>of money. That $10K would go a long way to getting PGP Phone finished. ...

I'm not sure how encryption chages the equation if that van on the street 
can read the data off your screen and/or printer.  Just as cryptanalysis is 
a necessary component of good cryptography, some sort of VanEck analysis 
would seem to be required in order to evaluate the utility of methods to 
block it.

What exactly would one need to do to block Van Eck monitoring?  I've seen 
computer rooms that were completely lined with copper sheathing.  Is it 
really necessary to go to that extent?  Will aluminum foil and power line 
conditioning handle it?  You can't really tell how effective 
counter-measures are unless you have some way to see what reduction in 
emitted signal they provide.

    --Paul J. Ste. Marie
      [email protected], [email protected]