TEMPEST: A Signal Problem

TEMPEST is the covername used by the NSA and other agencies to talk about emissions from computing machinery that can divulge what the equipment is processing. We’ve covered a few projects in the past that specifically intercept EM radiation. TEMPEST for Eliza can transmit via AM using a CRT monitor, and just last Fall a group showed how to monitor USB keyboards remotely. Through the Freedom of Information Act, an interesting article from 1972 has been released. TEMPEST: A Signal Problem (PDF link dead, try Internet Archive version) covers the early history of how this phenomenon was discovered. Uncovered by Bell Labs in WWII, it affected a piece of encryption gear they were supplying to the military. The plaintext could be read over that air and also by monitoring spikes on the powerlines. Their new, heavily shielded and line filtered version of the device was rejected by the military who simply told commanders to monitor a 100 feet around their post to prevent eavesdropping. It’s an interesting read and also covers acoustic monitoring. This is just the US history of TEMPEST though, but from the anecdotes it sounds like their enemies were not just keeping pace but were also better informed.

[via Schneier]

WiFi Theremin

The fine folks at Midnight Research Labs have put together a new toy for you to play with. It’s a Python script that makes your WiFi hardware behave more like a theremin. Based on the pyaudio library it monitors the signal strength of the AP you’re connected to and changes the tone accordingly. There’s a sample embedded above (direct link). If you have a second interface, you can use it to modulate the volume. It’s an interesting trick, but they say that there’s enough latency that it would be hard to play actual music with it.

External Antenna On Panasonic CF-R1

ext_ant

[Steven] managed to get his hands on a Panasonic CF-R1 for pretty cheap. Though it is a decently powerful machine, it was built in 2002 and didn’t come with an internal wireless card.  It did, however have a mini-PCI slot.  [Steven] promptly installed a wireless card, but found the internal antenna lacking. The solution was to custom mount an external antenna. Mounting it was fairly easy, he removed the phone jack and epoxied the connector in its place. The reception was greatly improved. He says he went from seeing 6 access points to 31 as soon as he installed it. Similar things have been done to the Eee PC 900.

Hack A Walkie Talkie For Music

radio1

[nepheron] shows us how he hacked his walkie talkie to broadcast music. While using this to broadcast music is possibly illegal, it could be used to make actual upgrades to your system as well. He has replaced the microphone input with a headphone cable and extended the antenna. It is only mono, and he states it will only run for a minute before shutting off, so there is definitely room for improvement.

Wireless BlinkM Control

blinkm

[John] has been working with several BlinkM RGB devices. He’s created a controller to talk to each of the BlinkMs wirelessly and change their behavior. The core is an old relay tester box used to test telephone circuits. Each of its four knobs are connected to the analog inputs on the Arduino. The signal is transmitted using RFlink devices. Each BlinkM is paired with an ATmega168 and receiver. The control box also has a switch to send the same signal to all of the devices at the same time. The transmit and receive code are available on his site. You can find a video of it embedded below.

Continue reading “Wireless BlinkM Control”

Bug Labs Introduces New BUGmodules

bug

Bug Labs, the company that makes modular electronics that allow you to build your own tech doohickeys quickly and easily, has announced five new modules: BUGprojector, a mini DLP projector developed in conjunction with Texas Instruments, which sounds very much like the tiny DLP projector we posted about last week; BUGsound, an audio processing module with four stereo input/output jacks, a microphone, a speaker, and builtin hardware codecs; BUGbee (802.15.4) and BUGwifi (802.11 and Bluetooth 2.0+EDR), which will let you connect wirelessly with your PAN and WLAN, respectively; and BUG3g GSM, for connecting to (you guessed it) 3G GSM networks. In conjunction with Bug Labs’ existing series of modules, especially the highly versatile BUGvonHippel universal module, you’ll be able to create some pretty kickass gadgets. No word yet on pricing, although Bug Labs expects to ship by the end of Q1 2009.

25C3: State Of The Art Wearable Computing

wearable-1

[Kai Kunze] from the Embedded Systems Lab at Passau came to 25C3 to talk about Cyborgs and Gargoyles: State of the Art in Wearable Computing. There have been a lot of homebrew wearable computing solutions, but [Kai] covered specifically projects that could see everyday use in the real world.

Continue reading “25C3: State Of The Art Wearable Computing”