To: 2ndDivisionVet
I see more Lifelock ads for Beck,Rush and Hannity.
2 posted on
07/08/2015 6:58:46 PM PDT by
TurboZamboni
(Those who make peaceful revolution impossible will make violent revolution inevitable.-JFK)
To: 2ndDivisionVet
To: 2ndDivisionVet
The military has had computers protected against this for decades. I believe they call it Tempest Shielding.
To: 2ndDivisionVet
There’s no easy way to determine what process is causing a fluctuation in the CPU.
If you had enough processes running to max out the CPU it would be VERY difficult to sort anything out of the RF mess coming from it. A quiet CPU running a process would be like listening to someone walk across the floor in the apartment upstairs, a maxed out CPU would be like hearing the stomping feet of a dance party overhead...very hard to figure out what foot caused what stomp :-)
An SDR creating a mass of competing RF at the proper frequencies would also create problems for the snooper.
6 posted on
07/08/2015 7:26:04 PM PDT by
Bobalu
(If we live to see 2017 we will be kissing the ground)
To: 2ndDivisionVet
Physical mitigation techniques of electromagnetic radiation include Faraday cages, the team wrote on its website. However, inexpensive protection of consumer-grade PCs appears difficult. This is untrue. Think tinfoil hat.
To: 2ndDivisionVet
Tempest, from the 1970s. Just goofle NACSEM 5100.
Nothing new here.
9 posted on
07/08/2015 7:35:17 PM PDT by
bigbob
(The best way to get a bad law repealed is to enforce it strictly. Abraham Lincoln)
To: 2ndDivisionVet
Physical access to your work site or computer can allow a number of attacks. The Evil Maid attack, and the hardware keyboard logger, are the most popular.
Physical security is, therefore, important. Keep your laptop in a safe when it is not in use.
To: 2ndDivisionVet
Gotta get me a Tempest machine.
12 posted on
07/08/2015 7:42:25 PM PDT by
null and void
(She who uses rope to contain reporters during her candidacy will use rope to hang them when in power)
To: 2ndDivisionVet
This is sort of hacking is DPA and SPA- differential power analysis and simple power analysis. Cryptography Research Inc. has countermeasures for dealing with this.
13 posted on
07/08/2015 8:07:31 PM PDT by
Pelham
(Deo Vindice)
To: 2ndDivisionVet
Here’s hoping BIbi has already slipped one into theOne’s golf bag and got a hold of the evil one’s blackberry info.
15 posted on
07/08/2015 8:25:52 PM PDT by
Sgt_Schultze
(If a border fence isn't effective, why is there a border fence around the White House?)
To: 2ndDivisionVet
Inexpensive protection of PCs is hard to do? Balderdash!!
18 posted on
07/08/2015 9:09:22 PM PDT by
ProtectOurFreedom
(For those who understand, no explanation is needed. For those who do not, no explanation is possible)
To: 2ndDivisionVet; rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; ...
23 posted on
07/09/2015 10:46:54 AM PDT by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: 2ndDivisionVet
Sounds like not using mobile devices or computers using wi-fi is the answer. Hard-wired computers avoid the problem. I do all my secure work (bank and credit card transactions) on my computer physically connected to the net.
24 posted on
07/09/2015 11:50:26 AM PDT by
CedarDave
(Bush vs. Clinton in 2016? If you have a 24-year old car, the bumper stickers are still good!)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson