In 1985,
Wim van Eck published the first unclassified technical analysis of the security risks of emanations from
computer monitors. This paper caused some consternation in the security community, which had previously believed that such monitoring was a highly sophisticated attack available only to
governments; Van Eck successfully eavesdropped on a real system, at a range of hundreds of
metres, using just $15 worth of equipment plus a
television set. As a consequence of this research, such emanations are sometimes called "Van Eck radiation", and the eavesdropping technique
Van Eck phreaking, although government researchers were already aware of the danger, as
Bell Labs noted this vulnerability to secure
teleprinter communications during
World War II and was able to produce 75% of the plaintext being processed in a secure facility from a distance of . Additionally, the NSA published
Tempest Fundamentals, NSA-82-89, NACSIM 5000, National Security Agency (Classified) on February 1, 1982. In addition, the Van Eck technique was successfully demonstrated to non-TEMPEST personnel in
Korea during the
Korean War in the 1950s.
Markus Kuhn has discovered several low-cost techniques for reducing the chances that emanations from computer displays can be monitored remotely. With
CRT displays and
analog video cables, filtering out
high-frequency components from
fonts before rendering them on a computer screen will attenuate the energy at which text characters are broadcast. With modern
flat panel displays, the high-speed digital
serial interface (
DVI) cables from the
graphics controller are a main source of compromising emanations. Adding random
noise to the
least significant bits of pixel values may render the emanations from flat-panel displays unintelligible to eavesdroppers but is not a secure method. Since DVI uses a
certain bit code scheme that tries to transport a balanced signal of 0 bits and 1 bits, there may not be much difference between two pixel colors that differ very much in their color or intensity. The emanations can differ drastically even if only the last bit of a pixel's color is changed. The signal received by the eavesdropper also depends on the frequency where the emanations are detected. The signal can be received on many frequencies at once and each frequency's signal differs in
contrast and
brightness related to a certain color on the screen. Usually, the technique of smothering the RED signal with noise is not effective unless the power of the noise is sufficient to drive the eavesdropper's receiver into
saturation thus overwhelming the receiver input.
LED indicators on computer equipment can be a source of compromising optical emanations. One such technique involves the monitoring of the lights on a
dial-up modem. Almost all modems flash an LED to show activity, and it is common for the flashes to be directly taken from the data line. As such, a fast optical system can easily see the changes in the flickers from the data being transmitted down the wire. Recent research has shown it is possible to detect the radiation corresponding to a keypress event from not only
wireless (radio) keyboards, but also from traditional wired keyboards [the PS/2 keyboard, for example, contains a microprocessor which will radiate some amount of radio frequency energy when responding to keypresses], and even from laptop keyboards. From the 1970s onward, Soviet bugging of US Embassy
IBM Selectric typewriters allowed the keypress-derived mechanical motion of bails, with attached magnets, to be detected by implanted magnetometers, and converted via hidden electronics to a digital radio frequency signal. Each eight character transmission provided Soviet access to sensitive documents, as they were being typed, at US facilities in Moscow and Leningrad. In 2014, researchers introduced "AirHopper", a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency signals. In 2015, "BitWhisper", a "covert signaling channel between air-gapped computers using thermal manipulations" was introduced. BitWhisper supports bidirectional communication and requires no additional dedicated peripheral hardware. Later in 2015, researchers introduced GSMem, a method for exfiltrating data from air-gapped computers over cellular frequencies. The transmission – generated by a standard internal bus – renders the computer into a small cellular transmitter antenna. In February 2018, research was published describing how low-frequency magnetic fields can be used to escape sensitive data from Faraday-caged, air-gapped computers with malware code-named 'ODINI' that can control the low-frequency magnetic fields emitted from infected computers by regulating the load of CPU cores. In 2018, a class of
side-channel attack was introduced at
ACM and
Black Hat by the
Eurecom researchers who named it "screaming channels". This kind of attack targets
mixed-signal chips — containing an
analog and
digital circuit on the same
silicon die — with a
radio transmitter. The results of this architecture, often found in
connected objects, is that the digital part of the chip will leak some metadata on its computations into the analog part, which leads to metadata's leak being encoded in the
noise of the radio transmission. Thanks to
signal-processing techniques, researchers were able to extract
cryptographic keys used during the communication and
decrypt the content. This attack class is supposed, by the authors, to be known already for many years by governmental
intelligence agencies. ==In popular culture==