From: “John A. Thomas” <jathomas@netcom.com>
To: Derek Zeanah <Derek.Zeanah@f903.n102.z1.fidonet.org>
Message Hash: 2e7eec001208866ade8e576e1bde02ddb34194694cdd56094175665a84fe09b1
Message ID: <Pine.3.89.9501070814.A11177-0100000@netcom6>
Reply To: <121_9501062145@borderlin.quake.com>
UTC Datetime: 1995-01-07 16:44:51 UTC
Raw Date: Sat, 7 Jan 95 08:44:51 PST
From: "John A. Thomas" <jathomas@netcom.com>
Date: Sat, 7 Jan 95 08:44:51 PST
To: Derek Zeanah <Derek.Zeanah@f903.n102.z1.fidonet.org>
Subject: Re: TEMPEST Questions...
In-Reply-To: <121_9501062145@borderlin.quake.com>
Message-ID: <Pine.3.89.9501070814.A11177-0100000@netcom6>
MIME-Version: 1.0
Content-Type: text/plain
On 6 Jan 1995, Derek Zeanah wrote:
>
> I'm writing an article on TEMPEST technology.
>
> The focus is on what TEMPEST is and how to defeat it, if possible. So far
> I've gotten some insightful information, but I'm looking for all I can get.
>
> Has anyone ever heard of TEMPEST being used in the continental US? Can anyone
> tell me what measures offer some level of protection, or steps that can be
> taken to reduce the likelihood of being successfully targeted? Has anyone
> ever seen TEMPEST in action?
>
You might start with van Eck, Wim, "Electromagnetic Radiation from Video
Display Units: An Eavesdropping Risk?", Computers & Security 4 (1985)
269-286. That will give you the technical basics.
If someone has actually seen Tempest interception in action, I'd like to
hear about that as well.
John A. Thomas jathomas@netcom.com
N5RZP 214/263-4351
Return to January 1995
Return to “root <root@einstein.ssz.com>”