Can Electromagnetic Leaks Compromise Your Cybersecurity?

Congress investigates the security risks of a decades-old spying technique that can steal data from computers via electromagnetic and acoustic emissions.
Electromagnetic and acoustic emissions from computers and other electronic devices have long been a concern for cybersecurity experts. Now, a pair of US lawmakers are calling for an investigation into just how vulnerable these leaks can make computers and other technology to espionage.
The technique, once codenamed TEMPEST by the NSA, involves using specialized equipment to intercept and analyze the faint electromagnetic and sound waves emanating from electronic devices. This can potentially allow spies to steal sensitive information without ever physically accessing the target device.
{{IMAGE_PLACEHOLDER}} alt="Illustration of electromagnetic waves being intercepted from a computer">While the risks of TEMPEST-style attacks have been known for decades, the proliferation of interconnected, internet-enabled devices in homes and businesses has brought the issue back into the spotlight. Lawmakers are concerned that the growing attack surface makes it increasingly difficult to protect against these types of espionage threats.
"The miniaturization of electronics and the ubiquity of internet-connected devices have expanded the potential attack surface and increased the risk of information leakage through physical means," said Representative Jim Langevin, one of the lawmakers calling for the investigation.
{{IMAGE_PLACEHOLDER}} alt="Computer hardware emitting electromagnetic waves">The TEMPEST technique was first developed during the Cold War era, when the US and Soviet Union were engaged in a high-stakes game of espionage and counterintelligence. The NSA and its counterparts abroad realized that the electromagnetic and acoustic emissions from computers, telephones, and other devices could potentially be intercepted and analyzed to reconstruct the information being processed.
While countermeasures have been developed over the years, the fundamental physics behind TEMPEST attacks remain a concern. As technology continues to advance and our reliance on interconnected devices grows, the threat of electromagnetic and acoustic espionage may only increase.
{{IMAGE_PLACEHOLDER}} alt="Diagram showing how TEMPEST attacks work by intercepting emissions from a computer">The lawmakers are calling on the Government Accountability Office to investigate the current state of TEMPEST-related threats and the adequacy of existing cybersecurity measures to address them. Their goal is to ensure that policymakers and the public have a clear understanding of the risks and can take appropriate steps to mitigate them.
"We need to understand the scope of the threat and whether our current defenses are sufficient," said Representative Langevin. "Electromagnetic and acoustic emissions are a longstanding challenge, but one that is evolving with the technology landscape. It's crucial that we stay ahead of these espionage threats."
Source: Wired


