1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Physical prongs on input/out circuits?

Discussion in 'PC Hardware' started by SpywareDr, 2015/08/05.

  1. 2015/08/05
    SpywareDr

    SpywareDr SuperGeek WindowsBBS Team Member Thread Starter

    Joined:
    2005/12/31
    Messages:
    3,752
    Likes Received:
    338
    Reuters.com > U.S. researchers show computers can be hijacked to send data as sound waves

    :confused: What physical prongs on input/output circuits?
     
  2. 2015/08/05
    retiredlearner

    retiredlearner SuperGeek WindowsBBS Team Member

    Joined:
    2004/06/25
    Messages:
    7,158
    Likes Received:
    502
    That's too secret to tell/show us Doc. :D Neil.
     

  3. to hide this advert.

  4. 2015/08/05
    antik

    antik Well-Known Member

    Joined:
    2008/01/15
    Messages:
    365
    Likes Received:
    26
    by turning GPIO or UART pins on and off, emanates a signal picked up on a AM radio

    https://github.com/funtenna/REF_DESIGN

    Cui has posted video showing transmitted data from a Pantum laser printer:

    https://player.vimeo.com/video/135270882

    "wires and components of the device can be turned into a radio transmitter "

    "he made a laser printer infected by the malware "sing" for the reporter. "

    "ultrasounds that can’t be heard, and radio signals, can be modulated to transmit data out of the printer, and out of the building, to a nearby receiver "

    "...we demonstrate implementations of Funtenna as small software implants within several ubiquitous embedded devices, such as VoIP phones and printers, and in common computer peripherals, such as hard disks, console ports, network interface cards... "

    "you can send software into machine, transmit data out, and if you want to erase your presence you just delete the software "

    http://motherboard.vice.com/read/how-to-turn-a-cheap-printer-into-a-stealthy-bugging-device
     
    Last edited: 2015/08/05
  5. 2015/08/06
    SpywareDr

    SpywareDr SuperGeek WindowsBBS Team Member Thread Starter

    Joined:
    2005/12/31
    Messages:
    3,752
    Likes Received:
    338
    ;)

    --

    Thanks antik. Must have been their revised definition of "prong" that had me confused.

    Merriam-Webster.com: prong
     
  6. 2015/08/06
    antik

    antik Well-Known Member

    Joined:
    2008/01/15
    Messages:
    365
    Likes Received:
    26
    You are welcome.

    This kind of attack is the stuff of bad dreams, bringing new meaning to the phrase "ghost in the machine ". The embedded link to badBIOS at the end of the Motherboard piece is a treasure. Maybe the reporter was subconsciously thinking "We're all forked! "

    Very applicable to industrial espionage, and attacking the power grid. In the opening days of the next war, there could be a new flavor of "shock and awe," when we feel the sharp end of the prong.

    Sorry. Can't help myself. :)
     
    Last edited: 2015/08/06
  7. 2015/08/06
    SpywareDr

    SpywareDr SuperGeek WindowsBBS Team Member Thread Starter

    Joined:
    2005/12/31
    Messages:
    3,752
    Likes Received:
    338
  8. 2015/08/06
    Bill

    Bill SuperGeek WindowsBBS Team Member

    Joined:
    2002/01/11
    Messages:
    3,332
    Likes Received:
    389
    This is nothing new! In the early 70s, I was trained on countermeasures for such emanations as a communications equipment technician in the USAF.

    See TechTarget: TEMPEST and Wikipedia: TEMPEST.
     
    Bill,
    #7
  9. 2015/08/06
    antik

    antik Well-Known Member

    Joined:
    2008/01/15
    Messages:
    365
    Likes Received:
    26
    Sean Gallagher at ars technica makes the TEMPEST connection in his Cui funtenna article today.

    (Quote) "Building on a long history of research into TEMPEST emanations... "
     
  10. 2015/08/07
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,068
    Likes Received:
    396
    As Bill stated, it's nothing new.
    In fact, in the early 90s the govt had technology whereby a device could be pointed at a monitor from a distance, say across the street, and whatever was seen on the monitor could be duplicated on their screen.

    A friend of mine developed a device that blocked the probe, it would scramble the screen content and also turn it upside down.
     
  11. 2015/08/07
    Bill

    Bill SuperGeek WindowsBBS Team Member

    Joined:
    2002/01/11
    Messages:
    3,332
    Likes Received:
    389
    You can even use a laser beam focused on a window and hear what is going on in the room by interpreting the vibrations in the window glass.

    Receivers used in secure communications systems had to have special shielding because the IF used in the receivers actually transmitted the "intelligence" (data) during the heterodyne process. Yes, the badguy had to be fairly close, but with sophisticated high-gain directional antennas, they could still be a couple 100 yards away.

    Electric typewriters even emitted signals that could be detected and reveal what was being typed.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.