SlideShare uma empresa Scribd logo
1 de 1
Computer spy methods discovered
SAN FRANCISCO (Reuters) — By monitoring the flashes of LED lights on electronics equipment and the
indirect glow from monitors, scientists in the United States and the United Kingdom have discovered ways to
remotely eavesdrop on computer data.

Optical signals from the little flashing LED (light-emitting diode) lights, usually red and dotting everything
from modems to keyboards and routers, can be captured with a telescope and processed to reveal all the data
passing through the device, Joe Loughry, a computer programmer at Lockheed Martin Space Systems in
Denver, told Reuters Wednesday.

"It requires little apparatus, can be done at a considerable distance, and is completely undetectable," he writes in
his paper, "Information Leakage from Optical Emanations." "In effect, LED indicators act as little free-space
optical data transmitters, like fiber optics but without the fiber."

Not every LED-enabled device is at risk, though. Affected is equipment used in low-speed, long-distance
networks typically found in proprietary networks, such as ATM (automated teller machines) at banks, as
opposed to corporate local area networks or home Internet connections, Loughry said.

He said he was able to collect a strong optical signal from about 22 yards, using optical sensor equipment.

"It is interesting to walk around downtown at night in a large city and look up at the glass windows and you see
a lot of computers," Loughry said. "I've seen racks of equipment with LEDs on them visible from the street.
That's kind of what got me to pursue this."

Loughry began his research on LEDs in 1994 when he was a graduate student at Seattle University. Asked how
computer researchers could have overlooked for so long something that literally stares them in the face, he said:
"I guess nobody ever looked at it before.

"I was working very late one night and waiting for a long file transfer to complete and I was just staring at these
lights on the front of the modem and started to wonder if there was anything there," said Loughry.

The solutions are easy — locate equipment away from windows, put black tape over LEDs or de-activate them
when not in use. Equipment manufacturers also can modify the devices.

The paper is scheduled to be published later this year in the scientific journal for the Association for Computing
Machinery, called "ACM Transaction on Information and System Security."

His co-author is his former professor, David Umphress, now a software engineering professor at Alabama's
Auburn University.

Mais conteúdo relacionado

Mais procurados

Ethical issues in smart home application in smart
Ethical issues in smart home application in smartEthical issues in smart home application in smart
Ethical issues in smart home application in smartAboubacarAhamadaRouf
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1maranan_alexa
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecastj9lai
 
2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to KnowRaffa Learning Community
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naikAmey Naik
 
Interaction system based on internet of things as support for education
Interaction system based on internet of things as support for educationInteraction system based on internet of things as support for education
Interaction system based on internet of things as support for educationJORGE GOMEZ
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)jeremargwapo
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual propertyTawfig Tawill
 

Mais procurados (13)

Ethical issues in smart home application in smart
Ethical issues in smart home application in smartEthical issues in smart home application in smart
Ethical issues in smart home application in smart
 
Sem 5 books-list
Sem 5 books-listSem 5 books-list
Sem 5 books-list
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
 
Projecto Ingles
Projecto InglesProjecto Ingles
Projecto Ingles
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Histrory
HistroryHistrory
Histrory
 
ingles tecnico
ingles tecnicoingles tecnico
ingles tecnico
 
2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
 
Interaction system based on internet of things as support for education
Interaction system based on internet of things as support for educationInteraction system based on internet of things as support for education
Interaction system based on internet of things as support for education
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual property
 

Destaque

Trabajemos con la tecnologia imagen
Trabajemos con la tecnologia imagenTrabajemos con la tecnologia imagen
Trabajemos con la tecnologia imagendalilaceballos
 
DTC MD JNET Overview
DTC MD JNET OverviewDTC MD JNET Overview
DTC MD JNET OverviewMaggie Fawley
 
Sofie_Henriksen_Letter_Recommendation
Sofie_Henriksen_Letter_RecommendationSofie_Henriksen_Letter_Recommendation
Sofie_Henriksen_Letter_RecommendationSofie Henriksen
 
Certificate 2014
Certificate 2014Certificate 2014
Certificate 2014Ian Stuart
 
Wright, Harold RM Certificate
Wright, Harold RM CertificateWright, Harold RM Certificate
Wright, Harold RM CertificateHarold Wright
 
Formato de gestión escolar
Formato de gestión escolarFormato de gestión escolar
Formato de gestión escolargloriarojasilva
 
CURACIÓN DE CONTENIDOS
CURACIÓN DE CONTENIDOSCURACIÓN DE CONTENIDOS
CURACIÓN DE CONTENIDOSISABELROSA888
 

Destaque (9)

Trabajemos con la tecnologia imagen
Trabajemos con la tecnologia imagenTrabajemos con la tecnologia imagen
Trabajemos con la tecnologia imagen
 
DTC MD JNET Overview
DTC MD JNET OverviewDTC MD JNET Overview
DTC MD JNET Overview
 
Applebracelet
ApplebraceletApplebracelet
Applebracelet
 
Sofie_Henriksen_Letter_Recommendation
Sofie_Henriksen_Letter_RecommendationSofie_Henriksen_Letter_Recommendation
Sofie_Henriksen_Letter_Recommendation
 
Certificate (8)
Certificate (8)Certificate (8)
Certificate (8)
 
Certificate 2014
Certificate 2014Certificate 2014
Certificate 2014
 
Wright, Harold RM Certificate
Wright, Harold RM CertificateWright, Harold RM Certificate
Wright, Harold RM Certificate
 
Formato de gestión escolar
Formato de gestión escolarFormato de gestión escolar
Formato de gestión escolar
 
CURACIÓN DE CONTENIDOS
CURACIÓN DE CONTENIDOSCURACIÓN DE CONTENIDOS
CURACIÓN DE CONTENIDOS
 

Semelhante a Comp computer spy methods discovered

Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write upWhoGoesThere
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
 
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming reportBilal Maqbool ツ
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSbinuvijay1
 
EET230_ResearchPaper.docx
EET230_ResearchPaper.docxEET230_ResearchPaper.docx
EET230_ResearchPaper.docxstanleyjohn18
 
Eet230 research paper
Eet230 research paperEet230 research paper
Eet230 research paperstanleyjohn18
 
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSbinuvijay1
 
Privacy and Ubiquitous Computing
Privacy and Ubiquitous ComputingPrivacy and Ubiquitous Computing
Privacy and Ubiquitous Computingmikeart
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Desiree Miloshevic
 
The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.Rohit Agrawal
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.Laurie Lamberth
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxJohnsmithAlberto2
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, GermanyCharith Perera
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsThe Marketing Distillery
 
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkov
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkovGab17 lyon-the thingsofinternetofthings-by-alexandersurkov
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkovAZUG FR
 

Semelhante a Comp computer spy methods discovered (20)

Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming report
 
PhD Admission Pitching
PhD Admission PitchingPhD Admission Pitching
PhD Admission Pitching
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
 
EET230_ResearchPaper.docx
EET230_ResearchPaper.docxEET230_ResearchPaper.docx
EET230_ResearchPaper.docx
 
Eet230 research paper
Eet230 research paperEet230 research paper
Eet230 research paper
 
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGS
 
Privacy and Ubiquitous Computing
Privacy and Ubiquitous ComputingPrivacy and Ubiquitous Computing
Privacy and Ubiquitous Computing
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
 
The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
 
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkov
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkovGab17 lyon-the thingsofinternetofthings-by-alexandersurkov
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkov
 

Mais de Vanderlei Nascimento

Esquema de ouro da mega sena otimo
Esquema de ouro da mega sena otimoEsquema de ouro da mega sena otimo
Esquema de ouro da mega sena otimoVanderlei Nascimento
 
Revista info exame 2005 janeiro 50 coisas bacanas para fazer com o pc sem ga...
Revista info exame 2005 janeiro  50 coisas bacanas para fazer com o pc sem ga...Revista info exame 2005 janeiro  50 coisas bacanas para fazer com o pc sem ga...
Revista info exame 2005 janeiro 50 coisas bacanas para fazer com o pc sem ga...Vanderlei Nascimento
 
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...Vanderlei Nascimento
 
Identifying electronic components u c hobby
Identifying electronic components   u c hobbyIdentifying electronic components   u c hobby
Identifying electronic components u c hobbyVanderlei Nascimento
 
Guia como se faz montagem, manutençao e instalaçao de computadores
Guia como se faz   montagem, manutençao e instalaçao de computadoresGuia como se faz   montagem, manutençao e instalaçao de computadores
Guia como se faz montagem, manutençao e instalaçao de computadoresVanderlei Nascimento
 
Glossário da internet e tipos de arquivos prof belfort
Glossário da internet e tipos de arquivos   prof belfortGlossário da internet e tipos de arquivos   prof belfort
Glossário da internet e tipos de arquivos prof belfortVanderlei Nascimento
 
Dicas 50 soluções para os problemas mais enervantes do pc
Dicas  50 soluções para os problemas mais enervantes do pcDicas  50 soluções para os problemas mais enervantes do pc
Dicas 50 soluções para os problemas mais enervantes do pcVanderlei Nascimento
 
Como fazer uma bela limpeza de arquivos no pc
Como fazer uma bela limpeza de arquivos no pcComo fazer uma bela limpeza de arquivos no pc
Como fazer uma bela limpeza de arquivos no pcVanderlei Nascimento
 
Como clonar h ds e fazer backup sem precisar do ghost
Como clonar h ds e fazer backup sem precisar do ghostComo clonar h ds e fazer backup sem precisar do ghost
Como clonar h ds e fazer backup sem precisar do ghostVanderlei Nascimento
 

Mais de Vanderlei Nascimento (20)

Esquema de ouro da mega sena otimo
Esquema de ouro da mega sena otimoEsquema de ouro da mega sena otimo
Esquema de ouro da mega sena otimo
 
Dremel mini mite_manual
Dremel mini mite_manualDremel mini mite_manual
Dremel mini mite_manual
 
Curso medicina natural
Curso medicina naturalCurso medicina natural
Curso medicina natural
 
Bpf ervas medicinais
Bpf ervas medicinaisBpf ervas medicinais
Bpf ervas medicinais
 
26 dicas saúde_medicina_oriental
26 dicas saúde_medicina_oriental26 dicas saúde_medicina_oriental
26 dicas saúde_medicina_oriental
 
Bpf ervas medicinais
Bpf ervas medicinaisBpf ervas medicinais
Bpf ervas medicinais
 
A bíblia viva
A bíblia vivaA bíblia viva
A bíblia viva
 
7 shortcuts to_six_pack_abs
7 shortcuts to_six_pack_abs7 shortcuts to_six_pack_abs
7 shortcuts to_six_pack_abs
 
Absolute hot-yoga-pose-chart
Absolute hot-yoga-pose-chartAbsolute hot-yoga-pose-chart
Absolute hot-yoga-pose-chart
 
26 dicas saúde_medicina_oriental
26 dicas saúde_medicina_oriental26 dicas saúde_medicina_oriental
26 dicas saúde_medicina_oriental
 
Revista info exame 2005 janeiro 50 coisas bacanas para fazer com o pc sem ga...
Revista info exame 2005 janeiro  50 coisas bacanas para fazer com o pc sem ga...Revista info exame 2005 janeiro  50 coisas bacanas para fazer com o pc sem ga...
Revista info exame 2005 janeiro 50 coisas bacanas para fazer com o pc sem ga...
 
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...
Proteja documentos e arquivos de xeretas que desejam roubar suas preciosas in...
 
Lista de programas_freeware
Lista de programas_freewareLista de programas_freeware
Lista de programas_freeware
 
Identifying electronic components u c hobby
Identifying electronic components   u c hobbyIdentifying electronic components   u c hobby
Identifying electronic components u c hobby
 
Guia como se faz montagem, manutençao e instalaçao de computadores
Guia como se faz   montagem, manutençao e instalaçao de computadoresGuia como se faz   montagem, manutençao e instalaçao de computadores
Guia como se faz montagem, manutençao e instalaçao de computadores
 
Glossário da internet e tipos de arquivos prof belfort
Glossário da internet e tipos de arquivos   prof belfortGlossário da internet e tipos de arquivos   prof belfort
Glossário da internet e tipos de arquivos prof belfort
 
Dicas 50 soluções para os problemas mais enervantes do pc
Dicas  50 soluções para os problemas mais enervantes do pcDicas  50 soluções para os problemas mais enervantes do pc
Dicas 50 soluções para os problemas mais enervantes do pc
 
Criando um ponto de restauração
Criando um ponto de restauraçãoCriando um ponto de restauração
Criando um ponto de restauração
 
Como fazer uma bela limpeza de arquivos no pc
Como fazer uma bela limpeza de arquivos no pcComo fazer uma bela limpeza de arquivos no pc
Como fazer uma bela limpeza de arquivos no pc
 
Como clonar h ds e fazer backup sem precisar do ghost
Como clonar h ds e fazer backup sem precisar do ghostComo clonar h ds e fazer backup sem precisar do ghost
Como clonar h ds e fazer backup sem precisar do ghost
 

Comp computer spy methods discovered

  • 1. Computer spy methods discovered SAN FRANCISCO (Reuters) — By monitoring the flashes of LED lights on electronics equipment and the indirect glow from monitors, scientists in the United States and the United Kingdom have discovered ways to remotely eavesdrop on computer data. Optical signals from the little flashing LED (light-emitting diode) lights, usually red and dotting everything from modems to keyboards and routers, can be captured with a telescope and processed to reveal all the data passing through the device, Joe Loughry, a computer programmer at Lockheed Martin Space Systems in Denver, told Reuters Wednesday. "It requires little apparatus, can be done at a considerable distance, and is completely undetectable," he writes in his paper, "Information Leakage from Optical Emanations." "In effect, LED indicators act as little free-space optical data transmitters, like fiber optics but without the fiber." Not every LED-enabled device is at risk, though. Affected is equipment used in low-speed, long-distance networks typically found in proprietary networks, such as ATM (automated teller machines) at banks, as opposed to corporate local area networks or home Internet connections, Loughry said. He said he was able to collect a strong optical signal from about 22 yards, using optical sensor equipment. "It is interesting to walk around downtown at night in a large city and look up at the glass windows and you see a lot of computers," Loughry said. "I've seen racks of equipment with LEDs on them visible from the street. That's kind of what got me to pursue this." Loughry began his research on LEDs in 1994 when he was a graduate student at Seattle University. Asked how computer researchers could have overlooked for so long something that literally stares them in the face, he said: "I guess nobody ever looked at it before. "I was working very late one night and waiting for a long file transfer to complete and I was just staring at these lights on the front of the modem and started to wonder if there was anything there," said Loughry. The solutions are easy — locate equipment away from windows, put black tape over LEDs or de-activate them when not in use. Equipment manufacturers also can modify the devices. The paper is scheduled to be published later this year in the scientific journal for the Association for Computing Machinery, called "ACM Transaction on Information and System Security." His co-author is his former professor, David Umphress, now a software engineering professor at Alabama's Auburn University.