Techniques which are used for tapping, voyeur, hacks for the purpose of information leakage
keyboard
Hardware techniques (possible remote): TEMPEST (electromagnetic detoxification)
Hardware techniques (direct connection): Hardware keyloggers
Software techniques: Keyloggers
Monitor (screen)
Hardware techniques (possible remote): TEMPEST (electromagnetic detoxification)
Hardware techniques (direct connection) hardware-based monitor screen recorder
Software technique: malicious programs that screen recording function (zombie PC file server, etc.)
Wiretapping
Shoot a laser at the target window in the room sounds
The vibration of the returning laser
Thereby restoring the sound by amplifying processes such as processing (can remotely)
Hidden things Recorder
Voyeur
Fake wall (in either direction as fluoroscopy, mirror or wall in the other direction)
Hidden camera stuff (camera, glasses, etc.)
TEMPEST Related Articles
[United States] new hack for emergency detoxification Electromagnetic
Source: Korea Times Number: 115
Published: 2000/10/05 (Wed) PM 02:34:35 Views: 377
[United States] new hack for emergency detoxification Electromagnetic
When I think of as a computer information leakage 'classical method' that hacking or stealing your computer's hard drive via the Internet, including online is common to the whole.
But there is a simple and efficient method than computer information spies.
That is to decipher the electromagnetic waves emitted from a working computer monitor.
Washington Post seven days the US Department of Defense and intelligence agencies, foreign embassies have reported that running the security operation for fear of information leakage through electromagnetic computer monitor 'system Feast (TEMPEST) program.
The system Feast is an abbreviation for "standard instantaneous electromagnetic waves (Transient Electromagnetic Pulse Standard) '.
The principle of espionage technique using electromagnetic waves is similar to the monitor audio eavesdropping.
After amplification to detect the electromagnetic antenna technique is that it plays back on another monitor.
According to experts of the electromagnetic wave propagation and TV monitor are similar to the properties only high quality antenna and amplifier can be gatchumyeon ㎙ hundreds of spies in the street.
US intelligence agencies and the military has bought a specially designed security device from the company by the system has been Feast program against information leakage through a computer monitor since the 1980s.
Principles or components of security devices Though not as accurate confidential information known to the public in a variety of formats to alarms from electromagnetic barrier.
Codex Data Systems has been delivered to the Department of Defense scanners to check for possible electromagnetic signals radiating from the computer monitor to detect whether the $ 20,000 per unit.
$ 30,000 buy-old made using the BEMA copper and nickel Virginia movement being fed a special tent.
In addition, the workshop also used for PC or cover all sides of the surface treatment with electromagnetic wave shielding material.
The US government has signed a contract and control the distribution of these and strict security measures do not ever delivered to private or foreign institutions without the permission of the company.
Security is security, but these devices are due to the station to see a little hand can be transformed into spies, high-performance equipment.
Frank Jones, president of the Codex Data Systems "can also be converted to basically defensive unit, but" aggressive "purposes," he said.
Because of this, we gotta international spies are known to have this frantic, high-performance equipment available.
Federal Bureau of Investigation (FBI) has arrested an Israeli bar trying to advance to the Vietnamese government in July last year, posing a remote device to monitor surveillance video receiving device.
Security equipment manufacturers officials reportedly suffering from incessant requests from foreign sales agency or corporate security officials.