Feeds

Readers' Letters Storm in a TEMPEST?

And why would we want to look at your PC, anyway?

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Can't pay - won't pay

To quote from your page on Only UK viewers have to pay:-

"instead they work by detecting the TV tuner's local oscillator which always leaks a small amount of
radiation back up the aerial."

I have to question this because there's a couple of flaws here. Firstly 99% of tv's sold now conform to CE approval, hence limiting there RF emissions. And secondly, what happens if your using a cable tv /
satellite tuner / etc?? The local oscillator is going to not be passed up the coax to the antenna because of a cascade of RF amplifiers in those devices. I suppose the tv licensing 'authority' will try to kid us that the signal goes through the satellite tuner and out of the dish to the satellite where they can use XY or Z to pinpoint the BBC service thief?!

'The' TV detector van should be renamed "psychological prompting vehicle" because that's the only purpose it serves, ie, The one and only psychological prompting vehicle is seen in the area and people spread the word, and lo and behold, a panic purchase of TV - Taxdiscs!

Anyway that's my 99p's worth, and before you ask, No I dont have a tv license, I pay enough taxes as is.

Jump up and down

This chap works for a Tempest manufacturer - we'd better keep his name out of here - and he writes...

TEMPEST has no meaning. But people like to speculate. You can simulate this yourself, by placing an AM radio next to you computer; then, tune the radio up and down the dial until you hear your computer on it. That's what they intercept and reconstruct.

On the other hand

"TEMPEST stands for "Telecommunications Electronics Material Protected From Emanating Spurious Transmissions". Catchy, no?"

No, it doesn't stand for anything. It is a codeword whose meaning is defined as the unwanted dissemination of information by electromagnetic means.

TEMPEST was defined initially by CESG which is a
branch of GCHQ. It's original meaning was classified but is now public domain.

TEMPEST assessments are carried out on equipment, rooms, buildings etc. both in Government and in private sector.

TEMPEST is *not* some sort of great mystery or magical technique. It is a widely studied area which is now much more controlled by regulations such as Radio frequency Interference laws common to the European Community etc.

The TVLA (technical dept.) are not interested in TEMPEST technology as it is exactly the opposite of what they are trying to achieve. They CAN tell what channel and programme you are watching using "their low tech equipment".

I'm sure I used that last piece of tin foil on the turkey...

You might be interested to note that it is possible to intercept VDU emmanations at 1km for monochrome (Black & White) and more for RGB. Both figures are likely to be greater using sophisticated technical
means.

If you are worried that I am reading your VDU, you might consider 'papering' your walls, floor, ceiling, doors and windows with aluminium baking foil. This will greatly reduce the risk but not enough to be
secure. Remember also, power cables and phone lines etc. leaving your 'baking' room.

Regards. Gatekeeper

"What, us?"

EM emissions from electronic devices have long been a source of worry for organisations carrying or transmitting sensitive information. I imagine that
even the IBM golfball typewriter's keystrokes could be monitored by "listening" devices. Typically, most counter-measures have concentrated in the government/military arena, where the research bases at GCHQ Cheltenham and RSRE Malvern and in the USA, the National Security Agency, have long developed and maintained NATO MilSpec standards for manufacturers to comply with.

When working for several major IT vendors in the 1980s, during a demonstration of intercept techniques, I was informed that it was possible to pick up a screen/PC signature as much as a mile away from source! Various well known systems houses were contracted by Govt to provide quality assurance services and compliance certificates for manufacturers' wishing to sell computer equipments to the (secret) state. This is all public domain
stuff, if you read the relevant magazines. It's conceivable that such counter-measures are now included in manufacturers' production runs as
standard nowadays; otherwise, I imagine electronic intercept of, say, Bank of England information is perfectly possible if they don't use other means
of protecting their electronic environments (safe cages for operators for example).

As for television intercept by the TVLA, the TVLA must be being disingenuous when it says it doesn't know about TEMPEST tested equipment precisely because it's using low-level intercept equipment (to detect unpaid TV licensees using their sets) that TEMPEST is supposed to defeat! ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.