11.6.1. (some of this gets speculative and so may not be to
everyone's liking)
11.6.2. "What is TEMPEST and what's the importance of it?"
- TEMPEST apprarently stands for nothing, and hence is not an
acronym, just a name. The all caps is the standard
spelling.
- RF emission, a set of specs for complying
- Van Eyck (or Van Eck?) radiation
+ Mostly CRTs are the concern, but also LCD panels and the
internal circuitry of the PCs, workstations, or terminals.
- "Many LCD screens can be read at a distance. The signal
is not as strong as that from the worst vdus, but it is
still considerable. I have demonstrated attacks on Zenith
laptops at 10 metres or so with an ESL 400 monitoring
receiver and a 4m dipole antenna; with a more modern
receiver, a directional antenna and a quiet RF
environment there is no reason why 100 metres should be
impossible." [Ross Anderson, Tempest Attacks on Notebook
Computers ???, comp.security.misc, 1994-08-31]
11.6.3. What are some of the New Technologies for Espionage and
Surveillance
+ Bugs
+ NSA and CIA have developed new levels of miniaturized
bugs
- e.g., passive systems that only dribble out intercepted
material when interrogated (e.g., when no bug sweeps
are underway)
- many of these new bugging technologies were used in the
John Gotti case in New York...the end of the Cold War
meant that many of these technologies became available
for use by the non-defense side
- the use of such bugging technology is a frightening
development: conversations can be heard inside sealed
houses from across streets, and all that will be
required is an obligatory warrant
+ DRAM storage of compressed speech...6-bit companded,
frequency-limited, so that 1 sec of speech takes
50Kbits, or 10K when compressed, for a total of 36 Mbits
per hour-this will fit on a single chip
- readout can be done from a "mothership" module (a
larger bug that sits in some more secure location)
- or via tight-beam lasers
+ Bugs are Mobile
- can crawl up walls, using the MIT-built technology for
microrobots
- some can even fly for short distances (a few klicks)
+ Wiretaps
- so many approaches here
- phone switches are almost totally digital (a la ESS IV)
- again, software hacks to allow wiretaps
+ Vans equipped to eavesdrop on PCs and networks
+ TEMPEST systems
+ technology is somewhat restricted, companies doing this
work are under limitations not to ship to some
customers
- no laws against shielding, of course
- these vans are justified for the "war on drugs" and
weapons proliferation controle efforts (N.E.S.T., anti-
Iraq, etc.)
+ Long-distance listening
- parabolic reflectors, noise cancellation (from any off-
axis sources), high gain amplification, phoneme analysis
- neural nets that learn the speech patterns and so can
improve clarity
+ lip-reading
- with electronically stabilized CCD imagers, 3000mm lenses
- neural net-based lip-reading programs, with learning
systems capable of improving performance
- for those in sensitive positions, the availability of new
bugging methods will accelerate the conversion to secure
systems based on encrypted telecommunications and the
avoidance of voice-based systems
11.6.4. Digital Telephony II is a major step toward easier
surveillance
11.6.5. Citizen tracking
+ the governments of the world would obviously like to trace
the movements, or at least the major movements, of their
subjects
- makes black markets a bit more difficult
- surfaces terrorists, illegal immigrants, etc. (not
perfectly)
+ allows tracking of "sex offenders"
- who often have to register with the local police,
announce to their neighbors their previous crimes, and
generally wear a scarlet letter at all times--I'm not
defending rapists and child molesters, just noting the
dangerous precedent this is setting
- because its the nature of bureaucracies to want to know
where "their" subjects are (dossier society = accounting
society...records are paramount)
+ Bill Stewart has pointed out that the national health care
systems, and the issuance of social security numbers to
children, represent a way to track the movements of
children, through hospital visits, schools, etc. Maybe even
random check points at places where children gather (malls,
schools, playgrounds, opium dens, etc.)
- children in such places are presumed to have lesser
rights, hence...
- this could all be used to track down kidnapped children,
non-custodial parents, etc.
- this could be a wedge in the door: as the children age,
the system is already in place to continue the tracking
(about the right timetable, too...start the systme this
decade and by 2010 or 2020, nearly everybody will be in
it)
- (A true paranoid would link these ideas to the child
photos many schools are requring, many local police
departments are officially assisting with, etc. A dossier
society needs mug shots on all the perps.)
- These are all reasons why governments will continue to push
for identity systems and will seek to derail efforts at
providing anonymity
+ Surveillance and Personnel Identification
+ cameras that can recognize faces are placed in many
public places, e.g., airports, ports of entry, government
buildings
- and even in some private places, e.g., casinos, stores
that have had problems with certain customers, banks
that face robberies, etc.
+ "suspicious movements detectors"
+ cameras that track movements, loitering, eye contact
with other patrons
+ neural nets used to classify behvaiors
- legal standing not needed, as these systems are
used only to trigger further surveillance, not to
prove guilt in a court of law
- example: banks have cameras, by 1998, that can
identify potential bank robbers
- camera images are sent to a central monitoring
facility, so the usual ploy of stopping the silent
alarm won't work
- airports and train stations (fears of terrorists),
other public places
11.6.6. Cellular phones are trackable by region...people are getting
phone calls as they cross into new zones, "welcoming" them
- but it implies that their position is already being tracked
11.6.7. coming surveillance, Van Eck, piracy, vans
- An interesting sign of things to come is provided in this
tale from a list member: "In Britain we have 'TV detector
Vans'. These are to detect licence evaders (you need to pay
an annual licence for the BBC channels). They are provided
by the Department of Trade and Industry. They use something
like a small minibus and use Van Eck principles. They have
two steerable detectors on the van roof so they can
triangulate. But TV shops have to notify the Government of
buyers - so that is the basic way in which licence evaders
are detected. ... I read of a case on a bulletin board
where someone did not have a TV but used a PC. He got a
knock on the door. They said he appeared to have a TV but
they could not make out what channel he was watching!
[Martin Spellman, <mspellman@cix.compulink.co.uk>, 1994-
0703]
- This kind of surveillance is likely to become more and more
common, and raises serious questions about what _other_
information they'll look for. Perhaps the software piracy
enforcers (Software Publishers Association) will look for
illegal copies of Microsoft Word or SimCity! (This area
needs more discussion, obviously.)
11.6.8. wiretaps
- supposed to notify targets within 90 days, unless extended
by a judge
- Foreign Intelligence Surveillance Act cases are exempt from
this (it is likely that Cypherpunks wiretapped, if they
have been, for crypto activities fall under this
case...foreigners, borders being crossed, national security
implications, etc. are all plausible reasons, under the
Act)
Next Page: 11.7 Surveillance Targets
Previous Page: 11.5 Surveillance in Other Countries
By Tim May, see README
HTML by Jonathan Rochkind