Professional Documents
Culture Documents
Video eavesdropping- RF
1. Introduction
2. History of TEMPEST
3. Type of RF leakages
4. Counter-measures.
5. Experiment & Demo
1
11/8/2009
Rx antenna
Attacker
X distance
History
2
11/8/2009
http://img393.imageshack.us/i/b28ck.jpg/
Passive Attack
3
11/8/2009
Leakage Through RF
All monitors emit weak TV signal
Non-intrusive
Attack with use of high
Gain antenna
F1
Unintended F1
Leakage signal
F1
Classified information Detection
system
Note:
Assume F1 is one of the
Compromising emanation frequencies
4
11/8/2009
4. Leakage through RF
(Non-linear intermodulation radiation leakage)
Non-intrusive
F1 Attack with use of high
Gain antenna
Classified information
F3
Detection
F3 system
F2
Non-linear
mixing
Where F3 is the intermod frequency.
F3= F2+F1 or F3 = F2-F1
1. Equipment based
• fax
• Ethernet cables
• RS-232
2. Infrastructure based (Buildings)
1. Power cables
2. Telephone lines
3. Metallic piping
5
11/8/2009
Detection
system
Common cable
connection points
Common cable
connection points
Un Classified
information Detection
system
Radiated
Non-intrusive
Attack with use of current sensor
6
11/8/2009
Note: Quote from paper: Countermeasures to Prevent Eavesdropping on Unintentional Emanations from Personal
Computers
Video timing
1. Actual video contents
2. H-Sync pulses
(48kHz, 80kHz etc)
One line of information
7
11/8/2009
Blanking pulses
Front porch
Video timing of Display monitor Back porch
FT
FT
Single pixel
Rectangular pulse Sinc function
8
11/8/2009
9
11/8/2009
Bw> =10MHz
10
11/8/2009
Van Eck
Receivers
Target
PC
Sync
Generation units
11
11/8/2009
http://www.youtube.com/watch?v=YcTM0dqVz14&feature=related
12
11/8/2009
Effective radiator
Every traces on the PCB carries
current.
1.Speed of transitions
c
2. The length of the traces. λ=
f
e.g. for 30MHz the length must be at
least 2.5m for it to emit effectively. Where :
c = speed of light
f= frequency
λ = lamda
The E and the H fields are not The E and the H fields will
in phase and orthogonal to then be in phase and
each other producing orthogonal to each other
inductive or capacitive load producing plane waves
R<
R >>
13
11/8/2009
1/r
14
11/8/2009
Laptop inside
Shielded
fabric
Mitigation measures
Shielded fabric tent Wide band jammer
Shielded PC or laptop
15
11/8/2009
Mitigation measures
3M shielded
Architectural shielding film
Mitigation measures
Signal Jamming ??
16
11/8/2009
Mitigation measures
Mitigation measures
Software
1.Soft fonts
2.Message hiding (Dithering)
17
11/8/2009
Mitigation measures
1.Soft fonts ( Low pass Filtering)
Markus Kuhn and Ross Anderson, University of Cambridge
Mitigation measures
1.Soft fonts
18
11/8/2009
Mitigation measures
1.Soft fonts (Gaussian and Low Pass Filters)
Mitigation measures
2.Message hiding (Dithering)
1. High frequency BLACK/WHITE dither pattern creates strongest signal
with highest emission.
19
11/8/2009
Technical specifications
20
11/8/2009
Target
IF out
Extract to Matlab
LAN Port
21
11/8/2009
22
11/8/2009
DEMO
23