[cryptome] Re: Radiation Emission Controls

  • From: Vishwas Kumar <vishwaskum@xxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Tue, 30 Jul 2013 21:32:13 +0530

pls remove my email address from mailing list. thanks


On Tue, Jul 30, 2013 at 9:31 PM, John Young <jya@xxxxxxxxxxxx> wrote:

> Sorry, I was not clear. Will try again.
>
> I did not mean to suggest Utah was an EM reception station but
> to query how NSA protected against its own apparatus emissions,
> sometimes overly simplified under the rubric of TEMPEST -- an
> ever shifting and refined technology.
>
> TEMPEST protection measures are known to be capturable and
> exploitable for counter-counter-spying. Not unlike encryption and
> anonymizers target their users.
>
> So, if NRAO is affected by its emissions and NSA has similar capabilities
> then it would protect against, harvest and analyze emissions similar to
> the way NRAO does, or more likely, much better. Harvesting the
> harvesters is common tradecraft as with counter-spying the
> counter-spies.
>
> However, the exquisite capabilities of NRAO-like antenna array are
> not common nor accessible to the general public -- there are at least
> three of these around the US and more overseas linked by super-fast
> scientific networks. Presumably they have lesser capabilities than
> those used by official spies, although mutual assistance is fairly
> common in educational institutions as in commerce, for the same
> profitable reasons, and as always, sacred cow national security.
>
> Reportedly a former NSA array was inherited by an educational
> institution to use out-dated equiment. The equipment still useful
> for NSA purposes had been removed, or so the story goes.
>
> It is hard to get information that is not deliberately leaked, redacted,
> fed to malleable outlets for editorial obfuscation, all this is now a
> major online industry amplified from the earlier analog distribution.
>
> Popularization of technical information is pretty well condemned
> to degradation for easy and avid public consumption. As with
> the latest NSA revelations, nearly all of which is recycled with
> dollops of "shocking" novelty, with a few documents seasoning
> the voluminous editorializing referring to lurid accounts yet to
> be revealed, or not. A congressional hearing tomorrow
> will feature this methodology avidly seeking eyeballs.
>
> Hopefully a few more of Snowden's documents will be released
> unseasoned by gravy of Greenwald's gravitas, but probably only
> teasing tidbits as during the past few weeks. Hang tight, books and
> documentaries and movies are in the works. Along with Assange's
> and Manning's emissions.
>
>  I doubt that the Utah Data Center is a "front end" for receiving
>> electromagnetic radio signals. Reception of those signals would be in
>> remote locations and sent via fiber optical links to the data center to be
>> stored and processed. NSA data centers do not need to be as free from radio
>> interference as radio astronomy reception locations.
>>
>> There are hardware hacks to pick up computer keyboard signal emanations.
>>  Does anyone the the Maker/Hacker community have a similar hack to pick out
>> digital camera signal output? Probably would be much easier to hack into
>> the picture as it is transmitted/transferred by cellphone radio than to
>> capture it from stray emanations in the actual process of taking photos.
>>
>> Given the amount of noise on almost all available radio bandwidth the
>> 'spark plug' problem should be mostly insignificant when compared to other
>> sources.
>>
>> --
>> All my email is subject to viewing by the Panopticon ::
>> https://en.wikipedia.org/wiki/**Panopticon<https://en.wikipedia.org/wiki/Panopticon>::
>> Except in the imaginations of the netizens there is no real secrecy or
>> privacy on the Internets. The powers that be have been elevated to lofty
>> positions of near omnipresence. Enjoy, adapt, and survive.
>>
>>
>>
>
>
>

Other related posts: