1998-09-09 - RE: question…

Header Data

From: “Harvey Rook (Exchange)” <hrook@exchange.microsoft.com>
To: “‘Bernardo B. Terrado’” <cypherpunks@toad.com
Message Hash: 18f74acd914313ad1515fdb80f1e5daefb159f649ada0d312858831e41affacb
Message ID: <2FBF98FC7852CF11912A0000000000010D19AC9D@DINO>
Reply To: N/A
UTC Datetime: 1998-09-09 07:53:11 UTC
Raw Date: Wed, 9 Sep 1998 15:53:11 +0800

Raw message

From: "Harvey Rook (Exchange)" <hrook@exchange.microsoft.com>
Date: Wed, 9 Sep 1998 15:53:11 +0800
To: "'Bernardo B. Terrado'" <cypherpunks@toad.com
Subject: RE: question...
Message-ID: <2FBF98FC7852CF11912A0000000000010D19AC9D@DINO>
MIME-Version: 1.0
Content-Type: text/plain



Hi Bernardo;

TEMPEST isn't a cipher, but a technique. 

Essentially, your monitor is a great big RF emitter. As it's electron gun
turns off and on to make the phosphor screen glow, it's emitting all kinds
of radio frequencies that betray the image on the screen. A tempest attack
is a receiver that can tune to a monitor, and reconstruct the image from the
RF the monitor is emitting. Supposedly such equipment costs about $500.00 

Harvey "Know it All" Rook.

> -----Original Message-----
> From: Bernardo B. Terrado [mailto:bbt@mudspring.uplb.edu.ph]
> Sent: Tuesday, September 08, 1998 11:03 PM
> To: cypherpunks@toad.com
> Subject: question...
> 
> 
> What is the TEMPEST? (just an overview)
> 
> What do enciphered images look like?
> 
> 
> 
> Thank you.
> 
> 
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> ~~~~~~~~~~~~~~~~
> Some people they might say that I'm hard to get to know.
> I go my own sweet way, well that maybe so.
> Something about the crowd that makes me walk alone. 
> I never had a need in me to be the party's life and soul.
> 
> It's me Bernie.
> metaphone@altavista.net
> ``````````````````````````````````````````````````````````````
> ````````````````
> 
> 
> 





Thread