ECE537/7 #1Spring 2009 © 2000-2009, Richard A. Stanley ECE537 Advanced and High Performance Networks 7: TEMPEST in a Network (or a teapot?) Professor Richard.

Slides:



Advertisements
Similar presentations
Cables. Technical reading Transmission lines Write down any types of cable and transmission lines used in telecommunications that you can think of. Now.
Advertisements

LAN Devices 5.3 IT Essentials.
Note 2 Transmission Lines (Time Domain)
Transmission Media T.Najah Al-Subaie Kingdom of Saudi Arabia
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
CH. 4 Transmission Media.
PH0101 Unit 2 Lecture 4 Wave guide Basic features
Chapter Fourteen: Transmission Lines
Direct Attacks on Computational Devices
Unbounded media have network signals that are not bound by any type of fiber or cable; hence, they are also called wireless technologies Wireless LAN.
SATELLITE SYSTEMS Satellite Communications Based on microwave transmission Satellite communication systems consist of ground-based or earth stations.
Internetworking Fundamentals (Lecture #1) Andres Rengifo Copyright 2008.
1 Part II: Data Transmission The basics of media, signals, bits, carriers, and modems Fall 2005 Qutaibah Malluhi Computer Science and Engineering Qatar.
Introduction to Networking. Spring 2002Computer Network Applications Analog Devices Maintain an exact physical analog of (some form of) information. Ex:
1 Version 3.0 Module 3 Networking Media. 2 Version 3.0 Cable Specifications Cables have different specifications and expectations pertaining to performance:
TYPES OF NETWORKS NETWORK CONFIGURATIONS /TOPOLOGIES TRANSMISSION MEDIA By B. Vialva.
Copyright CCNA 1 Chapter 4, Part 1 Cable Testing By Your Name.
Electromagnetic Induction
Lecture Week 2 Networks, The Internet and the World Wide Web.
Computer Communications and Networking (CCN)
Sistem Jaringan dan Komunikasi Data #3. Overview  guided - wire / optical fibre  unguided - wireless  characteristics and quality determined by medium.
NETWORK CHONGSEOK PARK 10DD MRS. VEENA MONY Content.
Cisco 1 - Networking Basics Perrine. J Page 19/3/2015 Chapter 3 Which of the following correctly describes the type of signal that the network media carries?
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
Chapter 4:Transmission Media 1 Basic Idea 2 Transmission media 3 Copper wires 4 Glass fibers 5 Radio 6 Microwave 7 Infrared 8 Laser 9 Choosing a medium.
1 CP Lecture 3 Computer communications 2. 2 Information quality and reliability A reliable communication implies reliable information but.. Other.
7.1 Chapter 7 Transmission Media Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 2.  Types of Network  Circuit Switched & Packet Switched  Signaling Techniques  Baseband & Broadband  Interference  Transmission Medium.
Introduction.
1 Ch 5 Local Asynchronous Communication (RS-232).
Communication channels and transmission media
Engr Fundamental Ideas.
Mr C Johnston ICT Teacher
Lecture 6.

Computer Network Basic Concepts. Topics Computer Networks Communication Model Transmission Modes Communication Types Classification Of Computer Networks.
Media for Transmitting Data. Optical Communications Description of optical communications: –They use light as a carrier of information (as opposed to.
Telecommunications, P. I AIMS 2710 R. Nakatsu. Networks and Telecommunications NETWORK – two or more computers interconnected by a cable (or alternatively,
Transmission Lines No. 1  Seattle Pacific University Transmission Lines Kevin Bolding Electrical Engineering Seattle Pacific University.
Bits (0s and 1s) need to be transmitted from one host to another. Each bit is placed on the cable as an electrical signal or pulse. On copper cable the.
{ Transmission Media.  Information can be transmitted through a medium by varying some physical property.  The physics of the universe places some limits.
SIGMA INSTITUTE OF ENGINEERING
ECE 4710: Lecture #36 1 Chapter 8  Chapter 8 : Wired and Wireless Communication Systems  Telephone  Fiber Optic  DSL  Satellite  Digital & Analog.
Networking and communication basics. Areej Aloufi.
07 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Grounding Grounds: –Common reference for the circuit –Safety What is the potential problem.
Chapter#6 1 King Saud University College of Applied studies and Community Service 1301CT By: Nour Alhariqi.
Programmable Logic Controllers
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Communications security
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Module 4 Cable Testing.
Communications Introduction Mr. Hennessy/Mr. DiMeglio Uxbridge High School 1/08.
Network Media. Copper, Optical, Fibre (Physical Layer Technologies) Introduction to Computer Networking.
Attenuation is the loss of signal strength, for example, when cables exceed a maximum length. This means that a 1 bit voltage signal loses amplitude as.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
COMPUTER NETWORKS CS610 Lecture-11 Hammad Khalid Khan.
Week-13 (Lecture-1) Data Communication Hardware: 1)Coaxial cable: Widely installed for use in business and corporation Ethernet Used to install LANs. Consists.
Wireless Charging of Mobile Phones Using Microwaves
Developing Cabling Module Situation at August 2006 Vello Vanem.
INTRODUCTION. Electrical and Computer Engineering  Concerned with solving problems of two types:  Production or transmission of power.  Transmission.
Network Topology and LAN Technologies
NETWORKING TECHNOLOGIES
Conducted and Wireless Media (Part I)
Telecommunication ELEC503
Introduction to Computer Administration
ROHIT RAJ TEMPEST AND ECHELON A SEMINAR BY ROLL NO VII TH SEM
Applied Electromagnetic Waves Notes 6 Transmission Lines (Time Domain)
GCSE ICT Setting up a Network.
Fiber Optic Transmission
GCSE ICT Setting up a Network.
Presentation transcript:

ECE537/7 #1Spring 2009 © , Richard A. Stanley ECE537 Advanced and High Performance Networks 7: TEMPEST in a Network (or a teapot?) Professor Richard A. Stanley, P.E.

ECE537/7 #2 Overview of Tonight’s Class Student presentations/discussions on Review of last time Issues with compromising emanations and data separation

ECE537/7 #3 What’s the Problem? Anything carrying an electrical current produces a magnetic field, and vice versa –Faraday’s Law –Time-varying E fields cause time-varying B fields, and vice versa Computing and networking equipment uses digital circuitry operating at gHz rates with short rise/fall times –Pulses have wideband frequency spectra –Remember Fourier?

ECE537/7 #4 And? Electromagnetic waves above a certain (very low) frequency propagate through space in accordance with the laws of physics Thus, the high-frequency waves from our computing and networking equipment can potentially propagate and be received by those for whom they were not intended

ECE537/7 #5 Near/Far Fields

ECE537/7 #6 Fourier Series Examples

ECE537/7 #7 Not a New Phenomenon Serious work on compromising emanations began as early as the late 1950’s Initially, dealing with these emanations in U.S. Government systems was dealt with under the provisions of Federal Standard 222 (C) Eventually, FS 222 morphed into TEMPEST

ECE537/7 #8 What is TEMPEST? A series of regulations and standards for preventing compromising emanations from information-processing systems –Networks certainly meet this definition It is not an acronym for anything, although several interesting (and often profane) candidates have been suggested

ECE537/7 #9 Some Guidelines Most TEMPEST documents are classified Among those that are not, or are not entirely so, are –NSA/CSS REG 90-6, Technical Security Program –NSTISSAM TEMPEST/1-92, COMPROMISING EMANATIONS LABORATORY TEST REQUIREMENTS ELECTROMAGNETICS

ECE537/7 #10 Acronyms NSA: National Security Agency CSS: Central Security Service NSTISSAM: National Security Telecommunications and Information Systems Security Advisory Memorandum

ECE537/7 #11 Compromising Emanations Unintentional information-bearing signals transmitted, received, handled, or otherwise processed by any information-processing equipment, which, if intercepted and analyzed, potentially disclose national security information These signals can escape from a controlled area by power line conduction/induction, other fortuitous conduction paths such as air conditioning ducts, pipes, or by simply radiating a signal into the air

ECE537/7 #12 Legalities Interception of communications not intended for you is subject to the penalties provided by the “Wiretap Laws”, 18 USC § 2510 – 2521 Obviously, in an espionage setting (governmental or commercial), the perpetrator(s) are not usually too concerned about legal sanctions

ECE537/7 #13 And This Has to do With Networking How? Networking has increased the exposure of sensitive information to interception –Longer network backbones –Huge internetwork infrastructures –Much higher speed processing and transmission than even a few years ago Trend is for this to continue

ECE537/7 #14 The Color of Signals Red: signals carrying sensitive information without any form of protection (e.g. encryption), so that they can be read and understood Black: signals which have been protected (usually by encryption), so that merely having access to the signal does not give access to the information it bears

ECE537/7 #15 Name Creep Initially, Red and Black referred exclusively to signals meeting the definition Over time, the naming crept into descriptions of systems as well –Black network: one where all traffic is encrypted –Red network: one where traffic is not encrypted

ECE537/7 #16 Separation In processing and networking, it is essential to keep Red and Black signals separate –If commingled, separating them becomes a multi-level security problem, which we have not done a good job of solving –Worse, if Red signals can “hitch a ride” on Black signals, they can leave the controlled perimeter and thus be compromised

ECE537/7 #17 Demarcation If we are to keep Red and Black signals, networks, etc. separated, then it is crucial to know where one ends and the other begins –Typically known as the demarcation point –Must be a device, not a transmission path E.g., a crypto device is generally Red input and Black output, so it could connect a Red network to a Black network

ECE537/7 #18 How to do This? Shielding Grounding Filtering Unfortunately, these fields are as much art as science, and much has be passed on by skilled practitioners to newcomers –We must revisit our analog signal skills!

ECE537/7 #19 Grounding Examples - 1 This is a simple 3-wire grounded AC outlet connection What, if anything, is wrong with this diagram? Are these concerns universal at all frequencies?

ECE537/7 #20 Grounding Examples – 2

ECE537/7 #21 Coaxial Advantage

ECE537/7 #22 Effect of Cable

ECE537/7 #23 Shielded Twisted Pair At least, that is how it works in theory

ECE537/7 #24 E Fields and B Fields Are Different To shield an electric field, we seek to divert the electrical energy (i.e. current) to ground –Low-impedance path To shield a magnetic field, we seek to contain the magnetic field so it cannot propagate beyond the shield –What has this to do with grounding? –Magnetic vs. electrical impedance What if we contain only one field?

ECE537/7 #25 Star Network

ECE537/7 #26 Grounding All grounds are not created equal Goodness of the ground is frequency dependent

ECE537/7 #27 Other Problems Induction currents Faraday effects Sneak paths Surge protection Common-mode currents What about light and fibre?

ECE537/7 #28 Filtering How to protect what is inside a shielded enclosure? How to protect what is outside from what is inside the shield?

ECE537/7 #29 The Color of the Core Red Black Colorless

ECE537/7 #30 Summary While TEMPEST is a uniquely government program, the issue of compromising emanations is not; it affects all systems Sensitive information is not limited to government systems Networks exacerbate the compromising emanations problem, and they must be considered in network design

ECE537/5 #31Spring 2009 © , Richard A. Stanley Homework You are designing an Ethernet-based network (100BaseT) with wireless extensions. Users will process sensitive information on their workstations and need to exchange this information with other users at remote network sites. Cost is an overriding concern; commercial equipment is the only real option. The customer is very concerned about compromising emanations. How will you design this network? What will you do to evaluate your design? Are field measurements feasible? Prepare a paper of approximately 1100 words describing your findings. Be prepared to discuss your findings with the class for minutes next week. You may use slides if you desire.

ECE537/5 #32Spring 2009 © , Richard A. Stanley Disclaimer Parts of the lecture slides contain original work of Wolfram Math world and James M. Atkinson and remain copyrighted materials by the original owner(s). The slides are intended for the sole purpose of instruction in computer networks at Worcester Polytechnic Institute.