ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Computer spy methods discovered
SAN FRANCISCO (Reuters) — By monitoring the flashes of LED lights on electronics equipment and the
indirect glow from monitors, scientists in the United States and the United Kingdom have discovered ways to
remotely eavesdrop on computer data.

Optical signals from the little flashing LED (light-emitting diode) lights, usually red and dotting everything
from modems to keyboards and routers, can be captured with a telescope and processed to reveal all the data
passing through the device, Joe Loughry, a computer programmer at Lockheed Martin Space Systems in
Denver, told Reuters Wednesday.

"It requires little apparatus, can be done at a considerable distance, and is completely undetectable," he writes in
his paper, "Information Leakage from Optical Emanations." "In effect, LED indicators act as little free-space
optical data transmitters, like fiber optics but without the fiber."

Not every LED-enabled device is at risk, though. Affected is equipment used in low-speed, long-distance
networks typically found in proprietary networks, such as ATM (automated teller machines) at banks, as
opposed to corporate local area networks or home Internet connections, Loughry said.

He said he was able to collect a strong optical signal from about 22 yards, using optical sensor equipment.

"It is interesting to walk around downtown at night in a large city and look up at the glass windows and you see
a lot of computers," Loughry said. "I've seen racks of equipment with LEDs on them visible from the street.
That's kind of what got me to pursue this."

Loughry began his research on LEDs in 1994 when he was a graduate student at Seattle University. Asked how
computer researchers could have overlooked for so long something that literally stares them in the face, he said:
"I guess nobody ever looked at it before.

"I was working very late one night and waiting for a long file transfer to complete and I was just staring at these
lights on the front of the modem and started to wonder if there was anything there," said Loughry.

The solutions are easy — locate equipment away from windows, put black tape over LEDs or de-activate them
when not in use. Equipment manufacturers also can modify the devices.

The paper is scheduled to be published later this year in the scientific journal for the Association for Computing
Machinery, called "ACM Transaction on Information and System Security."

His co-author is his former professor, David Umphress, now a software engineering professor at Alabama's
Auburn University.

More Related Content

What's hot (13)

Ethical issues in smart home application in smart
Ethical issues in smart home application in smartEthical issues in smart home application in smart
Ethical issues in smart home application in smart
AboubacarAhamadaRouf
Ìý
Sem 5 books-list
Sem 5 books-listSem 5 books-list
Sem 5 books-list
Harilal Hadiyal
Ìý
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
maranan_alexa
Ìý
Projecto Ingles
Projecto InglesProjecto Ingles
Projecto Ingles
YonAristizabal
Ìý
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
j9lai
Ìý
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
Ìý
Histrory
HistroryHistrory
Histrory
Muhammad Hussain
Ìý
ingles tecnico
ingles tecnicoingles tecnico
ingles tecnico
iupsm porlamar
Ìý
2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know
Raffa Learning Community
Ìý
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
Amey Naik
Ìý
Interaction system based on internet of things as support for education
Interaction system based on internet of things as support for educationInteraction system based on internet of things as support for education
Interaction system based on internet of things as support for education
JORGE GOMEZ
Ìý
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
jeremargwapo
Ìý
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual property
Tawfig Tawill
Ìý
Ethical issues in smart home application in smart
Ethical issues in smart home application in smartEthical issues in smart home application in smart
Ethical issues in smart home application in smart
AboubacarAhamadaRouf
Ìý
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
maranan_alexa
Ìý
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
j9lai
Ìý
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
Ìý
2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know
Raffa Learning Community
Ìý
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
Amey Naik
Ìý
Interaction system based on internet of things as support for education
Interaction system based on internet of things as support for educationInteraction system based on internet of things as support for education
Interaction system based on internet of things as support for education
JORGE GOMEZ
Ìý
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
jeremargwapo
Ìý
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual property
Tawfig Tawill
Ìý

Viewers also liked (9)

Trabajemos con la tecnologia imagenTrabajemos con la tecnologia imagen
Trabajemos con la tecnologia imagen
dalilaceballos
Ìý
DTC MD JNET Overview
DTC MD JNET OverviewDTC MD JNET Overview
DTC MD JNET Overview
Maggie Fawley
Ìý
Applebracelet
ApplebraceletApplebracelet
Applebracelet
Cin Buckelew
Ìý
Sofie_Henriksen_Letter_Recommendation
Sofie_Henriksen_Letter_RecommendationSofie_Henriksen_Letter_Recommendation
Sofie_Henriksen_Letter_Recommendation
Sofie Henriksen
Ìý
Certificate (8)
Certificate (8)Certificate (8)
Certificate (8)
Hannah LaChapelle
Ìý
Certificate 2014
Certificate 2014Certificate 2014
Certificate 2014
Ian Stuart
Ìý
Wright, Harold RM Certificate
Wright, Harold RM CertificateWright, Harold RM Certificate
Wright, Harold RM Certificate
Harold Wright
Ìý
Formato de gestión escolarFormato de gestión escolar
Formato de gestión escolar
gloriarojasilva
Ìý
CURACIÓN DE CONTENIDOSCURACIÓN DE CONTENIDOS
CURACIÓN DE CONTENIDOS
ISABELROSA888
Ìý
Trabajemos con la tecnologia imagenTrabajemos con la tecnologia imagen
Trabajemos con la tecnologia imagen
dalilaceballos
Ìý
DTC MD JNET Overview
DTC MD JNET OverviewDTC MD JNET Overview
DTC MD JNET Overview
Maggie Fawley
Ìý
Applebracelet
ApplebraceletApplebracelet
Applebracelet
Cin Buckelew
Ìý
Sofie_Henriksen_Letter_Recommendation
Sofie_Henriksen_Letter_RecommendationSofie_Henriksen_Letter_Recommendation
Sofie_Henriksen_Letter_Recommendation
Sofie Henriksen
Ìý
Certificate 2014
Certificate 2014Certificate 2014
Certificate 2014
Ian Stuart
Ìý
Wright, Harold RM Certificate
Wright, Harold RM CertificateWright, Harold RM Certificate
Wright, Harold RM Certificate
Harold Wright
Ìý
Formato de gestión escolarFormato de gestión escolar
Formato de gestión escolar
gloriarojasilva
Ìý
CURACIÓN DE CONTENIDOSCURACIÓN DE CONTENIDOS
CURACIÓN DE CONTENIDOS
ISABELROSA888
Ìý

Similar to Comp computer spy methods discovered (20)

Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
WhoGoesThere
Ìý
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
ijwmn
Ìý
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
ijwmn
Ìý
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
AbhishekTekavade1
Ìý
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming report
Bilal Maqbool ツ
Ìý
PhD Admission Pitching
PhD Admission PitchingPhD Admission Pitching
PhD Admission Pitching
Alexandru IOVANOVICI
Ìý
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
Davide Del Monte
Ìý
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
KanagarajanSwamiappa
Ìý
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
binuvijay1
Ìý
EET230_ResearchPaper.docx
EET230_ResearchPaper.docxEET230_ResearchPaper.docx
EET230_ResearchPaper.docx
stanleyjohn18
Ìý
Eet230 research paper
Eet230 research paperEet230 research paper
Eet230 research paper
stanleyjohn18
Ìý
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGS
binuvijay1
Ìý
Privacy and Ubiquitous Computing
Privacy and Ubiquitous ComputingPrivacy and Ubiquitous Computing
Privacy and Ubiquitous Computing
mikeart
Ìý
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
Desiree Miloshevic
Ìý
The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.
Rohit Agrawal
Ìý
DRC PMC IOTgghhhhhhhhhhhhhhhhhhhhhhhhbhh
DRC PMC IOTgghhhhhhhhhhhhhhhhhhhhhhhhbhhDRC PMC IOTgghhhhhhhhhhhhhhhhhhhhhhhhbhh
DRC PMC IOTgghhhhhhhhhhhhhhhhhhhhhhhhbhh
supriyaharlapur1
Ìý
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.
Laurie Lamberth
Ìý
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
JohnsmithAlberto2
Ìý
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
Charith Perera
Ìý
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
The Marketing Distillery
Ìý
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
WhoGoesThere
Ìý
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
ijwmn
Ìý
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
ijwmn
Ìý
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming report
Bilal Maqbool ツ
Ìý
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
Davide Del Monte
Ìý
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
KanagarajanSwamiappa
Ìý
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
binuvijay1
Ìý
EET230_ResearchPaper.docx
EET230_ResearchPaper.docxEET230_ResearchPaper.docx
EET230_ResearchPaper.docx
stanleyjohn18
Ìý
Eet230 research paper
Eet230 research paperEet230 research paper
Eet230 research paper
stanleyjohn18
Ìý
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGS
binuvijay1
Ìý
Privacy and Ubiquitous Computing
Privacy and Ubiquitous ComputingPrivacy and Ubiquitous Computing
Privacy and Ubiquitous Computing
mikeart
Ìý
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
Desiree Miloshevic
Ìý
The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.
Rohit Agrawal
Ìý
DRC PMC IOTgghhhhhhhhhhhhhhhhhhhhhhhhbhh
DRC PMC IOTgghhhhhhhhhhhhhhhhhhhhhhhhbhhDRC PMC IOTgghhhhhhhhhhhhhhhhhhhhhhhhbhh
DRC PMC IOTgghhhhhhhhhhhhhhhhhhhhhhhhbhh
supriyaharlapur1
Ìý
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.
Laurie Lamberth
Ìý
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
JohnsmithAlberto2
Ìý
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
Charith Perera
Ìý
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
The Marketing Distillery
Ìý

More from Vanderlei Nascimento (20)

Esquema de ouro da mega sena otimoEsquema de ouro da mega sena otimo
Esquema de ouro da mega sena otimo
Vanderlei Nascimento
Ìý
Dremel mini mite_manualDremel mini mite_manual
Dremel mini mite_manual
Vanderlei Nascimento
Ìý
Curso medicina naturalCurso medicina natural
Curso medicina natural
Vanderlei Nascimento
Ìý
Bpf ervas medicinaisBpf ervas medicinais
Bpf ervas medicinais
Vanderlei Nascimento
Ìý
26 dicas saúde_medicina_oriental26 dicas saúde_medicina_oriental
26 dicas saúde_medicina_oriental
Vanderlei Nascimento
Ìý
Bpf ervas medicinaisBpf ervas medicinais
Bpf ervas medicinais
Vanderlei Nascimento
Ìý
A bíblia vivaA bíblia viva
A bíblia viva
Vanderlei Nascimento
Ìý
7 shortcuts to_six_pack_abs
7 shortcuts to_six_pack_abs7 shortcuts to_six_pack_abs
7 shortcuts to_six_pack_abs
Vanderlei Nascimento
Ìý
Absolute hot-yoga-pose-chart
Absolute hot-yoga-pose-chartAbsolute hot-yoga-pose-chart
Absolute hot-yoga-pose-chart
Vanderlei Nascimento
Ìý
26 dicas saúde_medicina_oriental26 dicas saúde_medicina_oriental
26 dicas saúde_medicina_oriental
Vanderlei Nascimento
Ìý
Revista info exame 2005 janeiro  50 coisas bacanas para fazer com o pc sem ga...Revista info exame 2005 janeiro  50 coisas bacanas para fazer com o pc sem ga...
Revista info exame 2005 janeiro 50 coisas bacanas para fazer com o pc sem ga...
Vanderlei Nascimento
Ìý
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...
Vanderlei Nascimento
Ìý
Lista de programas_freewareLista de programas_freeware
Lista de programas_freeware
Vanderlei Nascimento
Ìý
Identifying electronic components u c hobby
Identifying electronic components   u c hobbyIdentifying electronic components   u c hobby
Identifying electronic components u c hobby
Vanderlei Nascimento
Ìý
Guia como se faz   montagem, manutençao e instalaçao de computadoresGuia como se faz   montagem, manutençao e instalaçao de computadores
Guia como se faz montagem, manutençao e instalaçao de computadores
Vanderlei Nascimento
Ìý
Glossário da internet e tipos de arquivos   prof belfortGlossário da internet e tipos de arquivos   prof belfort
Glossário da internet e tipos de arquivos prof belfort
Vanderlei Nascimento
Ìý
Dicas  50 soluções para os problemas mais enervantes do pcDicas  50 soluções para os problemas mais enervantes do pc
Dicas 50 soluções para os problemas mais enervantes do pc
Vanderlei Nascimento
Ìý
Criando um ponto de restauraçãoCriando um ponto de restauração
Criando um ponto de restauração
Vanderlei Nascimento
Ìý
Como fazer uma bela limpeza de arquivos no pcComo fazer uma bela limpeza de arquivos no pc
Como fazer uma bela limpeza de arquivos no pc
Vanderlei Nascimento
Ìý
Como clonar h ds e fazer backup sem precisar do ghostComo clonar h ds e fazer backup sem precisar do ghost
Como clonar h ds e fazer backup sem precisar do ghost
Vanderlei Nascimento
Ìý
Esquema de ouro da mega sena otimoEsquema de ouro da mega sena otimo
Esquema de ouro da mega sena otimo
Vanderlei Nascimento
Ìý
Dremel mini mite_manualDremel mini mite_manual
Dremel mini mite_manual
Vanderlei Nascimento
Ìý
Curso medicina naturalCurso medicina natural
Curso medicina natural
Vanderlei Nascimento
Ìý
Bpf ervas medicinaisBpf ervas medicinais
Bpf ervas medicinais
Vanderlei Nascimento
Ìý
26 dicas saúde_medicina_oriental26 dicas saúde_medicina_oriental
26 dicas saúde_medicina_oriental
Vanderlei Nascimento
Ìý
Bpf ervas medicinaisBpf ervas medicinais
Bpf ervas medicinais
Vanderlei Nascimento
Ìý
A bíblia vivaA bíblia viva
A bíblia viva
Vanderlei Nascimento
Ìý
Absolute hot-yoga-pose-chart
Absolute hot-yoga-pose-chartAbsolute hot-yoga-pose-chart
Absolute hot-yoga-pose-chart
Vanderlei Nascimento
Ìý
26 dicas saúde_medicina_oriental26 dicas saúde_medicina_oriental
26 dicas saúde_medicina_oriental
Vanderlei Nascimento
Ìý
Revista info exame 2005 janeiro  50 coisas bacanas para fazer com o pc sem ga...Revista info exame 2005 janeiro  50 coisas bacanas para fazer com o pc sem ga...
Revista info exame 2005 janeiro 50 coisas bacanas para fazer com o pc sem ga...
Vanderlei Nascimento
Ìý
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...
Vanderlei Nascimento
Ìý
Lista de programas_freewareLista de programas_freeware
Lista de programas_freeware
Vanderlei Nascimento
Ìý
Identifying electronic components u c hobby
Identifying electronic components   u c hobbyIdentifying electronic components   u c hobby
Identifying electronic components u c hobby
Vanderlei Nascimento
Ìý
Guia como se faz   montagem, manutençao e instalaçao de computadoresGuia como se faz   montagem, manutençao e instalaçao de computadores
Guia como se faz montagem, manutençao e instalaçao de computadores
Vanderlei Nascimento
Ìý
Glossário da internet e tipos de arquivos   prof belfortGlossário da internet e tipos de arquivos   prof belfort
Glossário da internet e tipos de arquivos prof belfort
Vanderlei Nascimento
Ìý
Dicas  50 soluções para os problemas mais enervantes do pcDicas  50 soluções para os problemas mais enervantes do pc
Dicas 50 soluções para os problemas mais enervantes do pc
Vanderlei Nascimento
Ìý
Criando um ponto de restauraçãoCriando um ponto de restauração
Criando um ponto de restauração
Vanderlei Nascimento
Ìý
Como fazer uma bela limpeza de arquivos no pcComo fazer uma bela limpeza de arquivos no pc
Como fazer uma bela limpeza de arquivos no pc
Vanderlei Nascimento
Ìý
Como clonar h ds e fazer backup sem precisar do ghostComo clonar h ds e fazer backup sem precisar do ghost
Como clonar h ds e fazer backup sem precisar do ghost
Vanderlei Nascimento
Ìý

Comp computer spy methods discovered

  • 1. Computer spy methods discovered SAN FRANCISCO (Reuters) — By monitoring the flashes of LED lights on electronics equipment and the indirect glow from monitors, scientists in the United States and the United Kingdom have discovered ways to remotely eavesdrop on computer data. Optical signals from the little flashing LED (light-emitting diode) lights, usually red and dotting everything from modems to keyboards and routers, can be captured with a telescope and processed to reveal all the data passing through the device, Joe Loughry, a computer programmer at Lockheed Martin Space Systems in Denver, told Reuters Wednesday. "It requires little apparatus, can be done at a considerable distance, and is completely undetectable," he writes in his paper, "Information Leakage from Optical Emanations." "In effect, LED indicators act as little free-space optical data transmitters, like fiber optics but without the fiber." Not every LED-enabled device is at risk, though. Affected is equipment used in low-speed, long-distance networks typically found in proprietary networks, such as ATM (automated teller machines) at banks, as opposed to corporate local area networks or home Internet connections, Loughry said. He said he was able to collect a strong optical signal from about 22 yards, using optical sensor equipment. "It is interesting to walk around downtown at night in a large city and look up at the glass windows and you see a lot of computers," Loughry said. "I've seen racks of equipment with LEDs on them visible from the street. That's kind of what got me to pursue this." Loughry began his research on LEDs in 1994 when he was a graduate student at Seattle University. Asked how computer researchers could have overlooked for so long something that literally stares them in the face, he said: "I guess nobody ever looked at it before. "I was working very late one night and waiting for a long file transfer to complete and I was just staring at these lights on the front of the modem and started to wonder if there was anything there," said Loughry. The solutions are easy — locate equipment away from windows, put black tape over LEDs or de-activate them when not in use. Equipment manufacturers also can modify the devices. The paper is scheduled to be published later this year in the scientific journal for the Association for Computing Machinery, called "ACM Transaction on Information and System Security." His co-author is his former professor, David Umphress, now a software engineering professor at Alabama's Auburn University.