Video eavesdropping- RF



Similar documents
KBA Oktatási Kft OKÉV nyilvántartási szám:

DSA800 Series Spectrum Analyzer

EMC STANDARDS STANDARDS AND STANDARD MAKING BODIES. International. International Electrotechnical Commission (IEC)

RFSPACE CLOUD-IQ #CONNECTED SOFTWARE DEFINED RADIO

AN Application Note: FCC Regulations for ISM Band Devices: MHz. FCC Regulations for ISM Band Devices: MHz

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

USB 3.0* Radio Frequency Interference Impact on 2.4 GHz Wireless Devices

Amplifier for Small Magnetic and Electric Wideband Receiving Antennas (model AAA-1B)

'Possibilities and Limitations in Software Defined Radio Design.

Application Note: Spread Spectrum Oscillators Reduce EMI for High Speed Digital Systems

HF Receiver Testing. Issues & Advances. (also presented at APDXC 2014, Osaka, Japan, November 2014)

Spectrum analyzer with USRP, GNU Radio and MATLAB

Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz)

for Communication Systems Protection EMI CD-ROM INCLUDED

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

MEASUREMENT UNCERTAINTY IN VECTOR NETWORK ANALYZER

Jeff Thomas Tom Holmes Terri Hightower. Learn RF Spectrum Analysis Basics

Embedded FM/TV Antenna System

Measurement of RF Emissions from a Final Coat Electronics Corrosion Module

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B

Optimizing IP3 and ACPR Measurements

AN003. Evaluation of Anechoic Chambers For EMC Measurements Using A CNE. Overview. CNE III 9kHz to 2GHz Conducted and radiated output

Data Transmission. Raj Jain. Professor of CIS. The Ohio State University. Columbus, OH

EMC Standards: Standards of good EMC engineering

Tx/Rx A high-performance FM receiver for audio and digital applicatons

DDX 7000 & Digital Partial Discharge Detectors FEATURES APPLICATIONS

Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz)

INTRODUCTION FIGURE 1 1. Cosmic Rays. Gamma Rays. X-Rays. Ultraviolet Violet Blue Green Yellow Orange Red Infrared. Ultraviolet.

Some Measurements on DVB-T Dongles with E4000 and R820T Tuners:

Welcome. Rulon VanDyke RF System Architect, Agilent Technologies. David Leiss Senior RF Simulation Consultant, Agilent Technologies

Evolution of Satellite Communication Systems

ACRS 2.0 User Manual 1

Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities

Flexible PCB Antenna with Cable Integration Application Note Version 2

A Guide to Calibrating Your Spectrum Analyzer

AVX EMI SOLUTIONS Ron Demcko, Fellow of AVX Corporation Chris Mello, Principal Engineer, AVX Corporation Brian Ward, Business Manager, AVX Corporation

Electromagnetic Compatibility Considerations for Switching Power Supplies

About Me" List of Lectures" In This Course" Mobile and Sensor Systems. Lecture 1: Introduction to Wireless Systems" " Dr. Cecilia Mascolo" "

How To Sell A Talan

Broadband over Power Line (BPL) Test Procedures and Equipment Authorization

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

EECC694 - Shaaban. Transmission Channel

ETSI EN V1.2.1 ( )

Jeff Thomas Tom Holmes Terri Hightower. Learn RF Spectrum Analysis Basics

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Application Note Noise Frequently Asked Questions

Clamp Filters that Suppress Emission Noise Provide Immunity Against Surge Noise

Raptor RXi Ultra-fast scanning Countersurveillance Receiver

Maximizing Receiver Dynamic Range for Spectrum Monitoring

RF Network Analyzer Basics

Features. Applications. Transmitter. Receiver. General Description MINIATURE MODULE. QM MODULATION OPTIMAL RANGE 1000m

EN v1.2.1 TEST REPORT FOR ag/Draft n WLAN PCI-E Mini Card MODEL NUMBER: BCM94322MC REPORT NUMBER: 07U

Demonstration of a Software Defined Radio Platform for dynamic spectrum allocation.

Interpreting the Information Element C/I

Agilent AN 1315 Optimizing RF and Microwave Spectrum Analyzer Dynamic Range. Application Note

Technical Datasheet Scalar Network Analyzer Model MHz to 40 GHz

Antenna Trainer EAN. Technical Teaching Equipment INTRODUCTION

MODULATION Systems (part 1)

Report Of. Shielding Effectiveness Test For. SafeSleeve Radiation Shielding Technology. Test Date(s): June 07 June 09, 2015

Applications in EMC testing. Outline. Antennas for EMC Testing. Terminology

Understanding Range for RF Devices

Study of RF Spectrum Emissions in High Pressure Sodium and Metal Halide Lamps. Lawrence P. Glaister VE7IT, Automation Engineer.

Frequently Asked Questions

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

5 in 1 DVB-T Transmitter & Dual Cast Agile Digital Transposer TV EQUIPMENT

RF Communication System. EE 172 Systems Group Presentation

Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?

ELEMENTS OF CABLE TELEVISION

Test Report. Prepared for: Technologic Systems, Inc. Model: TS-8820

Tri-Band RF Transceivers for Dynamic Spectrum Access. By Nishant Kumar and Yu-Dong Yao

DDX 7000 & Digital Partial Discharge Detectors FEATURES APPLICATIONS

Impedance Matching and Matching Networks. Valentin Todorow, December, 2009

UNDERSTANDING AND CONTROLLING COMMON-MODE EMISSIONS IN HIGH-POWER ELECTRONICS

TEST REPORT EN (1997) +A1 (2001)

Implementing Digital Wireless Systems. And an FCC update

R&S FSW signal and spectrum analyzer: best in class now up to 50 GHz

General Survey of Radio Frequency Bands 30 MHz to 3 GHz

Network analyzer and spectrum analyzer two in one

Rated Power(W) 8W 2. EG-LED W 3. EG-LED W

Turbo X channel UHF true diversity

IFI5481: RF Circuits, Theory and Design

Application Note Receiving HF Signals with a USRP Device Ettus Research

PRO 5000 CPE 1D Quick Installation Guide

Harmonics and Noise in Photovoltaic (PV) Inverter and the Mitigation Strategies

Wireless Communication and RF System Design Using MATLAB and Simulink Giorgia Zucchelli Technical Marketing RF & Mixed-Signal

Note monitors controlled by analog signals CRT monitors are controlled by analog voltage. i. e. the level of analog signal delivered through the

RECOMMENDATION ITU-R SM Measuring sideband emissions of T-DAB and DVB-T transmitters for monitoring purposes

Topics in Security: Forensic Signal Analysis

RF EXPOSURE LIMITS AND TESTING REQUIREMENTS

FREQUENCY ASSIGNMENT REQUIREMENTS FOR THE LAND MOBILE SERVICE

A Study of RF Absorber for Anechoic Chambers Used in the Frequency Range for Power Line Communication System

EMC-conform development of a Tablet-PC

The front end of the receiver performs the frequency translation, channel selection and amplification of the signal.

Next Generation of High Speed. Modems8

Deviser DS2800 Handheld Digital TV Spectrum Analyser

Lynx Broadband Installation Manual for Residential Packages with a 20 db Amp Quick Start Guide (first two pages)

Low-cost EMI Pre-compliance Testing Using a Spectrum Analyzer

RF data receiver super-reactive ASK modulation, low cost and low consumption ideal for Microchip HCS KEELOQ decoder/encoder family. 0.

Transcription:

Security : Forensic Signal Analysis: MPHIL ACS 2009 Security : Forensic Signal Analysis Video eavesdropping- RF Y.K. Roland Tai 1. Introduction 2. History of TEMPEST 3. Type of RF leakages 4. Counter-measures. 5. Experiment & Demo 1

Phenomenon of video eavesdropping 1. All electronics equipment emit RF emissions 2. Classified information may ride onto these emission and be rebroadcasted. Electromagnetic RF emissions Rx antenna Attacker X distance Security : Forensic Signal Analysis: MPHIL ACS 2009 History * Information extracted from paper Soft Tempest: Hidden data Transmission Using Electromagnetic emanations. 2

http://img393.imageshack.us/i/b28ck.jpg/ Passive Attack Attacks use available electromagnetic RF signal. 1. Leakage through conduction. E.gPipes, signal cables. (Near field coupling) 2. Leakage through RFsignal.(Far field radiation) 3

Leakage Through RF All monitors emit weak TV signal 1.UHF or VHF radio modulated with distorted version of displayed image 2.Emissions can be reconstructed using a good broadband receiver 3.LCD monitors are also vulnerable 4.Serial cable (acts as radiating antenna) from LCD carries video signal 3. Leakage through RF (Direct radiation leakage) Typical Attack scenario F1 Non-intrusive Attack with use of high Gain antenna Classified information Unintended Leakage signal F1 F1 Detection system Note: Assume F1 is one of the Compromising emanation frequencies 4

4. Leakage through RF (Non-linear intermodulation radiation leakage) Classified information F1 Non-intrusive Attack with use of high Gain antenna F2 F3 F3 Detection system Non-linear mixing Where F3 is the intermod frequency. F3= F2+F1 or F3 = F2-F1 Leakage Through Conduction 1. Equipment based fax Ethernet cables RS-232 2. Infrastructure based (Buildings) 1. Power cables 2. Telephone lines 3. Metallic piping 5

1. Leakage through conduction (Direct conduction leakage) Typical Attack scenario Detection system Common cable connection points e.g. Power line, LAN cable, Telephone cable Non-intrusive Attack with use of current sensor 2. Leakage through conduction (Radiated conduction leakage) Common cable connection points Un Classified information Detection system Radiated Non-intrusive Attack with use of current sensor 6

Vulnerability levels of Computer equipment Note: Quote from paper: Countermeasures to Prevent Eavesdropping on Unintentional Emanations from Personal Computers Video timing 1. Actual video contents 2. H-Sync pulses (48kHz, 80kHz etc) One line of information 3. Vertical sync pulses (60Hz, 75Hz, 100Hz etc.) Entire frame 7

Video timing of Display monitor Blanking pulses Front porch Back porch * *Extracted : presentation slides Electromagnetic eavesdropping on computers, Markus Kuhn Series of Equidistant Dirac Series of Equidistant Dirac with reciprocal distance FT FT Single pixel Rectangular pulse Sinc function 8

Video pixel information Sampling at rate of fp * Samples of video information appearing across the entire spectrum at very fp frequency. *Extracted : presentation slides Electromagnetic eavesdropping on computers, Markus Kuhn 9

*Extracted : presentation slides Electromagnetic eavesdropping on computers, Markus Kuhn Video Detection System DSI TEMPEST Receivers 1.Receive antenna 2.Receiver of at least 10MHz Bandwidth Reject all other transmissions Amplify Every fp frequency Bw> =10MHz 10

Trade off between image reconstruct quality with receiver Bandwidth. Higher bandwidth will have higher noise level. *Electromagnetic eavesdropping on computers, Markus Kuhn Detection System built in the past TV aerial Markus Kuhn Van Eck Receivers Target PC Sync Generation units 11

Actual Detection System Detection is a challenge in the fully occupied radio spectrum. Random noise from the external environment. Requires at least S/N ratio of 10dB. Periodic averaging to improve S/N of the video image http://www.youtube.com/watch?v=yctm0dqvz14&feature=related Semi-Anechoic chamber to provide a clean spectrum for detailed analysis Measurement of TEMPEST signals EMRL chamber in NTU 10m 9kHz to 18GHz 12

Effective radiator Every traces on the PCB carries current. The amount of radiation depends:- 1.Speed of transitions 2. The length of the traces. e.g. for 30MHz the length must be at least 2.5m for it to emit effectively. λ = c f Where : c = speed of light f= frequency λ = lamda TheEand thehfields are not in phase and orthogonal to each other producing inductive or capacitive load TheEand thehfields will then be in phase and orthogonal to each other producing plane waves R < R >> 13

RF attenuation over distance 1/r RF attenuation over distance Free Space Loss = 32.45 + 20log(d) + 20log(f)dB (where dis in km and fis in MHz) FSPL is a function of dand f *For every twice in distance increase we will have 6dB of RF attenuation. 14

Do we have to work inside a shielded box??? Laptop inside Shielded fabric Both hands inside Source image from : to prevent keyboards emission http://rayannelutenerblog.files.wordpress.com/2008/06/body-laptop-interface-lorax.jpg Mitigation measures Shielded fabric tent Wide band jammer Shielded PC or laptop 15

Mitigation measures Architectural shielding 3M shielded film Mitigation measures Signal Jamming?? *Countermeasures to prevent eavesdropping on Unintentional Emanations from personal computer 16

Mitigation measures Mitigation measures Software 1.Soft fonts 2.Message hiding (Dithering) 17

Mitigation measures 1.Soft fonts ( Low pass Filtering) Markus Kuhn and Ross Anderson, University of Cambridge Conventional fonts Filtered (30% of horizontal spectrum) *Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations, Markus Kuhn and Ross Anderson. University of Cambridge Mitigation measures 1.Soft fonts Normal text With Soft-fonts *Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations, Markus Kuhn and Ross Anderson. 18

Mitigation measures 1.Soft fonts (Gaussian and Low Pass Filters) Original Text SONY VAIO PCG-V505 notebook 21 inch CRT NANAO FlexScan 77F *Evaluation and Improvement of the Tempest Fonts Hidema Tanaka, Osamu Takizawa, and Akihiro Yamamura National Institute of Information and Communications Technology Mitigation measures 2.Message hiding (Dithering) 1. High frequency BLACK/WHITE dither pattern creates strongest signal with highest emission. 2. Constant color provide the minimize emissions 19

Miniaturize Detection system Software Define Radio (SDR) -Advancement in digital electronics Where hardware like ADC, mixer, modulator and demodulator can be implemented in Software. Gnuradioprovides some available software. Technical specifications 20

Experiment using the ETTus USRP2 Target IF out Extract to Matlab LAN Port 21

Target laptop : Toshiba CDX 440 Display resolution: 800 x 600 Xt= 1056 and yt=628 Dynamic science receiver Center frequency = 350 MHz Bandwidth = 20MHz SDR was set to capture the IF output signal at frequency of 30MHz with sampling rate of about 25Msamples/sec. Raster the image using the absolute values of I and Q 22

Raster the image using the complex I and Q DEMO 23