PWN'D by SIGINT: Applied TEMPEST

Picture a workstation in a room with no networking capability and no unauthorized hardware. There isn't any way the data on this workstation can be compromised, right? Wrong. In this talk we'll examine compromising emissions, and developing signals intelligence gathering hardware against commercial off the shelf technology. We'll go over the theory behind TEMPEST, and demo a briefcase that can capture keystrokes through walls.

Presented by