A
Arno Wagner
Previously Aidan Karley said:Errr, reinforces it?
Sorry. Misunderstood that. Ok then ;-)
Obviously you know about it. Anyone with more than a passing
acquaintance with electronics can see the difficulty of defending
comprehensively against a non-trivial investigator using TEMPEST-like
techniques. (The optical-TEMPEST attack I referred to used nothing more
sophisticated than a fast-acting photodiode and a high-speed data
capture device, plus some software.)
That was a pretty impressive attack. I read the paper. I would have
thought before that the phosphorpus in the CRT would filter enough
due to its slowness. Obviously not! And this can be done way cheaper
and from farther away than traditional EM TEMPEST.
High-tech investigation however will not reveal what is written
in pencil on a piece of paper that they don't have sight of at a range
of less than a few hundreds of metres.
Another example: There are techniques to deduce from sound
what was typed on a keyboard. (Pretty new.) No such techniques
for handwriting (yes), as the problem is far more difficult, and
may be unsolvable (not enough sound, vanishes in the noise,
bad repeatability).
A secret message that is not
written down, but is contained in a person's memory, cannot be
intercepted without the courier person being aware of it, which means
that you're totally dependant on old-fashioned, "HUMINT" techniques of
infiltration, subversion and/ or theft. All of these are vastly more
expensive per bit of recovered data than, say, SIGINT (signals
intelligence), so less data can be recovered.
And some countries are unwilling to risk people in the field for
some strange reasons. Pretty crippling. Especially when an important
pice of SIGINT needs to be confirmed, such as, say, the location
of some WMDs....
Going back to the previous topic: yes, if PGP etc were proved to
be systematically breakable, then computer-savvy criminals and
surveillence-phobic people will simply stop entrusting their secret
data to PGP-encrypted channels, and will probably stop using emails at
all. If they're using emails at the moment.
Exactly. As soon as it is known to be compromised, the channel will
be abandoned and surveilance of it will become ineffective.
Arno