Our feed is full of stories about the RF noise floor today, and with good reason. The ARRL reports on the International Amateur Radio Union Region 1 president, [Don Beattie, G3BJ] warning that in densely populated parts of Europe there is a danger that parts of the RF spectrum have become so swamped with noise as to be rendered unusable, while on the other side of the Atlantic we have RadioWorld reporting on similar problems facing AM broadcasting in the USA.
At issue are the usual suspects, interference from poorly shielded or suppressed domestic electronic devices, VDSL broadband, power-over-Ethernet, solar and wind power systems, and a host of other RF-spewing electronics. The combined emissions from all these sources have raised the noise level at some frequencies to the point at which it conceals all but the strongest signals. Any radio amateur will tell you that a station in a rural location will be electrically much quieter than one in a city, it seems that this effect has now reached a crescendo.
In the RadioWorld article, the author [Tom F. King] and his collaborator [Jack Sellmeyer] detail a series of tests they performed on a selection of lighting products from a quality brand, bought at a local Home Depot store. They were gathering data for a submission to the FCC enquiry on the noise floor issue we reported on last year. What they found was unsurprising, significant emissions from all the products they tested. They make some stiff recommendations to the FCC and other bodies concerned with radio spectrum to get tough with offending devices, to stay on top of future developments, and for operators of AM stations to pursue sources of interference.
It could be that there is so much equipment contributing to the noise floor that this battle is lost, but it doesn’t have to be this way. Anyone who has had to prepare a product to pass a properly carried out EMC test will tell you that the requirements are stringent, and it is thus obvious that many manufacturers are shipping products unworthy of the certification they display. It is to be hoped that the authorities will begin to take it seriously before it becomes an order of magnitude worse.
Compliance label image, Moppet65535 [CC BY-SA 3.0].
There is one man whose hour-long sessions in my company give me days of stress and worry. He can be found in a soundless and windowless room deep in the bowels of an anonymous building in a town on the outskirts of London. You’ve probably driven past it or others like it worldwide, without being aware of the sinister instruments that lie within.
The man in question is sometimes there to please the demands of the State, but there’s nothing too scary about him. Instead he’s an engineer and expert in electromagnetic compatibility, and the windowless room is a metal-walled and RF-proof EMC lab lined with ferrite tiles and conductive foam spikes. I’m there with the friend on whose work I lend a hand from time to time, and we’re about to discover whether all our efforts have been in vain as the piece of equipment over which we’ve toiled faces a battery of RF-related tests. As before when I’ve described working on products of this nature the specifics are subject to NDAs and in this case there is a strict no-cameras policy at the EMC lab, so yet again my apologies as any pictures and specifics will be generic.
There are two broadly different sets of tests which our equipment will face: RF radiation, and RF injection. In simple terms: what RF does it emit, and what happens when you push RF into it through its connectors and cables? We’ll look at each in turn as a broad overview pitched at those who’ve never seen inside an EMC lab, sadly there simply isn’t enough space in a Hackaday article to cover every nuance.
Continue reading “An Overview Of The Dreaded EMC Tests”
The police force in Evanston, Illinois had a problem on their hands. A mystery transmitter was blocking legal use of radio devices, car key fobs, cellphones, and other transmitters in an area of their city, and since it was also blocking 911 calls they decided to investigate it. Their first call for help went to the FCC who weren’t much use, telling them to talk to the manufacturers of the devices affected.
Eventually they approached the ARRL, the USA’s national amateur radio organisation, who sent along [Kermit Carlson, W9XA] to investigate. He fairly quickly identified the frequencies with the strongest interference and the likely spot from which it originated, and after some investigation it was traced to a recently replaced neon sign power supply. Surprisingly the supply was not replaced with a fault-free unit, its owner merely agreeing to turn it off should any further interference be reported.
The ARRL are highlighting this otherwise fairly unremarkable case to draw attention to the problem of devices appearing on the market with little or no pretence of electromagnetic compatibility compliance. In particular they are critical of the FCC’s lacklustre enforcement response in cases like this one. It’s a significant problem worldwide as huge numbers of very cheap switch-mode mains power supplies have replaced transformers in mains power applications, and in any center of population its effects can be readily seen with an HF radio in the form of a significantly raised RF noise floor. Though we have reported before on the FCC’s investigation of the noise floor problem we’d be inclined to agree with the ARRL that it is effective enforcement of EMC regulations that is key to the solution.
City of Evanston police vehicle picture, [Inventorchris] (CC BY-NC 2.0) via Flickr.
It looks like Lockheed Martin is the latest victim in what seems to be an endless string of security breaches. This time however, it does not look like a lack of security measures led to the breach. In fact, it seems that Lockheed’s implementation of a widely-trusted security tool was the attack vector this time around.
Last month we reported on the apparent compromise of RSA’s SecurID product, and while many speculated that this intrusion could lead to subsequent attacks, the firm downplayed the breach. They stated that the stolen data was unlikely to affect their customers, but as usual, the problem appears to be far larger than originally estimated.
The breadth of the intrusion is currently unknown, and with both RSA and Lockheed officials keeping mum, it may be some time before anyone knows how serious it is. When military secrets are in question however, you know it can’t be good!
SecurID is a two-factor hardware-based authentication system. It requires you to enter the number displayed on a hardware fob like the one seen above, along with the rest of your login information. It’s regarded to be a very secure method of protecting information when users are logging into a company’s secure system remotely. But as with everything else, there’s always a way to break the security. It sounds like last month someone hacked into the servers of the company that makes SecurID.
You’ll need to read between the lines of that letter from RSA (the security division of EMC) Executive Chairman [Art Coviello]. He admits that someone was poking around in their system and that they got their hands on information that relates to the SecurID system. He goes on to say that the information that the attackers grabbed doesn’t facilitate direct attacks on RSA’s customers.
We’d guess that the attackers may have what they need to brute-force a SecurID system, although perhaps they have now way to match which system belongs to which customer. What’s you’re take on the matter? Lets us know by leaving a comment.