Van Eck phreaking
Van Eck phreaking, also known as Van Eck radiation, is a form of
Information that drives a CRT
While the phenomenon had been known by the United States Government and Bell Labs as early as the Second World War, the process received its name after Wim van Eck published the first unclassified technical analysis of the security risks of emanations from computer monitors in 1985. While phreaking is the process of exploiting telephone networks, the term is used here because of its connection to eavesdropping.
History
Government researchers were already aware of the danger, as Bell Labs had noted this vulnerability to secure teleprinter communications during World War II and was able to produce 75% of the plaintext being processed in a secure facility from a distance of 80 feet (24 metres).[1] Additionally, the NSA published Tempest Fundamentals, NSA-82-89, NACSIM 5000, National Security Agency (Classified) on February 1, 1982. Also, the van Eck technique was successfully demonstrated to non-TEMPEST personnel in Korea during the Korean War in the 1950s.
In 1985,
In the paper, Van Eck reports that in February 1985, a successful test of this concept was carried out with the cooperation of the
Van Eck phreaking and protecting a CRT display from it was demonstrated on an episode of Tech TV's The Screen Savers on December 18, 2003.[5][6]
Basic principle
Information that drives the
In a CRT, the image is generated by an
Use as communication
In January 2015, the Airhopper project from
Equipment
A tailored access battery is a special laptop battery with Van Eck Phreaking electronics and power-side band encryption cracking electronics built into its casing, in combination with a remote transceiver. This allows for quick installation and removal of a spying device by simply swapping the battery.[10]
Potential risks
Van Eck phreaking might be used to compromise the secrecy of the votes in an election using
Further research
In April 2004, academic research revealed that flat panel and laptop displays are also vulnerable to electromagnetic eavesdropping. The required equipment for espionage was constructed in a university lab for less than US$2000.[14]
See also
- Air gap (networking) – Network security measure
- Near sound data transfer – Sound-based mobile transaction technology developed by Tagattitude since 2005
- RINT
- Tempest (codename) – Espionage using electromagnetic leakage
References
- ^ "A History of U.S. Communications Security (Volumes I and II)"; David G. Boak Lectures" (PDF). National Security Agency. 1973. p. 90.
- ^ Greenberg, Andy (21 June 2020). "Hacker Lexicon: What Is a Side Channel Attack?". Wired.
- ^ .
- ^ Carter, Claire (27 September 2013). "Myth of the TV detector van?". The Daily Telegraph. Retrieved 27 September 2015.
- ^ Van Eck Phreaking
- ^ The Screen Savers: Dark Tip – Van Eck Phreaking
- ^ Air-gapped computers are no longer secure, TechRepublic, January 26, 2015
- ^ Original Whitepaper
- ^ Airhopper demonstration video, Ben Gurion University
- ^ White paper, FDES institute, 1996, page 12.
- ^ Dutch government scraps plans to use voting computers in 35 cities including Amsterdam (Herald tribune, 30. October 2006)
- ^ Use of SDU voting computers banned during Dutch general elections Archived 2008-09-23 at the Wayback Machine (Heise, October 31. 2006)
- ^ "Brazilian Breaks Secrecy of Brazil's E-Voting Machines With Van Eck Phreaking". Slashdot. November 21, 2009.
- ^ Kuhn, M.G. (2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies: 23–25.
- ISSN 1476-2986. UCAM-CL-TR-577. Retrieved 2010-10-29.
External links
- Van Eck phreaking Demonstration
- Tempest for Eliza is a program that uses a computer monitor to send out AM radio signals, making it possible to hear computer-generated music in a radio.
- Video eavesdropping demo at CeBIT 2006 by a Cambridge University security researcher
- eckbox – unsuccessful or abandoned attempt in spring 2004 to build an open-source Van Eck phreaking implementation
- Sniffing wireless keyboard link
- system-bus-radio – an implementation of Van Eck phreaking using certain processor instructions on a general purpose computer