1995-01-07 - Re: TEMPEST Questions…

Header Data

From: “John A. Thomas” <jathomas@netcom.com>
To: Derek Zeanah <Derek.Zeanah@f903.n102.z1.fidonet.org>
Message Hash: 2e7eec001208866ade8e576e1bde02ddb34194694cdd56094175665a84fe09b1
Message ID: <Pine.3.89.9501070814.A11177-0100000@netcom6>
Reply To: <121_9501062145@borderlin.quake.com>
UTC Datetime: 1995-01-07 16:44:51 UTC
Raw Date: Sat, 7 Jan 95 08:44:51 PST

Raw message

From: "John A. Thomas" <jathomas@netcom.com>
Date: Sat, 7 Jan 95 08:44:51 PST
To: Derek Zeanah <Derek.Zeanah@f903.n102.z1.fidonet.org>
Subject: Re: TEMPEST Questions...
In-Reply-To: <121_9501062145@borderlin.quake.com>
Message-ID: <Pine.3.89.9501070814.A11177-0100000@netcom6>
MIME-Version: 1.0
Content-Type: text/plain




On 6 Jan 1995, Derek Zeanah wrote:

> 
> I'm writing an article on TEMPEST technology.
> 
> The focus is on what TEMPEST is and how to defeat it, if possible.  So far
> I've gotten some insightful information, but I'm looking for all I can get.
> 
> Has anyone ever heard of TEMPEST being used in the continental US?  Can anyone
> tell me what measures offer some level of protection, or steps that can be
> taken to reduce the likelihood of being successfully targeted?  Has anyone
> ever seen TEMPEST in action?
> 
You might start with van Eck, Wim, "Electromagnetic Radiation from Video 
Display Units:  An Eavesdropping Risk?", Computers & Security 4 (1985) 
269-286.  That will give you the technical basics.

If someone has actually seen Tempest interception in action, I'd like to 
hear about that as well.

John A. Thomas		jathomas@netcom.com
N5RZP			214/263-4351





Thread