PWN'D by SIGINT: Applied TEMPEST

DEF CON 20

Presented by: Random Devious, Phantomworks, Skunkworks
Date: Sunday July 29, 2012
Time: 13:00 - 13:50
Location: Skytalks

Picture a workstation in a room with no networking capability and no unauthorized hardware. There isn't any way the data on this workstation can be compromised, right? Wrong. In this talk we'll examine compromising emissions, and developing signals intelligence gathering hardware against commercial off the shelf technology. We'll go over the theory behind TEMPEST, and demo a briefcase that can capture keystrokes through walls.

Random Devious

Random Devious is a phone phreaker studying Audio Engineering. He has an extensive background in digital signal processing and reverse engineering.

Phantomworks

Phantomworks is an Electrical Engineering student who has years of industrial research and development experience involving integrated circuits and antennas.

Skunkworks

Skunkworks is a hardware hacker studying Electrical Engineering. He's spoken at multiple information security conferences in the past and has experience in pentesting, reverse engineering, parallel programming and antiforensics. In his free time he enjoys air cannons, tesla coils, and anything that goes bang or zap!


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats