1996-04-26 - Re: trusting the processor chip

Header Data

From: jim bell <jimbell@pacifier.com>
To: “Paul S. Penrod” <furballs@netcom.com>
Message Hash: f4d400b78d96654707136eed1ec772e257f96c6f68742ef27b1dfbc2466d7dbd
Message ID: <m0uCiBa-00094jC@pacifier.com>
Reply To: N/A
UTC Datetime: 1996-04-26 15:23:04 UTC
Raw Date: Fri, 26 Apr 1996 23:23:04 +0800

Raw message

From: jim bell <jimbell@pacifier.com>
Date: Fri, 26 Apr 1996 23:23:04 +0800
To: "Paul S. Penrod" <furballs@netcom.com>
Subject: Re: trusting the processor chip
Message-ID: <m0uCiBa-00094jC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:14 PM 4/25/96 -0700, Paul S. Penrod wrote:
>
>
>On Thu, 25 Apr 1996, jim bell wrote:
>?
>> 
>> This analysis seems to assume that the entire production run of a standard 
>> product is subverted.  More likely,I think, an organization like the NSA 
>> might build a pin-compatible version of an existing, commonly-used product 
>> like a keyboard encoder chip that is designed to transmit (by RFI signals) 
>> the contents of what is typed at the keyboard.  It's simple, it's hard to 
>> detect, and it gets what they want.
>> 
>> Jim Bell
>> jimbell@pacifier.com
>> 
>> 
>
>This is getting more rediculous by the minute. If NSA wanted to find out 
>what you were typing, they dont need to subvert microcode or chips on the 
>board. Unless you have a tempest device - all they have to do is pull RF 
>from your vicinty  and they can *see* just exactly what your typing.

You don't understand the subject, do you?  While it is possible to determine 
a great deal of information  from RF, there is an enormous difference in 
effort between analyzing the output of an uncooperative, inadvertent 
transmitter and a "cooperative" one.  The most commonly understood source of 
RF signals come from CRT's, called Van Eck radiation.  But passwords don't 
generally appear on CRT displays, so that is of limited value.  I don't 
doubt that standard keyboards produce RF that might be analyzed, their 
output is probably not particularly easy to detect against a background of 
processor RFI.  (It's short and low-amplitude)   Far easier to analyze would 
be a chip that loudly and longly transmitted the current typed keyboard 
character, perhaps in some sort of serial binary code, possibly by driving 
the keyboard scanning lines according to a pre-arranged pattern designed to 
emit RF at a particular rate based on the clock oscillator.  This 
transmission would be just about undetectable to anyone who didn't have a 
whole raft of sophisticated detection equipment.  However, to those who know 
what to look for, it would probably be relatively easy to see. 

One particularly important reason for using such a chip, which you entirely 
overlooked, is that many computers are at sites with more than one, and in 
some cases many more than one computer.  Their signals will mix, obviously, 
and will be very hard to separate.  If it is possible to replace a keyboard 
chip with a Trojan Horse, the one desired target will be far more identifiable.



Jim "He only talks about one thing" Bell
jimbell@pacifier.com






Thread