Laptops And Flat Panels Now Vulnerable to Van Eck Methods 144
An anonymous reader writes "Using radio to eavesdrop on CRTs has been around since the 80s, but Cambridge University researchers have now shown that laptops and flat-panel displays are vulnerable too. Using basic radio equipment and an FPGA board totaling less than $2,000 it was possible for researchers to read text from a laptop three offices away. 'Kuhn also mentioned that one laptop was vulnerable because it had metal hinges that carried the signal of the display cable. I asked if you could alter a device to make it easier to spy on. "There are a lot of innocuous modifications you can make to maximize the chance of getting a good signal," he told me. For example, adding small pieces of wire or cable to a display could make a big difference.'"
Telling question (Score:5, Insightful)
Okay, see, that's the type of questions the NSA likes to see its potential employees ask. Any other type of person would ask if you could alter a device to make it *harder* to spy on.
Re:Telling question (Score:4, Insightful)
Re: (Score:2)
Booby traps are designed to catch boobys.
They work very well.
less social intelligence than a 13 year old (Score:5, Funny)
"guard against it?"
"no, no, what he could do to... um, make sure the 'bad guys' haven't modified his system, ehem, like, what would a bad guy do to make this work better so he could do it, i mean, so he could have an idea of the kind of modifications to look out for?"
Re: (Score:3, Informative)
Sit inside a Faraday cage
but make sure you always carry a spare key for the door with you
Re: (Score:2)
Re: (Score:2)
Do I still have the same protection?
BEHOLD ! I am TEMPEST, they LORD and MASTER (Score:5, Funny)
BEHOLD ! I am TEMPEST, thy LORD and MASTER ! Bow before ME ! Fear ME ! I see ALL*!
*its a bit fuzzy, like snowy tv - BUT I SEE ALL !! FEAR ME !!!
Re: (Score:3, Funny)
>
> *its a bit fuzzy, like snowy tv - BUT I SEE ALL !! FEAR ME !!!
Hey, you, get back in that teapot!
I met a man upon a stair,
A little man who wasn't there,
He's reading all our screens today,
I think he works for NSA!
Re:Telling question (Score:4, Insightful)
Re: (Score:2)
Re:Telling question (Score:4, Insightful)
Re:Telling question (Score:5, Funny)
Re: (Score:2)
Re: (Score:1, Informative)
ch0wned! (Score:4, Insightful)
I think this means they've always been vulnerable, but no one knew. It's not like someone turned on the Vulnerable switch.
Re:ch0wned! (Score:5, Interesting)
The MPAA will be furious!
Re: (Score:1)
The MPAA will be at your door in minutes, nice knowing you.
Re: (Score:2)
Or, rather, no one publicly announced it.
I doubt if the NSA, for instance, had discovered this vulnerability years ago, they would have trumpeted it publicly.
Re: (Score:3, Insightful)
Oh bull (Score:5, Interesting)
That's a pretty big red flag that these suckers were subject to Van Eck.
And if the NSA could hear Scott McNealy's friggin keyboard outside in the parking lot (as they later told him during a meeting in the late 1990's), you'd better believe that the NSA has had LCD monitor reading capability for at least that long.
Just because it's not in the popular press, or published papers, hardly means that no one knew. The only thing surprising here is that it took so long for someone to get a paper out it.
I don't mean to disparage the researchers, who deserve a lot of credit to finally bringing this to public knowledge, but this is really low-hanging fruit.
Yes, we've known for a decade (Score:5, Interesting)
My ~1995 laptop (486? Pentium 60? MHz) would display on my parents' TV screen when I visited them. (No, I didn't live in their basement, I'd just avoided having a TV in my house back then:-) It wasn't in sync, so there were three partial screen images scrolling slowly, and there weren't enough pixels, but it was readable enough to be obvious that a real receiver would be able to display the output cleanly. My guess was that the culprit wasn't really the LCD drivers, but the auxiliary VGA port on the back of the laptop; I no longer remember if I tried turning that on and off, or exactly which laptop model it was, but Google probably knows.
The real difficulties are getting enough focus to only grab signals from the laptop you're looking for, and not all the other CRTs and TVs and LCDs around, which is why you're reading an interview with an expert like Markus Kuhn and not just some 1337 k1dd13z, and doing so without parking a big antennaful van on the street in front of your target.
If you look at the real security threats here, there are two sides -
Re: (Score:2)
Pringles can?
Re: (Score:2)
Not only that... this technique was published!
Re: (Score:1)
Yeah, sorry. That was me. I just bumped into the damn thing, honest.
An ounce of prevention (Score:5, Funny)
Re:An ounce of prevention (Score:5, Funny)
Re: (Score:1)
Re: (Score:1, Funny)
Re: (Score:1)
Wow (Score:5, Funny)
So adding an antenna makes it broadcast better meaning you can pick it up easier. Shocking. Very useful for remote spying. Step one, add an antenna to the target's display.
Re: (Score:2)
The Offical Howto (Score:5, Funny)
Trinitron? (Score:1, Interesting)
Like the Sony Trinitron CRTs? [monitorworld.com]
I never bought their explanation for the "aperture grill" and "damper wires". Considering this kind of EM surveillance, they make perfect sense however.
Re: (Score:2)
Step Two: ???
Re: (Score:2)
HDMI? (Score:5, Insightful)
Re:HDMI? (Score:5, Interesting)
With DVI it's probably a lot harder, but the signal might actually be clearer if you knew how to pick it up, kind of like how you can pick up UWB radio at high ranges. The on-off style of the signal creates a sharper signal. It might require more hardware but I wouldn't be surprised if you could do it at longer range.
An encrypted signal, of course, will be much harder to deal with whether there's an easy-to-receive digital signal or not.
I'm skeptical of the idea that the main video link will be encrypted any time soon though, because of the immense bandwidth involved.
Also, I have to wonder if you could simply pick up the signal between the controller, which decodes the signal (digital or no) and the panel itself...
Re: (Score:3, Informative)
I thought that was already done.
http://en.wikipedia.org/wiki/HDCP [wikipedia.org]
Re: (Score:1, Insightful)
It wouldn't help pirates much though -- tempest output is seriously low-fi fuzzy.
Re: (Score:2, Informative)
But yeah, encrypted HDMI would make it more difficult.
Re: (Score:2)
Bad story submission title (Score:5, Informative)
The title given to this story on slashdot is awful, especially for a geek news site. Haven't we already established that obscurity is not security? And about a million times over?
An unpublished vulnerability is no less real than one that has been announced, and is in fact more dangerous because the lack of an announcement leads to a false feeling of security. The real story is that your laptop has in fact been vulnerable to van eck phreaking for years and year, not just "now".
It's a good thing I haven't had faith in slashdot for a long time now, or I'd be really disappointed. As it is, I'm just pointing this out for those who didn't already notice.
Re: (Score:2)
The title given to this story on slashdot is awful, especially for a geek news site. Haven't we already established that obscurity is not security?
If you think this is "security through obscurity", you have some remedial reading to do. Hint: this is not STO.
laptop has in fact been vulnerable to van eck phreaking for years and year
Add "the definition of phreaking" to your reading list. Yes, I know that phrase was used in the article; the fact that the NewScientist writer was wrong does not exc
Re: (Score:2)
Metal hinges? (Score:1, Funny)
But then, it is pretty obvious that using the notebook ungrounded IS asking for trouble anyway as far as signal interference goes, and those hinges are earth-grounded if you have the notebook plugged to wall power using a three-prong power supply.
I think I will keep my ThinkPad instead of using cheezy plastic crap, and use low-contrast, antialiased round fonts if I feel secretive. Must also remember to tape over all network leds, and turn on the loud white-
grounded != shielded (Score:2)
Grounding and shielding are two different issues.
At the frequencies involved, grounding the device is no help at all. (In fact the ground wiring may act as a helper antenna.)
Bypassing DRM (Score:5, Funny)
Re: (Score:2)
Security hole in the making (Score:5, Insightful)
Not to go slightly off topic here, but BPL (broadband over power wires) providers ought to see this as a wakeup call. Coupling broad band ODMF signals on widely spaced wires hanging 40+ feet in the air, radiating like antennas is a HUGE security issue. Not only can BPL be jammed with something as simple as a CB or Amateur radio transceiver, but a creative individual could use similar methods to monitor BPL signals.
Re: (Score:2)
Really? I could have sworn you'd need a transmitter.
Not only do you already have to worry about any signal broadcast over the internet, but the fact that it's sent over a big long wire (as you describe) means it's even more important to use encryption. And what do you know? Any sensitive communications I perform over the internet are already en
Alert: my eyes are malfunctioning (Score:2)
Parent line, then my reply, appears below:
I read that no less than three times and still believed that it said "receiver".
I apologize for this part of my comment.
Looks like my eyes are failing me, guess I'll go home (for those wondering, yes, I do come in pretty early.)
Re: (Score:2)
Really? I could have sworn you'd need a transmitter.'
A 'transceiver' is a combination transmitter receiver. During some BPL tests BPL signals were completely interrupted by a 5 watt signal on the 40 meter (14MHz) band.
'but a creative individual could use similar methods to monitor BPL signals.
Not only do you already have to worry about any signal broadcast over the internet, but the fact that it's sent over a big long w
Re: (Score:2)
Re: (Score:2)
Broadband providers aren't, I would imagine, particularly concerned about their user's privacy. If they see it as a wakeup call, it'll be a wakeup call to lobby the government to institute regulations favoring BPL because it is easier to monitor for law enforcement and security purposes, and to impose new barriers on broadband systems less easy to monitor.
van Eck only made it public (Score:5, Informative)
Cryptonomicon? (Score:5, Informative)
Re: (Score:2, Funny)
Either that, or the vulnerability was because the guy was running Finux. As long as you don't install that you should be fine.
Re: (Score:2)
Re: (Score:1, Interesting)
I don't mean to alarm you... But Cryptonomicon was, in fact, entirely sci-fi.
Damn. All this time, I thought that Alan Turing was a real person. I'm so embarrassed!
But seriously. Cryptonomicon wove real events, real people and real technology with fiction in a pretty seamless way. It's not so bad to ask where the fact ends and the fiction begins, and it's wrong to call it "entirely sci-fi".
Re: (Score:2)
Funny you should say that. One time I was in Malaysia I noticed that 7/11 stores have a sign on the front Buka 24 Jam literally: open 24 hours.
I am sure it is the same wherever Malay is spoken.
Re: (Score:1)
in which laptops still refreshed the display 60 times per second or so, even if they didn't need to, so you could pick up on that radiation or something for the phreaking
You could rig a device that would just take a snapshot of the screen whenever it received input, so while you might not see their screen while they aren't manipulating it, you still get to see what they've done so it doesn't really matter, eh?
why mess w/the screen if you can mess w/the cable? (Score:2)
These Van Eck methods are based on amplifying these "leaky" signals; just like a television could receive signal by just running a cable next to cable-tv or neon light goes lit under high powerlines ; leakage
Re:why mess w/the screen if you can mess w/the cab (Score:2)
Yes, but the cryptonomicon was right in an important respect:
Picking up these leaks could easily be made a whole lot harder if it was
given any thought at all in the design process.
The panedisplay could easily have pixels that remember their own state, so
information only needs to be sent to the pixes that change, and only when
they change. You could still pick up the signals remotely, but it would
have to catch them at the right moment (no sec
Re: (Score:2)
There could be even an extra button on the screen which could say "authenticate" or
TEMPEST in a teacup (Score:3, Informative)
Simply put, change the voltage level or current level of a device and you generate a signal that is conducted along wires and other conductive paths and radiated from those conductive paths. Interception of the conducted or radiated changes can be used to re-create
the original information. Wether the information is in serial, paralell or raster format it is a relatively trivial problem given some time and computing resources.
Is it a problem for most of us? Given that someone will try the easiest ways to get the information, using Van Eck or other types of TEMPEST
attacks is much less likely than social engineering or other means to get your information.
Wobbly windows to the rescue! (Score:4, Funny)
At last! (Score:5, Funny)
Sigh If only they would make a portable version of my laptop...
Re: (Score:2)
Now all you need i
TEMPEST (Score:5, Informative)
Re: (Score:2)
You are right about the grounding too. All grounding straps on panels had to be connected tightly and any other
DMCA (Score:2)
I'm surprised. (Score:1)
You know... I might have to re-read this book soon.
Not too surprising (Score:4, Interesting)
I'm not an expert on Van Eck phreaking, so it's possible that the previously used methods were incapable of detecting this for whatever reason, but the presence of these emissions and the possibility of spying shouldn't be surprising.
This reminds me of the scheduled tinfoil supplies delivery I need to take care of...
Re: (Score:3, Informative)
Previous methods could intercept the signal. Processing it back into an image was the problem.
CRTs essentially modulate the beam current with the basic video signal. Leakage of that puts into the air precicely what you need to produce a copy of the image part (though the current is cut off for retrace). Also pick up and sort out the spikes from the H and V defle
Re: (Score:2)
Re: (Score:2)
My (and, judging by search engine results, many other peoples') Dell Latitude D810 leaks noise loud enough out the /built in/ speakers. Even when they are disabled through software. It's at about the same level as the background noise, so it's usually not noticable. If I take it into a quiet room, or at night when things have quieted down, it can drive me bonkers.
If this wasn't my work laptop, I would
This was in "Cryptonomicon" (Score:1)
Re: (Score:2)
Old Fashioned Countermeasures Still Work! (Score:1, Interesting)
Re: (Score:2)
Article Polls! (Score:5, Interesting)
My first reaction was "WTF did the relatively recent end-of-civ poll go" and then when I voted it showed this article's comment under the poll results, which was another WTF moment. When was this feature added/first used? I can already see great use for the article polls, for example the editors could try to guess the popular tags and use them for poll items.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Lite-Brite! (Score:1)
Work done three years ago (Score:3, Informative)
http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf [cam.ac.uk]
as well as countermeasures; randomising the low-order bit of all your pixels anew in every frame would be ideal, but using colours which have the same number of bit transitions in 'black' and 'white' works almost as well. Looks a bit ugly to have your screen entirely in off-greens and off-pinks, but that's the price of security.
HDCP actually helps against this kind of thing, because there are no long lengths of wire carrying unencoded video signal.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Odd thing... (Score:2)
How soon until keyboard LEDs? (Score:2)
(I don't care if it was fiction -- it was a good introduction for a lot of people to basic information security concepts, including those who might otherwise not get or suffer through one.)
More information (Score:4, Informative)
Another paper that is very relevant to this article is from a Japanese group who did research on the same topic (LCDs, laptops, etc) A Trial of the Interception of Display Image using Emanation of Electromagnetic Wave [www.nict.jp] - again, a PDF. What's interesting to note from this paper is the fact that the researchers found that minor inconsistencies in the production of the equipment caused slightly different synchronous frequencies to be detected. This means in an office it could be possible for an attacker to "choose" which monitor they wish to look at by its frequency signature.
This obsoletes a few technologies. (Score:2)
Radio (Score:1)
Wifi.. (Score:2)
Awesome marketing idea (Score:2)
Transistor Packet Radio (Score:2)
"however some people still balk at this as 'science fiction'. I can assure you it's not. It's this kind of thing that should be waking up manufactures to the perils of shitty RFI design. Spewing broad band spectrum pollution not only causes radio interference, but also opens you to security problems."
Amen, Brother.
And when it "science fictions" across your purview - if you catch it, it becomes pretty real.
Because these techniques aren't at your favorite |-|ol3 'r US exploit sites. (Why do you
Re: (Score:3, Funny)
Selective antenna, selective receiver. (Score:2)
What impresses me is that the detector can select output from one screen over all others. In the New Scientist article, Kuhn pulls a screen from 25 meters away at a public conference. How many other screens were around and how was this selection achieved? Would a possible countermeasure be to have a second screen playing white noise (or some other noise generator) nearby?
A couple of things would work here. For one thing, an extremely directional Yagi antenna - they're the classic rooftop TV antenna; a l