Talk:Radiofrequency MASINT

From Citizendium
Jump to navigation Jump to search
Fountain pen.png
NOTICE, please do not remove from top of page.
I released this article to Wikipedia. In particular, the identical text that appears there is of my sole authorship. Therefore, no credit for Wikipedia content on the Citizendium applies.
Check the history of edits to see who inserted this notice.

Just to be clear, while there were other authors in the edit history at Wikipedia, they only contributed to Wikipedia categories and metadata not brought to Citizendium.

Where would Ross Anderson's work on "soft tempest" [1] fit in? "Our innovation was a set of techniques that enable the software on a computer to control the electromagnetic radiation it emanates. This can be used for both attack and defence. To attack a system, malicious code can hide stolen information in the machine's Tempest emanations and optimise them for some combination of reception range, receiver cost and covertness. To defend a system, a screen driver can display sensitive information using fonts which minimise the energy of RF emanations." Sandy Harris 14:05, 8 June 2010 (UTC)

Sandy, I'll read the paper a little later today. Categorizing is a little difficult; compromising emanation attacks tend to be passive or at least side channel, although TEAPOT was active. This isn't active in quite the same way. It still should go into the article, though.
Incidentally, I stared a MASINT subgroup because there is very little organized MASINT on the net, and it might be a recruiting approach. Howard C. Berkowitz 15:20, 8 June 2010 (UTC)