It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Bedlam
reply to post by _R4t_
It's a tough go with flat panels. When CRTs were king, there were two or three ways to skin that cat. Not only could you catch emissions off the electron beam, if you had a clear view into an office where a guy was working on a CRT, you could look at the light from the screen bouncing off a light colored surface and reconstruct the image from that.
LCDs have long decay times and they're written in several chunks simultaneously. At the same time, they've gotten a lot better at shielding leaks.
Previously, TEMPEST attacks saw great success against high RF targets like CRT computer monitors. Analysts could piece together the signals from the ray tube coils and remotely reconstruct what appeared on the screen. At the time, LCD monitors were thought to be more troublesome for TEMPEST detection owing to their reduced emissions. Security researcher Markus Kuhn recently shattered that illusion using refined TEMPEST techniques to remotely reconstruct an LCD image by analyzing signals leaking from the video cable. Proper shielding will restore security from such RF exposure. However, in a 2002 IEEE paper, Markus Kuhn demonstrated the reconstruction of a remote display’s contents using nothing more than the ambient reflections of light on a wall (PDF). - See more at: www.omninerd.com...
cuckooold
This topic came up before and I accepted what you had to say. Since then, this has caught my attention, and would be interested in your take on it.
cuckooold
Bedlam
reply to post by _R4t_
It's a tough go with flat panels. When CRTs were king, there were two or three ways to skin that cat. Not only could you catch emissions off the electron beam, if you had a clear view into an office where a guy was working on a CRT, you could look at the light from the screen bouncing off a light colored surface and reconstruct the image from that.
LCDs have long decay times and they're written in several chunks simultaneously. At the same time, they've gotten a lot better at shielding leaks.
This topic came up before and I accepted what you had to say. Since then, this has caught my attention, and would be interested in your take on it.
www.omninerd.com...
Previously, TEMPEST attacks saw great success against high RF targets like CRT computer monitors. Analysts could piece together the signals from the ray tube coils and remotely reconstruct what appeared on the screen. At the time, LCD monitors were thought to be more troublesome for TEMPEST detection owing to their reduced emissions. Security researcher Markus Kuhn recently shattered that illusion using refined TEMPEST techniques to remotely reconstruct an LCD image by analyzing signals leaking from the video cable. Proper shielding will restore security from such RF exposure. However, in a 2002 IEEE paper, Markus Kuhn demonstrated the reconstruction of a remote display’s contents using nothing more than the ambient reflections of light on a wall (PDF). - See more at: www.omninerd.com...
And a little more here.
www.newscientist.com...
AthlonSavage
reply to post by Indigent
I wonder how long it will be before people start flooding NSA with law suits.
1. The easiest is to not use a computer for sensitive information storage, a piece of paper hidden on a part of your body at all times is very secure.
2. An old, simple, purely mechanical type writer is also very difficult to monitor IF you take steps to reduce any acoustic and movement signatures. Be careful, type writers have ribbons which record what you have written, the letters may leave impressions in the rubber paper holder, and the keys may change ever so slightly after typing, so keep it on your person at all times.
2. Use an older computer built before the era of wifi and minuraturized radio components, operate the computer in a well engineered Faraday cage, that is designed to shield frequencies from kHz to GhZ and above.
deloprator20000
I had an inkling that the NSA would try something like this, so here are some simple countermeasures:
1. The easiest is to not use a computer for sensitive information storage, a piece of paper hidden on a part of your body at all times is very secure.
2. An old, simple, purely mechanical type writer is also very difficult to monitor IF you take steps to reduce any acoustic and movement signatures. Be careful, type writers have ribbons which record what you have written, the letters may leave impressions in the rubber paper holder, and the keys may change ever so slightly after typing, so keep it on your person at all times.
2. Use an older computer built before the era of wifi and minuraturized radio components, operate the computer in a well engineered Faraday cage, that is designed to shield frequencies from kHz to GhZ and above.
3. To avoid monitoring via power plug, use an un-interruptuable power supply completely located in the Faraday cage, and insulated from the Faraday cage. It is probably best to build your own un-interruptable power supply using car batteries and homemade inverters using discrete components. A possible problem with a commercial UBS is that they may have extensive secret monitoring capabilities built in, also if you decide to build your own UBS using IC's, chips, or pre-built boards may allow surruptious monitoring, so using discrete components is safer. Now, even modern discrete components may somehow be compromised, so for the truly paranoid, finding older electronic products like radios or TVs built in the 60s or 70s and pulling out the needed discrete components may be an option.
4. Always remove the Hard drive, battery, and memory after turning your laptop off.
5. Use a fully functioning, well calibrated, spectrum analyzer, with a wide range to detect any suspicous RF emissions, or simply to test your Faraday cage. (you may want to borrow a spectrum analyzer, they are very very expensive)
6. Use jamming techniques, white noise signal generated at frequencies of suspected RF emissions and with higher power, outside the Faraday cage is quite effective. Now just in case they use acoustic technques to attempt to monitor your computer, use an acoustic white noise generator at power levels higher than that emitted by your computer outside the F-cage. Same goes if they try to monitor the electrical potential of the F-cage.
7. The secret government also has sensors/signal processing that can recieve E&M waves emitted by your brain, and yes even decipher what you are thinking, even what you are visualizing. I finally found a way to bypass this, the key word is IRON, 3 mm+ thick, make an entire room with IRON walls, AND then generate white noise from 0Hz to 200Hz+ using a series of Helmholtz coils outside your Iron room, one on each side of iron wall cube, at high power levels.
Use to protect your ideas and enhance your privacy, not to physically harm people.edit on 17-1-2014 by deloprator20000 because: (no reason given)
AthlonSavage
reply to post by Indigent
I wonder how long it will be before people start flooding NSA with law suits.
deloprator20000
I had an inkling that the NSA would try something like this, so here are some simple countermeasures:
1. The easiest is to not use a computer for sensitive information storage, a piece of paper hidden on a part of your body at all times is very secure.
2. An old, simple, purely mechanical type writer is also very difficult to monitor IF you take steps to reduce any acoustic and movement signatures. Be careful, type writers have ribbons which record what you have written, the letters may leave impressions in the rubber paper holder, and the keys may change ever so slightly after typing, so keep it on your person at all times.
2. Use an older computer built before the era of wifi and minuraturized radio components, operate the computer in a well engineered Faraday cage, that is designed to shield frequencies from kHz to GhZ and above.
3. To avoid monitoring via power plug, use an un-interruptuable power supply completely located in the Faraday cage, and insulated from the Faraday cage. It is probably best to build your own un-interruptable power supply using car batteries and homemade inverters using discrete components. A possible problem with a commercial UBS is that they may have extensive secret monitoring capabilities built in, also if you decide to build your own UBS using IC's, chips, or pre-built boards may allow surruptious monitoring, so using discrete components is safer. Now, even modern discrete components may somehow be compromised, so for the truly paranoid, finding older electronic products like radios or TVs built in the 60s or 70s and pulling out the needed discrete components may be an option.
4. Always remove the Hard drive, battery, and memory after turning your laptop off.
5. Use a fully functioning, well calibrated, spectrum analyzer, with a wide range to detect any suspicous RF emissions, or simply to test your Faraday cage. (you may want to borrow a spectrum analyzer, they are very very expensive)
6. Use jamming techniques, white noise signal generated at frequencies of suspected RF emissions and with higher power, outside the Faraday cage is quite effective. Now just in case they use acoustic technques to attempt to monitor your computer, use an acoustic white noise generator at power levels higher than that emitted by your computer outside the F-cage. Same goes if they try to monitor the electrical potential of the F-cage.
7. The secret government also has sensors/signal processing that can recieve E&M waves emitted by your brain, and yes even decipher what you are thinking, even what you are visualizing. I finally found a way to bypass this, the key word is IRON, 3 mm+ thick, make an entire room with IRON walls, AND then generate white noise from 0Hz to 200Hz+ using a series of Helmholtz coils outside your Iron room, one on each side of iron wall cube, at high power levels.
Use to protect your ideas and enhance your privacy, not to physically harm people.edit on 17-1-2014 by deloprator20000 because: (no reason given)