New information technologies for detecting adverse compromising electromagnetic radiations from electronic computer equipment

Yury Katkov
{"title":"New information technologies for detecting adverse compromising electromagnetic radiations from electronic computer equipment","authors":"Yury Katkov","doi":"10.31673/2518-7678.2020.042533","DOIUrl":null,"url":null,"abstract":"The article deals with the problem of TEMPEST - unintentional radiation of electronic equipment, which can be intercepted by malefactors in the form of radiation of an electromagnetic parasitic wave, and which, from a security point of view, is compromising radiation because they can have compromising information. Today, the term TEMPEST is the name of a technology that includes various methods of analyzing electromagnetic compromising radiation in such a way that they can be used to recover intercepted data. The task was completed: It is known that electronic equipment creates electromagnetic fields that can interfere with radio and television reception at a considerable distance. But interference is not the only problem caused by stray electromagnetic radiation. In some cases, you can get information about the signals that are used inside the equipment, when the radiation signals are intercepted by intruders and these signals are decoded. This capability poses a problem, especially in the case of digital equipment, since remote signal recovery within the equipment can allow the reconstruction of the data that the equipment is processing. Therefore, the problem arises of determining technologies for detecting spurious electromagnetic radiation from electronic computers, which may have compromising information. The content of TEMPEST-technology is considered as a physical phenomenon of capturing and recovery of electromagnetic radiation emitted by digital equipment, and which can have compromising information. TEMPEST hardware analysis is performed, which includes various types of sensitive receivers that can monitor a wide range of frequencies, as well as a combination of hardware and software capable of processing the received signals. The analysis of various types of TEMPEST-technology is carried out, namely: Tempest-attack, Soft TEMPEST, as well as a variety of technologies for intercepting information by receiving spurious radiation of a monitor signal, searching for the necessary information on a disk, outputting information to an unused serial port; reflections of the luminous flux from the monitor screen on the walls; modeling the luminous flux in LED indicators and others. Recommendations for protection against TEMPEST technologies for companies and individuals are given.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Notes of the State University of Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2518-7678.2020.042533","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The article deals with the problem of TEMPEST - unintentional radiation of electronic equipment, which can be intercepted by malefactors in the form of radiation of an electromagnetic parasitic wave, and which, from a security point of view, is compromising radiation because they can have compromising information. Today, the term TEMPEST is the name of a technology that includes various methods of analyzing electromagnetic compromising radiation in such a way that they can be used to recover intercepted data. The task was completed: It is known that electronic equipment creates electromagnetic fields that can interfere with radio and television reception at a considerable distance. But interference is not the only problem caused by stray electromagnetic radiation. In some cases, you can get information about the signals that are used inside the equipment, when the radiation signals are intercepted by intruders and these signals are decoded. This capability poses a problem, especially in the case of digital equipment, since remote signal recovery within the equipment can allow the reconstruction of the data that the equipment is processing. Therefore, the problem arises of determining technologies for detecting spurious electromagnetic radiation from electronic computers, which may have compromising information. The content of TEMPEST-technology is considered as a physical phenomenon of capturing and recovery of electromagnetic radiation emitted by digital equipment, and which can have compromising information. TEMPEST hardware analysis is performed, which includes various types of sensitive receivers that can monitor a wide range of frequencies, as well as a combination of hardware and software capable of processing the received signals. The analysis of various types of TEMPEST-technology is carried out, namely: Tempest-attack, Soft TEMPEST, as well as a variety of technologies for intercepting information by receiving spurious radiation of a monitor signal, searching for the necessary information on a disk, outputting information to an unused serial port; reflections of the luminous flux from the monitor screen on the walls; modeling the luminous flux in LED indicators and others. Recommendations for protection against TEMPEST technologies for companies and individuals are given.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用于检测电子计算机设备有害电磁辐射的新信息技术
本文讨论了TEMPEST问题——电子设备的无意辐射,它可以被不法分子以电磁寄生波辐射的形式截获,从安全的角度来看,这是一种危害辐射,因为他们可能拥有危害信息。今天,术语TEMPEST是一种技术的名称,它包括各种分析电磁危害辐射的方法,这些方法可以用来恢复被截获的数据。任务完成了:众所周知,电子设备产生的电磁场可以在相当远的地方干扰无线电和电视的接收。但是干扰并不是由杂散电磁辐射引起的唯一问题。在某些情况下,当辐射信号被入侵者拦截并解码时,你可以获得有关设备内部使用的信号的信息。这种能力带来了一个问题,特别是在数字设备的情况下,因为设备内部的远程信号恢复可以允许设备正在处理的数据的重建。因此,确定检测来自电子计算机的虚假电磁辐射的技术就出现了问题,因为电子计算机可能含有有害的信息。tempest技术的内容被认为是捕获和恢复数字设备发出的电磁辐射的物理现象,并且可能具有折衷信息。执行TEMPEST硬件分析,其中包括各种类型的敏感接收器,可以监测广泛的频率范围,以及能够处理接收信号的硬件和软件的组合。分析了各种类型的TEMPEST技术,即:TEMPEST攻击、Soft TEMPEST,以及通过接收监测信号的虚辐射、在磁盘上搜索所需信息、将信息输出到未使用的串口等方式截获信息的各种技术;显示器屏幕上光通量在墙上的反射;模拟LED指示灯等的光通量。对公司和个人提出了防范TEMPEST技术的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Modeling the volatility of financial processes Brand management of an innovative product of a telecommunications company Development of a site of car service services with the possibility of calling a tower according to geopositioning data Strategy of proactive management of corporate culture of telecommunications enterprises Transmission of track name information on the FM radio station using Radiotext
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1