http://www.politrix.org/foia/tempest/tempest-leak.htm
What is
van Eck Phreaking (the really short answer)?
van Eck phreaking is a form of electronic eavesdropping. The eavesdropper (phreaker) uses a special setup to capture and display the images on someone’s monitor from a distance.
How about a slightly more involved answer?
When a cathode ray tube (CRT) monitor creates an image it does so by running the electron gun back and forth, as well as, up and down the screen. This movement is done at a certain frequency. The intensity of the beam determines the color of pixel created. This process result in the creation of a modular electro magnetic (EM) field. Thus at any given moment the EM waveform will contain all the information represented on the screen. Using an oscilloscope the EM waveform look irregular. However, with the right decoding equipment one can turn the waveform back into a picture, thereby, duplicating someone else’s screen.
Why is it
called van Eck phreaking?
In
What is phreaking?
According to one web page:
phreaking - /freek'ing/ "phone phreak"
At one time phreaking was a semi-respectable activity
among hackers; there was a gentleman's agreement that phreaking
as an intellectual game and a form of exploration was OK, but serious theft of
services was taboo. There was significant crossover between the hacker
community and the hard-core phone phreaks who ran
semi-underground networks of their own through such media as the legendary
"TAP Newsletter".
This ethos began to break down in the mid-
The crimes and punishments of gangs like the "
-http://computing-dictionary.thefreedictionary.com/phreaking
So it is
actually possible to do this?
Yes. At Defcon IV, Jim Carter demonstrated a van Eck device. Defcon is a
conference targeted primarily at the hacking community. Defcon IV occurred
on
Can I do
it?
Possibly, but probably not. There are reports that a van Eck phreaking device can be made for under $
Well even
a fool can realize that possessing van Eck technology can be dangerous to
National Security. Is there anything I
should know about before I devote the rest of my life to espionage and creating
neat spy devices with cool antennas?
One word: TEMPEST.
TEMPEST, an acronym for Transient Electromagnetic Pulse Emanation Standard is described as both “a specification for equipment and a term used to describe the process for preventing compromising emanations”
-http://www.eskimo.com/~joelm/tempestintro.html
TEMPEST is classified as it is run by the National Security Agency (NSA).
A timeline of TEMPEST can be found here. For more information on tempest click one of the following links:
How about a little information about protecting myself from van Eck phreakers?
One surefire way of protecting yourself from the prying van Eck eyes of others is by employing a Faraday cage. A Faraday cage is an aperture-less enclosure constructed of a perfectly conducting material.
http://www.menzelphoto.com/gallery/big/lightning2.htm
A Faraday cage will stop an electromagnetic waves created within from escaping (thereby protecting you and you monitor). For a website on this concept go here.
How about something less… how do you say… big?
Well how about something so tiny it fits on a floppy? Let me introduce you to Tinfoil Hat Linux. Tinfoil Hat Linux is a bootable Linux distribution that fits on a floppy disk. Despite it minimal functionality (due of course to the fact that it is so small it can fit on a floppy), it does provide a number of useful tools. Among the tools provided are: protection against van Eck phreaking, protection against key logging, use of PGP keys, and the ability to read/write files.
To the
computer enthusiast: Tinfoil Hat Linux is really, really neat. I would suggest simply trying it to experience
it. Besides which on today’s broadband
internet access, downloading it takes all of… hmmm…
For more information on Tinfoil Hat Linux, or to download the distribution itself, go to this website.
Tell me
more! Tell me more! I’m a script kiddie wanting to be
Elite and this could be my ticket.
Hacking for illegal purposes is bad. Do not do it. Do not play chicken with the law. That is also bad.
However, becoming less ignorant is good. The best way to understand the concepts is to read van Eck’s papers and understand them. A second van Eck paper is available here.
So this
all sounds great in theory, but how can I be sure that all this van Eck stuff
is really true?
So a skeptic needs proof? Would using your monitor as a AM transmitter be convincing?
The software you require can be found here. For more information on the specifics not contained in the file go to this website.
Note: This program does not work on Windows.
This site was
constructed by Jonathan Grover for Upsilon Pi Epsilon at