home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.security
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!sgiblab!tsoft!ruscal
- From: bbs.ruscal@tsoft.sf-bay.org (Russel Mar)
- Subject: Re: Detecting an Ethernet Tap
- Message-ID: <k0BFuB1w165w@tsoft.sf-bay.org>
- Sender: bbs@tsoft.sf-bay.org (BBS User)
- Organization: The TSoft BBS and Public Access Unix, +1 415 969 8238
- References: <1786@admin.mport.COM>
- Date: Wed, 18 Nov 1992 07:35:19 GMT
- Lines: 47
-
- root@admin.mport.COM (admin) writes:
-
- > howesb@monashee.sfu.ca (Charles Howes) writes:
- >
- > >In article <1992Nov14.064550.16279@netcom.com> aclark@netcom.com (Al Clark)
- > >>In article <1dpmb7INNt2f@usenet.INS.CWRU.Edu> wb8foz@skybridge.scl.cwru.edu
- > >>>2) protect the etherhose
- > >>> b) run fiber inside inner rigid conduit. Run it inside
- > >>> larger one. Fill space between with neurotoxins under
- > >>> pressure......
- >
- > >I bet this could be defeated by first applying rubber cement and tape to
- > >the conduit and making the tap with a drill/needle. It would be funny if a
- > >simple hammer and nail could do the job.
- > > ...
- > ===========================
- >
- > Do you even have to be intrusive? I thought you could get data off a
- > computer by its emmisions. Couldn't you do the same with ethernet cable?
- >
- >
- >
- > =*=*=*=*=*=*=*=*=*=*=*=*========*=*=*=*=*=*=*=========*=*=*=*=*=*=*=*=*=*=*=*
- > Richard ducman Ducoty Microport Inc.
- > duc@mport.com Scotts Valley,
- > root@mport.com 408.438.8649
-
- //////////////////////////////
- A good reminder since I noticed this msg has gotten some regular
- comments. Normal commerial computing equipment radiates enough for
- someone to reconstruct screen data with modern equipment. Pay a private
- investigator enough, and he/she will prove it to you. The last publicly
- known defense was to use TEMPEST qualified equipment; There may be more
- advanced methods (TEMPEST was the term for specially shielded equipment)
- now available, since TEMPEST dates back to the IBM PC/XT.
-
- ..So one would assume that using TEMPEST qualified equipment with
- fiber-optics for all external data connections would be fairly secure as
- long as an interconnect (i.e. connector) or fiber is not tapped.
- I should add that the technology to non-invasively tap fiber (as appposed
- to fusion splicing) has existed for quite some time. I believe Raychem
- Corporation (or it's subsidary Raynet) in Menlo Park, CA holds a basic
- patent on non-invasive taps. It was the basis for Raynet's first
- released telecom product, first detailed in 1987.
-
- --
- Russel Mar (bbs.ruscal@tsoft.sf-bay.org)
-