💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › WIRETAPPING › tempest.txt captured on 2022-06-12 at 17:54:45.

View Raw

More Information

-=-=-=-=-=-=-










     Eavesdropping On the Electromagnetic Emanations of
     Digital Equipment: The Laws of Canada, England and
                     the United States



          Copyright (C) 1989 By Christopher Seline

     This document is a rough draft. The Legal Sections
        are  overviews.  They will be significantly
               expanded  in the next version.







     We in this country, in this generation, are --  by
     destiny  rather than choice -- the watchmen on the
     walls of world freedom.1
                       -President John F. Kennedy




In the novel 1984, George Orwell  foretold  a  future  where
individuals had no expectation  of privacy because the state
monopolized  the  technology  of   spying.   The  government
watched the actions of its subjects from birth to death.  No
one could protect himself because surveillance and  counter-
surveillance technology was controlled by the government.

This note explores  the  legal  status  of   a  surveillance
technology  ruefully  known  as  TEMPEST2.    Using  TEMPEST
technology  the  information in  any  digital device  may be
intercepted  and  reconstructed  into   useful  intelligence
without the operative ever  having to come near his  target.
The technology is  especially useful in the  interception of
information  stored  in digital  computers  or displayed  on
computer terminals.


_________________________
1.  Undelivered  speech  of  President  John  F.   Ken-
nedy, Dallas Citizens Council (Nov. 22, 1963) 35-36.
2.  TEMPEST  is an  acronym for  Transient  Electromag-
netic  Pulse  Emanation  Standard.   This standard sets
forth the official views of the United  States  on  the
amount   of electromagnetic radiation that a device may
emit without compromising the information  it  is  pro-



                        June 7, 1990





                           - 2 -


The use of TEMPEST is not illegal  under  the  laws  of  the
United  States3,  or  England.    Canada has  specific  laws
criminalizing TEMPEST eavesdropping but the  laws do more to
hinder surveillance countermeasures than  to prevent TEMPEST
surveillance.  In  the United  States it is  illegal for  an
individual  to  take   effective  counter-measures   against
TEMPEST surveillance.   This leads to the  conundrum that it
is legal  for individuals and  the government to  invade the
privacy of others but illegal for individuals to  take steps
to protect their privacy.

The author would like to  suggest that the solution  to this
conundrum   is    straightforward.     Information   on pro-
tecting  privacy  under  TEMPEST  should   be   made  freely
available;  TEMPEST Certified  equipment  should be  legally
available; and organizations possessing  private information
should  be  required  by  law  to protect  that  information
through  good  computer security  practices  and the  use of
TEMPEST Certified equipment.

Spying is divided by  professionals  into  two  main  types:
human   intelligence   gathering  (HUMINT)   and  electronic
intelligence gathering (ELINT).  As  the names imply, HUMINT
relies   on   human   operatives,  and   ELINT   relies   on
technological operatives.  In the  past HUMINT was the  sole
method for  collecting intelligence.4  The  HUMINT operative
would  steal  important  papers,  observe troop  and  weapon
movements5, lure  people  into his  confidences  to  extract
secrets,  and   stand  under  the   eavesdrip6  of   houses,
eavesdropping on the occupants.


_________________________
cessing.   TEMPEST is  a  defensive standard;  a device
which conforms to this standard is referred to as  TEM-
PEST Certified.
The United States  government has refused to  declassi-
fy the acronym  for   devices  used  to  intercept  the
electromagnetic information of   non-TEMPEST  Certified
devices.    For  this   note,  these  devices  and  the
technology  behind  them  will  also  be  referred   to
as  TEMPEST;   in   which   case,  TEMPEST  stands  for
Transient Electromagnetic Pulse Surveillance  Technolo-
gy.
The  United  States  government   refuses   to  release
details  regarding  TEMPEST  and continues an organized
effort to  censor  the  dissemination   of  information
about   it.    For  example the  NSA succeeded in shut-
ting  down a  Wang Laboratories presentation   on  TEM-
PEST  Certified equipment  by classifying  the contents
of  the  speech  and  threatening   to  prosecute   the
speaker  with  revealing classified information.  [cite
coming].
3.  This  Note  will not  discuses   how   TEMPEST  re-



                        June 7, 1990





                           - 3 -


As  technology has  progressed, tasks  that  once could only
be   performed   by   humans   have   been   taken  over  by
machines.  So  it has  been with spying.   Modern  satellite
technology allows troop and weapons movements to be observed
with greater  precision and  from greater  distances than  a
human  spy  could ever  hope to  accomplish.   The  theft of
documents  and  eavesdropping on  conversations  may now  be
performed electronically.  This means greater safety for the
human operative, whose  only involvement may be  the placing
of  the  initial  ELINT  devices.    This  has  led  to  the
ascendancy of ELINT  over HUMINT  because the placement  and
monitoring of ELINT devices may be performed by a technician
who has  no training  in the  art of  spying.   The gathered
intelligence may  be processed  by  an intelligence  expert,
perhaps  thousands of  miles  away, with  no  need of  field
experience.


ELINT has a number of other advantages over  HUMINT.   If  a
spy  is  caught his existence could  embarrass his employing
state and he could  be forced into giving up  the identities
of his compatriots or  other important information.   By its
very  nature, a discovered ELINT device (bug) cannot give up
any information; and the ubiquitous  nature of bugs provides
the  principle  state  with the  ability  to  plausibly deny
ownership or involvement.
_________________________
lates   to   the  Warrant Requirement under  the United
States Constitution.   Nor will it discuss the  Consti-
tutional  exclusion  of foreign nationals from the War-
rant Requirement.
4.  HUMINT  has  been  used  by  the    United   States
since   the  Revolution.   "The necessity  of procuring
good intelligence  is apparent &  need not  be  further
urged  --   All that remains for me to add is, that you
keep the  whole matter  as  secret  as  possible.   For
upon Secrecy,  Success depends  in Most  Enterprises of
the kind, and for  want of it,  they are generally  de-
feated,   however well planned &  promising a favorable
issue."  Letter of  George Washington (Jul. 26, 1777).
5.  "... I wish  you to take every  possible  pains  in
your  powers,  by   sending  trusty persons  to  Staten
Island in  whom  you can confide,  to  obtain  Intelli-
gence   of   the Enemy's  situation  & numbers --  what
kind of  Troops they are,  and what  Guards  they  have
-- their strength & where posted."  Id.
6.  Eavesdrip is  an Anglo-Saxon  word,  and refers  to
the  wide overhanging eaves used  to prevent rain  from
falling close to  a house's foundation.   The eavesdrip
provided "a sheltered  place where  one  could hide  to
listen  clandestinely   to  conversation   within   the
house."    W. MORRIS & M. MORRIS,  MORRIS DICTIONARY OF
WORD AND PHRASE ORIGINS, 198 (1977).




                        June 7, 1990





                           - 4 -


ELINT   devices   fall    into    two   broad    categories:
trespassatory  and  non-trespassatory.   Trespassatory  bugs
require some type of trespass in order for them to function.
A transmitter  might require  the physical  invasion of  the
target  premises  for placement,  or  a microphone  might be
surreptitiously  attached to  the outside  of  a window.   A
telephone transmitter can  be placed  anywhere on the  phone
line, including  at the central switch.   The trespass comes
either when it is physically attached  to the phone line, or
if it is  inductive, when placed  in close proximity to  the
phone  line.  Even  microwave bugs require  the placement of
the resonator cone within the target premises.7

Non-trespassatory   ELINT   devices   work    by   receiving
electromagnetic  radiation (EMR) as  it radiates through the
aether, and do not  require the placement of bugs.   Methods
include intercepting8 information transmitted  by satellite,
microwave, and  radio, including  mobile and cellular  phone
transmissions.   This information was  purposely transmitted
with  the intent that some  intended person or persons would
receive it.

Non-trespassatory ELINT also includes  the  interception  of
information  that   was  never  intended to be  transmitted.
All electronic devices emit electromagnetic radiation.  Some
of  the  radiation, as  with  radio  waves, is  intended  to
transmit  information.    Much  of  this  radiation  is  not
intended to transmit information and is merely incidental to
whatever  work  the  target  device  is performing.9    This
information  can be  intercepted  and  reconstructed into  a
coherent  form.    With  current  TEMPEST technology  it  is
possible  to  reconstruct  the  contents of  computer  video
display  terminal  (VDU)  screens  from  up to  a  kilometer
distant10;  reconstructing  the  contents  of  a  computer's
memory or the contents  of its mass storage devices  is more
complicated and must be performed  from a closer distance.11
The reconstruction  of information  via EMR,  a process  for
which the  United  States government  refuses to  declassify
either  the  exact technique  or  even  its name12,  is  not
limited to computers  and digital devices but  is applicable
to  all devices  that generate  electromagnetic radiation.13
TEMPEST is  especially effective  against VDUs  because they
produce a very high level of EMR.14
_________________________
7.  Pursglove, How  Russian Spy   Radios  Work,   RADIO
ELECTRONICS, 89-91 (Jan 1962).
8.  Interception  is  an  espionage term  of  art   and
should  be  differentiated from its  more common usage.
When information is intercepted,  the  interceptor   as
well   as  the intended  recipient receive the informa-
tion.  Interception when not used  as  a  term  of  art
refers  to  one person receiving something intended for
someone else; the intended   recipient  never  receives
what he was intended to receive.



                        June 7, 1990





                           - 5 -


     "[C]ables  may act  as  an  antenna   to  transmit
     the  signals directly  or  even both  receive  the
     signals  and re-emit  them further away  from  the
     source  equipment.    It  is possible  that cables
     acting as an  antenna  in  such  a  manner   could
     transmit  the  signals   much   more   efficiently
     than the  equipment   itself...A  similar   effect
     may  occur   with metal  pipes  such as  those for
     domestic  water  supplies.  ...   If  an  earthing
     [(grounding)]  system is  not installed  correctly
     such that  there is  a path  in the circuit   with
     a very  high resistance  (for example  where paint
     prevents  conduction and  is  acting as  an  insu-
     lator),   then  the  whole   earthing system could
     well act in  a similar fashion to an antenna.  ...
     [For a  VDU] the strongest  signals, or  harmonics
     thereof, are  usually between  60-250 MHz  approx-
     imately.    There  have  however  been  noticeable
     exception  of   extremely   strong  emissions   in
     the  television bands  and  at  higher frequencies
     between 450-800  MHz.  Potts,  Emission  Security,
     3  COMPUTER LAW AND SECURITY REPORT 27 (1988).


_________________________
9.  There are  two types  of emissions,  conducted  and
radiated.   Radiated  emissions   are formed when  com-
ponents or cables  act as  antennas  for  transmit  the
EMR;  when radiation is conducted along cables or other
connections but not radiated it is referred to as "con-
ducted".   Sources   include  cables,  the ground loop,
printed circuit  boards,  internal  wires,   the  power
supply  to power line
10. The TEMPEST ELINT operator can distinguish  between
different  VDUs   in    the   same  room   because   of
the   different   EMR characteristics of both  homo and
heterogeneous  units.    "[T]here is little  comparison
between EMR characteristics  from otherwise  comparable
equipment.    Only if the  [VDU] was made with  exactly
the  same components is  there  any   similarity.    If
some   of  the  components  have  come from a different
batch, have been updated in some  way,   and  especial-
ly   if    they  are  from   a  different manufacturer,
then completely different  results  are  obtained.   In
this way a  different mark or version of the same [VDU]
will emit different  signals.    Additionally   because
of  the   variation  of manufacturing standards between
counties, two  [VDUs] made by the  same   company   but
sourced   from  different counties  will  have entirely
different EMR signal characteristics...From this it way
be  thought  that  there  is such a jumble of emissions
around, that it would not be possible to isolate  those
from any one particular source.  Again, this is not the
case.  Most received signals  have  a   different  line



                        June 7, 1990





                           - 6 -


ELINT is not limited to  governments.  It is  routinely used
by   individuals  for   their  own   purposes.   Almost  all
forms of ELINT are  available to the individual  with either
the technological  expertise or  the money  to hire  someone
_________________________
synchronization,   due   to  design,   reflection,  in-
terference or  variation of component  tolerances.   So
that  if  for   instance   there  are  three  different
signals  on the  same frequency  ...  by  fine   tuning
of    the   RF   receiver,   antenna  manipulation  and
modification  of line  synchronization,  it  is  possi-
ble  to  lock onto each of the three signals separately
and so read  the  screen   information.    By   similar
techniques,  it  is entirely  possible to  discriminate
between  individual items  of  equipment  in  the  same
room."   Potts,  supra  note  9.  For  a  discussion of
the  TEMPEST ELINT   threat   See  e.g.,  Memory  Bank,
AMERICAN  BANKER  20  (Apr 1 1985); Emissions from Bank
Computer   Systems  Make  Eavesdropping   Easy,  Expert
Says, AMERICAN BANKER  1  (Mar  26 1985);  CRT  spying:
a  threat to   corporate  security,  PC  WEEK  (Mar  10
1987).
11.  TEMPEST  is  concerned  with  the transient  elec-
tromagnetic pulses formed  by digital  equipment.   All
electronic  equipment  radiates   EMR   which   may  be
reconstructed.     Digital equipment processes informa-
tion as 1's and 0's--on's  or off's.  Because of  this,
digital  equipment   gives  off  pulses  of EMR.  These
pulses are easier to  reconstruct at a   distance  than
the  non-pulse   EMR  given  off  by  analog equipment.
For a  thorough discussion  the radiation  problems  of
broadband   digital   information  see   e.g.  military
standard  MIL-STD-461    REO2;  White  supra  note   9,
10.2.
12.  See supra note 2.
13.       Of special interest  to ELINT  collectors are
EMR   from  computers,   communications    centers  and
avionics.     Schultz, Defeating Ivan with TEMPEST, DE-
FENSE ELECTRONICS 64 (June 1983).
14.     The  picture  on a  CRT  screen is   built   up
of   picture  elements   (pixels)  organized   in lines
across the  screen.   The pixels  are  made of  materi-
al  that  fluoresces when  struck with energy.  The en-
ergy is produced by a beam of electrons fired  from  an
electron  gun   in the back of  the picture tube.   The
electron beam scans the screen of the  CRT in a regular
repetitive  manner.   When  the  voltage of the beam is
high then the pixel it is focused upon   emits  photons
and appears  as  a dot  on the  screen.   By selective-
ly  firing the gun  as it scans  across  the  face   of
the CRT, the pixels form characters on the CRT screen.
     The  pixels glow  for only   a  very   short  time
and   must be routinely struck by  the electron beam to
stay lit.   To maintain the light  output  of  all  the



                        June 7, 1990





                           - 7 -


with  the   expertise.    Governments   have  attempted   to
criminalize all use  of ELINT by their  subjects--to protect
the privacy of both the government and the population.


In the  United States, Title III of the Omnibus Streets  and
Crimes Act of 196815 criminalizes trespassatory ELINT as the
intentional interception of  wire communications.16  As ori-
ginally   passed,    Title   III  did   not  prohibit   non-
trespassatory ELINT,17  because courts  found that  non-wire
communication lacked  any expectation of p2IIIrivacy.18  The
Electronic Communications  Privacy  Act  of  198619  amended
Title  III  to  include non-wire  communication.    ECPA was
specifically  designed to  include  electronic mail,  inter-
computer  communications,  and  cellular  telephones.     To
accomplish  this,  the  expectation  of  privacy  test   was
eliminated.20
_________________________
pixels  that are supposed to be  lit, the electron beam
traverses  the entire CRT screen sixty  times a second.
Every  time   the  beam fires it causes a  high voltage
EMR emission.  This  EMR can be  used   to  reconstruct
the   contents  of  the   target CRT  screen.   TEMPEST
ELINT  equipment designed  to reconstruct the  informa-
tion synchronizes its  CRT with the target CRT.  First,
it uses the EMR to synchronize its  electron  gun  with
the  electron  gun  in  the target CRT.  Then, when the
TEMPEST ELINT unit detects EMR indicating that the tar-
get CRT fired on a pixel, the TEMPEST ELINT  unit fires
the electron  gun of its CRT.   The  ELINT  CRT  is  in
perfect  synchronism with the target CRT; when the tar-
get lights a pixel, a corresponding pixel on  the  TEM-
PEST  ELINT CRT is lit.   The exact picture on the tar-
get  CRT will appear on the  TEMPEST  ELINT  CRT.   Any
changes  on  the  target  screen  will be instantly re-
flected in the TEMPEST ELINT screen.
     TEMPEST Certified equipment  gives  off  emissions
levels  that  are  too  faint  to  be readily detected.
Certification  levels  are  set    out    in   National
Communications     Security    Information   Memorandum
5100A   (NACSIM  5100A).    "[E]mission    levels   are
expressed  in the time and  frequency domain, broadband
or  narrow band in terms of  the frequency domain,  and
in  terms  of conducted or radiated emissions."  White,
supra, note 9,   10.1.
     For a  thorough  though purposely  misleading dis-
cussion  of TEMPEST ELINT see  Van Eck, Electromagnetic
Radiation  from Video Display units:  An  Eavesdropping
Risk?, 4 Computers & Security 269 (1985).
15.    Pub.   L.  No.  90-351, 82 Stat.  197.  The  Act
criminalizes trespassatory  ELINT  by  individuals   as
well   as   governmental  agents.   cf.  Katz v. United
States, 389 U.S. 347 (1967) (Fourth Amendment prohibits
surveillance by government not individuals.)



                        June 7, 1990





                           - 8 -


As  amended, Title   III   still   outlaws  the   electronic
interception of  communications.  The  word "communications"
indicates  that   someone  is   attempting  to   communicate
something to someone;  it does not refer to  the inadvertent
transmission   of   information.      The   reception    and
reconstruction of emanated transient  electromagnetic pulses
(ETEP), however, is based on  obtaining information that the
target  does not  mean  to transmit.   If  the  ETEP is  not
intended as communication, and  is therefore not transmitted
in a form approaching current communications protocols, then
it can not  be considered communications as  contemplated by
Congress  when  it   amended  Title  III.     Reception,  or
interception, of emanated  transient electromagnetic  pulses
is not criminalized by Title III as amended.

In  England   the   Interception   of   Communications   Act
198521 criminalizes the tapping of communications  sent over
public  telecommunications  lines.22   The  interception  of
communications on  a telecommunication  line can  take place
with a physical tap on the line, or the passive interception
of microwave or satellite  links.23  These forms  of passive
interception differ  from  TEMPEST ELINT  because  they  are
intercepting   intended    communication;   TEMPEST    ELINT
intercepts unintended communication.   Eavesdropping on  the
emanations  of computers  does  not in  any  way comport  to
tapping a telecommunication line and therefore falls outside
the scope of the statute.24
_________________________
16.  18 U.S.C.   2511(1)(a).
17.  United States v. Hall,  488  F.2d  193  (9th  Cir.
1973)   (found   no   legislative  history   indicating
Congress  intended the act  to include  radio-telephone
conversations).   Further,  Title III only criminalized
the interception  of  "aural" communications  which ex-
cluded all forms of computer communications.
18.  Willamette  Subscription Television   v.   Cawood,
580  F.Supp 1164 (D. Or. 1984) (non-wire communications
lacks any expectation of privacy).
19.  Pub. L. No. 99-508, 100 Stat. 1848 (codified at 18
U.S.C.  2510-710) [hereinafter ECPA].
9           20.  18 U.S.C.   2511(1)(a) criminalizes the
interception  of  "any wire,  oral  or electronic  com-
munication"   without  regard   to  an  expectation  of
privacy.
21.  Interception of Communications Act 1985,  Long Ti-
tle, An Act to make new provision for and in connection
with  the  interception  of   communications   sent  by
post   or  by   means  of    public  telecommunications
systems   and  to  amend  section  45  of  the Telecom-
munications Act 1984.
22.  Interception  of  Communications  Act  1985     1,
Prohibition on Interception:
(1) Subject to the  following provisions of  this  sec-
tion,   a  person  who intentionally intercepts  a com-


9                        June 7, 1990





                           - 9 -


Canada has taken direct steps to limit eavesdropping on com-
puters.     The  Canadian   Criminal  Amendment Act  of 1985
criminalized indirect access  to a computer service.25   The
specific reference  to an  "electromagnetic device"  clearly
shows the intent  of the legislature  to include the use  of
TEMPEST ELINT equipment within the ambit of the legislation.

The limitation of obtaining "any computer service" does lead
to  some confusion.   The Canadian  legislature has not made
it  clear  whether  "computer  service"  refers  to  a  com-
puter   service   bureau   or  merely   the  services  of  a
computer.    If  the  Canadians  had  meant  access  to  any
computer,  why  did they  refer  to any  "computer service".
This   is   especially   confusing   considering   the   al-
encompassing language  of (b)  'any function  of a  computer
system'.

Even    if    the    Canadian    legislation    criminalizes
eavesdropping  on  all  computers,  it  does not  solve  the
problem  of  protecting  the privacy  of  information.   The
purpose of  criminal  law is  to  control crime.26    Merely
_________________________
munication in the course of  its transmission  by  post
or   by  means  of  a  public telecommunications system
shall be guilty  of an offence and liable--
(a) on summary conviction,to a fine not  exceeding  the
statutory maximum;
(b) on conviction on indictment,  to imprisonment for a
term not exceeding two years or to a fine or to both.
23.  Tapping  (aka   trespassatory  eavesdropping)   is
patently  in  violation  of the statute.  "The  offense
created by section 1 of the Interception of  Communica-
tions  Act  1985 covers those forms of eavesdropping on
computer communications  which  involve  "tapping"  the
wires  along   which  messages  are being passed.   One
problem which  may  arise,  however,  is  the  question
of   whether  the communication in question  was inter-
cepted in  the course of  its transmission by  means of
a  public telecommunications system.  It is technically
possible  to  intercept  a  communication   at  several
stages  in  its transmission,  and it may be a question
of fact to decide the stage  at  which  it  enters  the
"public"  realm.   THE LAW COMMISSION,WORKING PAPER NO.
110: COMPUTER MISUSE,  3.30 (1988).
24.  "There are  also forms of  eavesdropping which the
Act  does  not cover.  For  example. eavesdropping on a
V.D.U.  [referred to in  this text as a CRT] screen  by
monitoring  the  radiation field which surrounds it  in
order to  display whatever appears on   the  legitimate
user's   screen  on  the  eavesdropper's screen.   This
activity would not  seem to   constitute  any  criminal
offence..."  THE LAW COMMISSION, WORKING PAPER NO. 110:
COMPUTER MISUSE,  3.31 (1988).




                        June 7, 1990





                           - 10 -


making  TEMPEST  ELINT  illegal will  not  control  its use.
First,  because  it is  an  inherently passive  crime  it is
impossible  to detect and hence punish.  Second, making this
form  of eavesdropping  illegal  without taking  a proactive
stance  in  controlling  compromising  emanations gives  the
public a false sense of  security.  Third, criminalizing the
possession of a TEMPEST ELINT  device prevents public sector
research into countermeasures.   Finally,  the law will  not
prevent eavesdropping on private information held in company
computers unless disincentives are given for  companies that
do not take sufficient precautions against eavesdropping and
simple, more common, information crimes.27


TEMPEST ELINT  is  passive.    The   computer  or   terminal
emanates compromising radiation which is  intercepted by the
TEMPEST  device and  reconstructed into  useful information.
Unlike conventional  ELINT there  is no  need to  physically
_________________________
25.   301.2(1) of the  Canadian  criminal  code  states
that anyone who without color of right,
(a) obtains, directly or indirectly, any computer  ser-
vice,
(b)  by  means  of  an   electromagnetic  ...  or  oth-
er   device, intercepts  or  causes  to  be  intercept-
ed, either  directly  or indirectly, any function of  a
computer  system  ...  [is  guilty of an indictable of-
fence].
26.  UNITED   STATES    SENTENCING    COMM'N,   FEDERAL
SENTENCING GUIDELINES MANUAL (1988) (Principles Govern-
ing  the Redrafting of the Preliminary Guidelines  "g."
(at an unknown page))
27.  There has been great debate over  what exactly  is
a  computer  crime.    There  are  several  schools  of
thought.    The  more articulate school, and the one to
which  the author adheres holds that the  category com-
puter  crime should  be  limited  to   crimes  directed
against  computers; for example, a terrorist destroying
a  computer  with  explosives  would   fall  into  this
category.    Crimes such  as  putting  ghost  employees
on  a  payroll computer  and collecting their  pay  are
merely  age-old accounting frauds; today the  fraud in-
volves a computer because  the records are  kept  on  a
computer.   The   computer  is merely ancillary to  the
crime.  This has been  mislabeled  computer  crime  and
should   merely  be referred to as a fraud  perpetrated
with the aid of a  computer.  Finally, there are infor-
mation  crimes.  These  are crimes related to  the pur-
loining or alteration  of information.   These   crimes
are  more  common  and  more  profitable  due  to   the
computer's ability to hold and access great amounts  of
information.   TEMPEST ELINT can best be categorized as
a information crime.




                        June 7, 1990





                           - 11 -


trespass or even come near the target.  Eavesdropping can be
performed from a nearby office or even a van parked within a
reasonable distance.   This means  that there is  no classic
scene of the crime; and little or no chance of  the criminal
being discovered in the act.28

If the crime is discovered it  will  be  ancillary  to  some
other  investigation.    For example,  if  an  individual is
investigated for insider  trading a search of  his residence
may yield a TEMPEST ELINT device.   The device would explain
how the defendant was obtaining  insider information; but it
was the insider trading, not the  device, that gave away the
crime.

This  is  especially  true  for  illegal TEMPEST  ELINT per-
formed by the state.  Unless the  perpetrators are caught in
the act  there is little  evidence  of   their  spying.    A
trespatory  bug  can  be detected and located; further, once
found it provides tangible evidence that a crime took place.

A TEMPEST ELINT device by its inherent passive nature leaves
nothing to detect.   Since the government is less  likely to
commit an ancillary crime which might be detected there is a
very small chance that  the spying will ever  be discovered.
The  only way to  prevent eavesdropping is  to encourage the
use of  countermeasures: TEMPEST  Certified29 computers  and
terminals.

In merely making  TEMPEST  ELINT   illegal  the  public   is
given the  false impression  of security;  they lulled  into
believing  the  problem  has been  solved.    Making certain
actions illegal does not prevent them from  occurring.  This
is  especially true  for  a  TEMPEST  ELINT  because  it  is
undetectable.  Punishment is an empty  threat if there is no
chance  of being detected; without detection there can be no
apprehension and conviction.   The only way  to prevent some
entity  from eavesdropping  on  one's  computer or  computer
terminal is for  the equipment not to  give off compromising
emanation; it must be TEMPEST Certified.
_________________________
28.  Compare, for  example, the  Watergate breakin   in
which   the  burglars   were discovered  when  they re-
turned  to move  a poorly placed spread spectrum bug.
29.  TEMPEST Certified refers  to the  equipment having
passed   a  testing and emanations  regime specified in
NACSIM 5100A.   This classified document sets forth the
emanations  levels that the NSA believes digital equip-
ment can give  off without compromising the information
it   is  processing.   TEMPEST  Certified equipment  is
theoretically secure against TEMPEST eavesdropping.
     NACSIM 5100A is  classified, as  are  all  details
of  TEMPEST.   To   obtain   access  to  it, contractor
must  prove that  there is demand within  the   govern-
ment for the specific  type of equipment that intend to



                        June 7, 1990





                           - 12 -


The  United States can  solve  this  problem   by  taking  a
proactive stance  on compromising emanations.   The National
Institute of Standards and Technology  (NIST30) is in charge
of  setting  forth standards  of  computer security  for the
private  sector.   NIST  is also  charged  with doing  basic
research to advance the art of computer security.  Currently
NIST does not discuss TEMPEST with  the private sector.  For
privacy's  sake, this policy must be  changed to a proactive
one.  The NIST should publicize  the TEMPEST ELINT threat to
computer security  and  should set  up a  rating system  for
level  of  emanations  produced  by  computer   equipment.31

Further,  legislation  should  be  enacted  to  require  the
labeling  of  all computer  equipment    with  its level  of
emanations and whether it is TEMPEST Certified.  Only if the
public  knows of the problem  can it begin  to take steps to
solve it.

Title III makes  possession  of  a  surveillance   device  a
crime,  unless  it   is  produced  under  contract   to  the
government.  This means that  research into surveillance and
counter-surveillance   equipment   is  monopolized   by  the
government and a  few companies working under  contract with
the government.   If TEMPEST eavesdropping  is criminalized,
then possession of TEMPEST ELINT equipment will be criminal.
Unfortunately,this  does  not  solve the  problem.    Simple
TEMPEST  ELINT equipment is  easy to make.   For  just a few
dollars  many  older  television  sets  can be  modified  to
receive  and  reconstruct EMR.    For  less than  a  hundred
dollars a more  sophisticated TEMPEST ELINT receiver  can be
produced32.

The  problem  with  criminalizing  the  possession   of TEM-
PEST  ELINT  equipment  is  not just that the law  will have
little effect on the use of such equipment, but that it will
have a  negative effect  on counter-measures  research.   To
successfully   design   counter-measures  to   a  particular
surveillance  technique  it  is  vital  to have  a  complete
empirical  understanding   of  how  that   technique  works.
Without  the right  to  legally  manufacture a  surveillance
device there is no possible way for a researcher to have the
knowledge to  produce an effective  counter-measures device.
It  is  axiomatic:  without  a  surveillance device,  it  is
_________________________
certify.  Since  the standard is classified,  the  con-
tractors  can  not  sell  the  equipment  to non-secure
governmental agencies or the public.  This prevents re-
verse  engineering  of  the  standard  for its physical
embodiment, the  Certified equipment.   By   preventing
the    private   sector   from   owning    this   anti-
eavesdropping  equipment,   the  NSA  has   effectively
prevented   the them from protecting the information in
their computers.




                        June 7, 1990





                           - 13 -


impossible to test a counter-measures device.

A number of  companies produce  devices to measure  the ema-
nations  from  electrical  equipment.  Some of these devices
are  specifically   designed  for   bench  marking   TEMPEST
Certified equipment.  This does not  solve the problem.  The
question   arises:  how  much   radiation  at  a  particular
frequency is compromising?   The current answer is  to refer
to NACSIM  5100A.   This document  specifies the  emanations
levels suitable  for Certification.   The  document is  only
available  to  United States  contractors  having sufficient
security  clearance  and  an  ongoing  contract  to  produce
TEMPEST Certified computers  for the  government.   Further,
the correct  levels are specified by the NSA and there is no
assurance that, while these levels are sufficient to prevent
eavesdropping by unfriendly operatives,  equipment certified
under NACSIM 5100A  will have levels  low enough to  prevent
eavesdropping by the NSA itself.

The  accessibility  of  supposedly  correct  emanations lev-
els   does   not  solve  the  problem of  preventing TEMPEST
eavesdropping.     Access   to  NACSIM   5100A  limits   the
manufacturer to selling the equipment  only to United States
governmental  agencies  with  the  need  to  process  secret
information.33  Without  the right to possess  TEMPEST ELINT
equipment  manufacturers  who  wish to  sell  to  the public
sector  cannot determine what a safe level of emanations is.


_________________________
30.  Previously the Bureau of Standards.   The NIST  is
a division of the Commerce Department.
31.  In this case computer equipment would include  all
peripheral  computer equipment.  There is no use is us-
ing a TEMPEST Certified computer if the printer or  the
modem are not Certified.
32.  The  NSA  has tried  to  limit  the   availability
of  TEMPEST  information  to  prevent the spread of the
devices.
     For a discussion of the  First Amendment and prior
restraint  See,  e.g.  The United  States of America v.
Progressive,    Inc.   467   F.Supp   990   (1979,   WD
Wis.)(magazine  intended  to  publish plans for nuclear
weapon; prior   restraint  injunction   issued),   reh.
den.   United  States v. Progressive  Inc. 486 F.Supp 5
(1979,  WD Wis.), motion   den   Morland   v.  Sprecher
443   US   709  (1979)(mandamus), motion denied  United
States  v. Progressive,  Inc. 5  Media L  R (1979,  7th
Cir.),  dismd. without op. U.S. v. Progressive, Inc 610
F.2d 819 (1979, 7th Cir.); New York Times, Co. v.   Un-
ited     States,     403     U.S.     713    (1971)(per
curium)(Pentagon  Papers   case:  setting  forth  prior
restraint  standard   which  government  was unable  to
meet); T.  EMERSON, THE SYSTEM  OF FREEDOM OF   EXPRES-



                        June 7, 1990





                           - 14 -


Further  those manufacturers  with  access to  NACSIM  5100A
should  want  to  verify that  the  levels  set  out in  the
document are, in  fact, low enough to  prevent interception.
Without an actual  eavesdropping device with which  to test,
no   manufacturer  will   be  able   to  produce   genuinely
uncompromising equipment.

Even if the  laws  allow  ownership  of   TEMPEST  Certified
equipment by the public, and even  if the public is informed
of  TEMPEST's   threat  to  privacy,   individuals'  private
information will not necessarily  by protected.  Individuals
may choose  to protect  their own  information on  their own
computers.  Companies  may choose  whether to protect  their
own  private  information.    But  companies that  hold  the
private information of  individuals must  be forced to  take
steps to protect that information.

In  England the   Data   Protection   Act   198434   imposes
sanctions   against   anyone   who   stores   the   personal
information35 on  a computer  and fails  to take  reasonable
measures to prevent disclosure of that information.  The act
mandates that  personal  data  may  not  be  stored  in  any
computer  unless  the  computer bureau  or  data  user36 has
registered under the  act.37    This provides for a  central
registry  and  the tracking  of  which companies  or persons
maintain databases of personal information.   Data users and
bureaux must  demonstrate a  need and  purpose behind  their
possession of personal data.

The  act provides  tort remedies   to  any  person   who  is
_________________________
SION  (1970); Balance  Between Scientific  Freedom  and
NAtional    Security,     23    JURIMETRICS     J.    1
(1982)(current   laws  and  regulations limiting scien-
tific and  technical expression exceed the   legitimate
needs  of national security); Hon. M.  Feldman, Why the
First  Amendment is  not  Incompatible   with  National
Security,   HERITAGE   FOUNDATION  REPORTS  (Jan.   14,
1987).  Compare Bork,   Neutral  Principles   and  Some
First  Amendment  Problems,   47  IND.  L. J. 1  (First
Amendment applies only to  political speech); G.  Lewy,
Can  Democracy   Keep  Secrets,  26   POLICY  REVIEW 17
(1983)(endorsing draconian secrecy laws  mirroring  the
English system).
33.  For  example, the  NSA has  just recently  allowed
the  Drug Enforcement Agency  (DEA) to purchase TEMPEST
Certified  computer  equipment.     The   DEA    wanted
secure computer  equipment because wealthy  drug  lords
had  were   using  TEMPEST   eavesdropping equipment.
34.  An  Act  to  regulate  the  use of   automatically
processed  information  relating to individuals and the
provision of services in respect of such information.
Data Protection Act 1984, Long Title.




                        June 7, 1990





                           - 15 -


damaged by disclosure  of the  personal data.38   Reasonable
care to  prevent the  disclosure is  a  defense.39   English
courts have not  yet ruled what  level of computer  security
measures  constitute  reasonable   care.    Considering  the
magnitude of invasion possible with  TEMPEST ELINT it should
be  clear by  now  that  failure  to use  TEMPEST  Certified
equipment is prima facie unreasonable care.

The Remedies section of  the   act  provides  incentive  for
these entities  to provide  successful protection  of person
data from disclosure or illicit access.   Failure to protect
the data will result  in monetary loss.  This may  be looked
at from the economic efficiency  viewpoint as allocating the
cost of  disclosure  the persons  most  able to  bear  those
costs, and also most able to prevent disclosure.  Data users
that  store  personal  data   would  use  TEMPEST  Certified
equipment as part of their computer security plan, thwarting
would-be eavesdroppers.


_________________________
35.  "Personal data" means data  consisting of informa-
tion  which relates to a  living individual who  can be
identified from  that information  (or  from  that  and
other  information in the possession of the data user),
including any  expression of opinion about the  indivi-
dual  but not any  indication of the intentions of  the
data user in respect of that individual.
Data Protection Act 1984   1(3)
36.  "Data user" means  a person  who holds data,   and
a  persons "Holds" data if --
(a) the data form part of  a collection  of  data  pro-
cessed  or intended to be processed by  or on behalf of
that person  as mentioned  in  subsection   (2)  above;
[subsection  (2) defines "data"] and
(b) that person (either  alone or jointly or in  common
with other persons)  controls the contents  and use  of
the  data comprised in the collection; and
(c) the data are in the form  in which they  have  been
or  are  intended to be processed as mentioned in para-
graph (a) above or (though not  for the time being   in
that  form)  in   a form into which they have been con-
verted after being so processed and  with  a  view   to
being   further   so  processed  on  a subsequent occa-
sion.
Data Protection Act   1(5).
37.  Data Protection Act 1984,   4,5.
38.  An individual who is the subject of personal  data
held  by a data user... and who  suffers damage by rea-
son of  (1)(c) ... the disclosure of the  data, or  ac-
cess  having  been  obtained to  the data without  such
authority as  aforesaid shall  be entitled  to  compen-
sation  from  the data  user... for any  distress which
the individual has  suffered  by  reason of   the   ...



                        June 7, 1990





                           - 16 -


The Data Protection  Act 1984  allocates risk to  those  who
can  bear   it  best  and provides an  incentive for them to
keep other  individuals' data private.   This act  should be
adopted by the United States as part of a full-spectrum plan
to combat TEMPEST eavesdropping.  Data users are in the best
position  to  prevent  disclosure  through  proper  computer
security.   Only  by  making  them  liable for  failures  in



                           - 16 -
77777777777security  can  we  begin  to  rein in TEMPEST ELINT.  Do not
criminalize  TEMPEST ELINT.  Most crimes  that TEMPEST ELINT
would  aid, such a insider trading, are already illegal; the
current laws are adequate.




                           - 16 -
777777777The  National Institute  of Standards and  Technology should
immediately begin  a program  to educate the  private sector
about TEMPEST.  Only if  individuals are aware of the threat
can  they  take  appropriate precautions  or  decide whether
any precautions are necessary.




                           - 16 -
7777777777Legislation   should  be  enacted   to  require   all  elec-
tronic  equipment   to  prominently   display  its level  of
emanations  and  whether  it  is   TEMPEST  Certified.    If
individuals are to choose to protect themselves they must be
able  to  make  a  informed   decision  regarding  how  much
protection is enough.




                           - 16 -
77777777777TEMPEST Certified equipment  should  be   available  to  the
private   sector.    The  current   ban on  selling to  non-
governmental  agencies  prevents  individuals  who  need  to
protect information from having the technology to do so.




                           - 16 -
777777777Possession of  TEMPEST ELINT equipment should  not  be  made
illegal.    The   inherently   passive  nature   and  simple
design  of  TEMPEST ELINT  equipment  means that  making its
possession illegal will  not deter crime;  the units can  be
easily manufactured and are impossible  to detect.  Limiting
their   availability   serves   only   to   monopolize   the
countermeasures research, information, and equipment for the
government;   this   prevents   the  testing,   design   and
manufacture of counter-measures by the private sector.




                           - 16 -
77777777777777Legislation mirroring  England's Data Protection   Act  1984
should be  enacted.  Preventing disclosure  of personal data
can  only be  accomplished  by giving  those companies hold-
ing  the  data  a  reason to protect  it.  If data users are
held liable for  their failure  to take reasonable  security
precautions  they  will begin  to  take  reasonable security
precautions,  including   the  use   of  TEMPEST   Certified
equipment.



9  []         Respectfully submitted,

        Christopher  J.   Seline           cjs@cwru.cwru.edu
        cjs@cwru.bitnet






































9


                        June 7, 1990