Van Eck phreaking

From Wikipedia, the free encyclopedia

Jump to: navigation, search

Van Eck phreaking is the process of eavesdropping on the contents of a CRT display by detecting its electromagnetic emissions. It is named after Dutch computer researcher Wim van Eck, who in 1985 published the first paper on it, including proof of concept.[1] Phreaking is the process of exploiting telephone networks, used here because of its connection to eavesdropping.

Van Eck phreaking might also be used to compromise the secrecy of the votes in an election using electronic voting. This caused the Dutch government to ban the use of NewVote computer voting machines manufactured by SDU in the 2006 national elections, under the belief that ballot information might not be kept secret.[2][3]

Contents

[edit] Basic principle

Information that drives the video display takes the form of high frequency electrical signals. These oscillating electric currents create electromagnetic radiation in the RF range. These radio emissions are correlated to the video image being displayed, so, in theory, they can be used to recover the displayed image.

[edit] CRTs

In a CRT the image is generated by an electron beam that sweeps back and forth across the screen. The electron beam excites the phosphor coating on the glass and causes it to glow. The strength of the beam determines the brightness of individual pixels (see CRT for a detailed description). The electric signal which drives the electron beam is amplified to hundreds of volts from TTL circuitry. This high frequency, high voltage signal creates electromagnetic radiation that has, according to Van Eck, "a remarkable resemblance to a broadcast TV signal"[1]. The signal leaks out from displays and may be captured by an antenna and fed into an ordinary television. However, for proper image display the synchronization signal must also be intercepted or recreated, otherwise the image will be interpreted incorrectly. The electron beam is deflected by electromagnetic coils, according to the synchronization signals being fed to them. This deflection aims the beam at different pixels in turn. These signals also escape the display and may be captured. Alternatively, one may simply recreate a synchronization signal, adjusting it until the intercepted image is displayed properly[1].

In the paper, Van Eck reports that in February 1985 a successful test of this concept was carried out with the cooperation of the BBC. Using a van filled with electronic equipment and equipped with a VHF antenna array, they were able to eavesdrop from a "large distance".

[edit] LCDs

In April 2004 new academic research has revealed that flat screens and laptop displays are also vulnerable to electromagnetic eavesdropping. The required equipment for espionage was constructed in a university lab for less than 2000 US dollars.[4]

[edit] Countermeasures

Countermeasures are detailed in the article on TEMPEST, the NSA's standard on spy-proofing digital equipment. One countermeasure involves shielding the equipment to minimize electromagnetic emissions. Another method, specifically for video information, scrambles the signals such that the image is perceptually undisturbed, but the emissions are harder to reverse engineer into images. Examples of this include low pass filtering fonts and randomizing the least significant bit of the video data information.

[edit] In popular culture

  • In Neal Stephenson's 1999 novel Cryptonomicon, Van Eck phreaking (of a laptop LCD) serves as a significant plot device.
  • Van Eck phreaking was referenced directly in the Numb3rs season one episode "Sacrifice", on an LCD flat screen rather than a CRT monitor.
  • Phillip Finch's 1995 novel f2f features the main character Ellis Hoile building a Van Eck scanner, and the device is used to finalize the plot of the book.
  • In a fifth season episode of Alias, a character suggests that they use Van Eck phreaking.
  • Is often referred to in Charles Stross' novel The Atrocity Archives as a danger when viewing classified information.

[edit] See also

  • TEMPEST--(US government standards for limiting electric or electromagnetic radiation emanations from electronic equipment)
  • RINT--(Radiation INTelligence, military application)
  • Election fraud

[edit] References

[edit] External links

Personal tools