Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: [Full-disclosure] Tempest today
From: J. Oquendo (silinfiltrated.net)
Date: Fri Aug 18 2006 - 12:43:41 CDT
Paul Sebastian Ziegler wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
> Hi list,
> Can anybody tell me how far evolved this technique is today and who uses
> it? Maybe some reference to a whitepaper or something similar. Would be
Did you mean Van Eck Phreaking... EM eavesdropping, or TEMPEST itself.
TEMPEST is the solution for EM eavesdropping. If you're talking about
Van Eck Phreaking, I'm not sure you're going to get much information
from people explaining how they're doing it (eavesdropping) and what
they're using to do it. That "WOULD/COULD" be akin to a criminal walking
into a police station explaining how he robbed that bank. TSCM has a lot
of information on this kind of stuff http://www.tscm.com/ and a lot of
knowledgeable people who interact with each other. You might be better
off seeing what's happening in governmentland though:
See their reference notes:
sil . infiltrated net http://www.infiltrated.net
The happiness of society is the end of government.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/