Skip to main content

compromising emanations

  • Reference work entry
  • 83 Accesses

Computer and communications devices emit numerous forms of energy. Many of these emissions are produced as unintended side effects of normal operation. For example, where these emissions take the form of radio waves, they can often be observed interfering with nearby radio receivers. Some of the unintentionally emitted energy carries information about processed data. Under good conditions, a sophisticated and well-equipped eavesdropper can intercept and analyze such compromising emanations to steal information. Even where emissions are intended, as is the case with transmitters and displays, only a small fraction of the overall energy and information content emitted will ever reach the intended recipient. Eavesdroppers can use specialized more sensitive receiving equipment to tap into the rest and access confidential information, often in unexpected ways, as some of the following examples illustrate.

Much knowledge in this area is classified military research. Some types of...

This is a preview of subscription content, log in via an institution.

References

  1. Asonov, Dmitri and Rakesh Agrawal (2004). “Keyboard acoustic emanations.” Proceedings 2004 IEEE Symposium on Security and Privacy, Oakland, California, May 9–12, 2004. IEEE Computer Society Press, Los Alamitos, CA.

    Google Scholar 

  2. Kuhn, Markus G. (2002). “Optical time-domain eavesdropping risks of CRT displays.” Proceedings 2002 IEEE Symposium on Security and Privacy, Oakland, California, May 12–15, 2002. IEEE Computer Society Press, Los Alamitos, 3–18, ISBN 0-7695-1543-6.

    Google Scholar 

  3. Kuhn, Markus G. (2003). “Compromising emanations: Eavesdropping risks of computer displays.” Technical Report UCAM-CL-TR-577, University of Cambridge, Computer Laboratory.

    Google Scholar 

  4. Loughry, Joe, and David A. Umphress (2002). “Information leakage from optical emanations.” ACM Transactions on Information Systems Security, 5 (3), 262–289.

    Google Scholar 

  5. Smulders, Peter (1990). “The threat of information theft by reception of electromagnetic radiation from RS-232 cables.” Computers & Security, 9, 53–58.

    Google Scholar 

  6. 1991 Symposium on Electromagnetic Security for Information Protection (SEPI'91), Proceedings, Rome, Italy, November 21–22, 1991. Fondazione Ugo Bordoni.

    Google Scholar 

  7. van Eck, Wim (1985). “Electromagnetic radiation from video display units: An eavesdropping risk?” Computers & Security, 4, 269–286.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Kuhn, M. (2005). compromising emanations. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_74

Download citation

Publish with us

Policies and ethics