[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <44E5FC4D.3060205@infiltrated.net>
Date: Fri, 18 Aug 2006 13:43:41 -0400
From: "J. Oquendo" <sil@...iltrated.net>
To: Paul Sebastian Ziegler <psz@...erved.de>
Cc: full-disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Re: Tempest today
Paul Sebastian Ziegler wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> Hi list,
>
> Can anybody tell me how far evolved this technique is today and who uses
> it? Maybe some reference to a whitepaper or something similar. Would be
> great.
>
Did you mean Van Eck Phreaking... EM eavesdropping, or TEMPEST itself.
TEMPEST is the solution for EM eavesdropping. If you're talking about
Van Eck Phreaking, I'm not sure you're going to get much information
from people explaining how they're doing it (eavesdropping) and what
they're using to do it. That "WOULD/COULD" be akin to a criminal walking
into a police station explaining how he robbed that bank. TSCM has a lot
of information on this kind of stuff http://www.tscm.com/ and a lot of
knowledgeable people who interact with each other. You might be better
off seeing what's happening in governmentland though:
See their reference notes:
http://www.cs.nps.navy.mil/people/faculty/rowe/edg_attacks.htm
--
====================================================
J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net
The happiness of society is the end of government.
John Adams
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists