Feeds

Spooks' secret TEMPEST-busting tech reinvented by US student

Young boffin blows gaff on mystery BAE submarine kit

Security for virtualized datacentres

A mysterious secret technology, apparently in use by the British intelligence services in an undisclosed role, has been reinvented by a graduate student in America. Full details of the working principles are now available.

BAE Systems' wireless through-hull comms demo at Farnborough 2010.

Works through glass, too.

Tristan Lawry, doctoral candidate in electrical and computer engineering, has developed equipment which can transmit data at high rates through thick, solid steel or other barriers. Significantly, Lawry's kit also transmits power. One obvious application here would be transmission through the steel pressure hull of a submarine: at the moment such hulls must have hundreds of penetrations for power and data cables, each one adding expense, weight and maintenance burden.

Regular Reg readers will recall that just such kit has previously been developed in the UK labs of arms globocorp BAE Systems: company boffins exhibited it at last year's Farnborough airshow, like Lawry suggesting that it would be of use in submarines. Intriguingly, the BAE inventors also revealed to the Reg that "other parties" within the British government – whom they couldn't name – had asked them to keep secret all details of how their equipment works.

This naturally enough led us to suspect that similar gear had in fact previously been developed in the secret labs of the UK government: the intelligence services are known to have large technical arms which occasionally invent things well before they are discovered elsewhere. The best-known example of this is public-key encryption, secretly developed by British communications spook-boffins years before being independently reinvented in US academia.

Just what the British spooks are doing with the through-metal power'n'comms gear is, of course, a secret. Nonetheless it's no secret at all that these days communications and computer systems can be remotely eavesdropped upon simply by picking up their own internal emissions: a properly-equipped van parked outside a building can snoop into electronics inside even if they make no use of wireless connections. This sort of thing is expensive and very difficult – not something that most organisations have to worry about – but serious spooks can and do carry out such operations.

This has led to the adoption of electromagnetic shielding and many other systems – for instance in accordance with the so-called TEMPEST standards – to protect systems which routinely handle highly sensitive data. Even if intruders manage to get in at some point and plant a receiver or bug inside such a room or building, it still won't be able to transmit what it picks up out through the shielding: and also its battery will run down after a while.

Security for virtualized datacentres

More from The Register

next story
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Thought that last dinosaur was BIG? This one's bloody ENORMOUS
Weighed several adult elephants, contend boffins
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
'Duck face' selfie in SPAAAACE: Rosetta's snap with bird comet
Probe prepares to make first landing on fast-moving rock
Archaeologists and robots on hunt for more Antikythera pieces
How much of the world's oldest computer can they find?
LOHAN invites ENTIRE REG READERSHIP to New Mexico shindig
Well, those of you who back our Kickstarter tin-rattling...
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.