Compromising Emanations: Eavesdropping Risks of Computer Displays

Total Page:16

File Type:pdf, Size:1020Kb

Compromising Emanations: Eavesdropping Risks of Computer Displays UCAM-CL-TR-577 Technical Report ISSN 1476-2986 Number 577 Computer Laboratory Compromising emanations: eavesdropping risks of computer displays Markus G. Kuhn December 2003 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom phone +44 1223 763500 http://www.cl.cam.ac.uk/ c 2003 Markus G. Kuhn This technical report is based on a dissertation submitted June 2002 by the author for the degree of Doctor of Philosophy to the University of Cambridge, Wolfson College. Technical reports published by the University of Cambridge Computer Laboratory are freely available via the Internet: http://www.cl.cam.ac.uk/TechReports/ ISSN 1476-2986 Summary Electronic equipment can emit unintentional signals from which eavesdroppers may re- construct processed data at some distance. This has been a concern for military hardware for over half a century. The civilian computer-security community became aware of the risk through the work of van Eck in 1985. Military “Tempest” shielding test standards remain secret and no civilian equivalents are available at present. The topic is still largely neglected in security textbooks due to a lack of published experimental data. This report documents eavesdropping experiments on contemporary computer displays. It discusses the nature and properties of compromising emanations for both cathode-ray tube and liquid-crystal monitors. The detection equipment used matches the capabilities to be expected from well-funded professional eavesdroppers. All experiments were carried out in a normal unshielded office environment. They therefore focus on emanations from display refresh signals, where periodic averaging can be used to obtain reproducible results in spite of varying environmental noise. Additional experiments described in this report demonstrate how to make information emitted via the video signal more easily receivable, how to recover plaintext from em- anations via radio-character recognition, how to estimate remotely precise video-timing parameters, and how to protect displayed text from radio-frequency eavesdroppers by us- ing specialized screen drivers with a carefully selected video card. Furthermore, a proposal for a civilian radio-frequency emission-security standard is outlined, based on path-loss estimates and published data about radio noise levels. Finally, a new optical eavesdropping technique is demonstrated that reads CRT displays at a distance. It observes high-frequency variations of the light emitted, even after diffuse reflection. Experiments with a typical monitor show that enough video signal remains in the light to permit the reconstruction of readable text from signals detected with a fast photosensor. Shot-noise calculations provide an upper bound for this risk. Acknowledgments I would like to thank my former supervisor Ross Anderson for making this entire project possible and for encouraging my initial experiments with his ESL 400 emission monitor. I am also much in dept to Tony Kruszelnicki of TK Electronics in Lincoln for an extended loan of a Dynamic Sciences R-1250 receiver and various accessories. The technical staff of the Computer Laboratory and in particular Piete Brooks earned my thanks for their pa- tience and competent assistance. Robert Watson contributed useful GPIB/TCP gateway software for instrument control during his brief stay as a visiting student. Simon Moore provided a storage oscilloscope and Richard Clayton helped reverse-engineer an annoying problem with its firmware. Richard Clayton, Ross Anderson, and Gareth Evans provided valuable comments on the draft text and were along with Sergei Skorobogatov and David Wheeler available for useful discussion. The purchase of some of the equipment used was made possible through the TAMPER hardware security laboratory support provided by NDS and Hitachi. I was supported by a European Commission Marie Curie training grant. Contents 1 Introduction 9 1.1 Historic background and previous work . 10 1.1.1 Militaryactivities. 10 1.1.2 Openliterature ............................. 12 1.2 Motivationandscope.............................. 14 2 Foundations and test equipment 19 2.1 Antennatypes.................................. 19 2.2 Receivers..................................... 23 2.3 Receivercalibration. 26 2.3.1 Impulsebandwidth ........................... 28 2.3.2 Impulsestrength ............................ 31 2.4 Signalcorrelation ............................... 33 3 Analog video displays 37 3.1 Video-signaltiming............................... 37 3.2 Analogvideo-signalspectra . 40 3.3 Eavesdroppingdemonstration . 45 3.3.1 Realtimemonitoring . 45 3.3.2 Experimentalsetup. 47 3.3.3 Results.................................. 47 3.4 Radio character recognition . 54 3.5 Hiddentransmissionviaditherpatterns. 57 3.6 Filtered fonts as a software protection . ...... 60 4 Digital video displays 67 4.1 Casestudy:Laptopdisplay .......................... 68 4.2 Case study: Digital Visual Interface . 77 5 Emission limits 85 5.1 Existingpublicstandards. 86 5.1.1 Ergonomicstandards . 87 5.1.2 Radio-frequency interference standards . ..... 87 5.2 Considerations for emission security limits . ..... 89 5.2.1 Radionoise ............................... 91 5.2.2 Radiosignalattenuation . 92 5.2.3 Power-line noise and attenuation . 94 5.2.4 Antennagain .............................. 95 5.2.5 Processinggain ............................. 96 5.3 Suggestedemissionlimits. 97 6 Optical eavesdropping of displays 105 6.1 Projective observation with telescopes . 105 6.2 Time-domain observation of diffuse CRT light . 106 6.3 Characterization of phosphor decay times . 107 6.3.1 Instrumentation. .108 6.3.2 Measurementmethod. .110 6.3.3 Results..................................111 6.4 Opticaleavesdroppingdemonstration . 116 6.5 Threatanalysis .................................120 6.5.1 Directobservation . .120 6.5.2 Indirectobservation. .122 6.5.3 ObservationofLEDs . .123 6.6 Receiver design considerations . 124 6.7 Countermeasures ................................126 7 Review, outlook and conclusions 129 A Electromagnetic fields 143 A.1 Maxwell’sequations............................... 143 A.2 Quantitiesandunits ..............................146 A.3 Electromagneticemanations . 146 A.4 Transmissionlinesandantennas. 148 A.5 Time-domain characterization of antennas . 151 B Notes on experimental setups 157 B.1 Impedance-matchedattenuators . 157 B.2 Videosyncsignalgeneration . 158 C Glossary 161 Chapter 1 Introduction “It has long been a dream of cryptographers to construct a ‘perfect’ machine [. .] The development in the last twenty years of electronic machines that accumulate data, or ‘remember’ sequences of numbers or letters, may mean that this dream has already been fulfilled. If so, it will be the nightmare to end all nightmares for the world’s crypt- analysts. In fact, the people who live in the vicinity of the National Security Agency think that there already are too many cipher and de- coding machines in existence. The electronic equipment plays havoc with their television reception.” — D.T. Moore, M. Waller: Cloak & Cipher, 1965 [1, p. 153] Computer and communication equipment receives and emits energy in various forms, such as electrical currents, heat, light, conducted and radiated electromagnetic waves, sound and vibrations. Most energy consumed will be released as heat or is used to form intended symbols on communication channels. Some of the rest is correlated in various ways to processed data and can form unintended information leaks. This opens unconventional opportunities for technically sophisticated outsiders to get unauthorized access to processed confidential information. Compromising electric, electromagnetic, optic, acoustic, ultrasonic, mechanic, etc. emana- tions can be a potential computer security threat if information is emitted in a form that can be practically separated from background noise and decoded at sufficient distance us- ing compact and available equipment. It can then be used to bypass commonly employed physical, cryptographic, and software access-control mechanisms at the operating-system, network, and application level. Such exploitable emanations can occur as a result of: the normal operation of a system • deliberate or accidental exposure of a device to an unusual environment • the execution of software that was designed to modulate data into emitted energy • Carefully chosen software measures can sometimes be applied to control the emitted signals. They can emit data in a form particularly suited for easy remote reception or 9 10 1.1. HISTORIC BACKGROUND AND PREVIOUS WORK they can render the otherwise feasible remote reconstruction of data far less practical. In the latter case, such measures can be a welcome low-cost alternative for, or an additional protection layer to, hardware shielding. Digital computers and telecommunication equipment have penetrated our civilization over the past half century, and at the same time, many aspects of human society have become significantly dependent on the availability, integrity, or confidentiality of automatically processed information. The risk posed by malicious abuse of this information infrastruc- ture is widely recognized today, as is demonstrated by the significant current media in- terest in computer security incidents and the growth of an information security industry that offers a wide range of countermeasures. Historically, most practical outsider attacks on information systems have involved some form of access to communication links, in order to eavesdrop exchanged data or imper- sonate
Recommended publications
  • Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
    Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack.
    [Show full text]
  • Digital Visual Interface (DVI)
    Digital Visual Interface 1 Digital Visual Interface Digital Visual Interface (DVI) A male DVI-D (single link) connector. Type Digital computer video connector Production history Designer Digital Display Working Group Designed April 1999 Produced 1999 to present Superseded by DisplayPort General specifications Hot pluggable Yes External Yes Video signal Digital video stream: (Single) WUXGA (1,920 × 1,200) @ 60 Hz (Dual) Limited by copper bandwidth limitations, DVI source limitations, and DVI sync limitations. Analog RGB video (−3 dB at 400 MHz) Pins 29 Data Data signal RGB data, clock, and display data channel Bitrate (Single link) 3.96 Gbit/s (Dual link) Limited only by copper bandwidth limitations, DVI source limitations, and DVI sync limitations. Max. devices 1 Protocol 3 × transition minimized differential signaling data and clock Pin out A female DVI-I socket from the front Pin 1 TMDS data 2− Digital red− (link 1) Pin 2 TMDS data 2+ Digital red+ (link 1) Digital Visual Interface 2 Pin 3 TMDS data 2/4 shield Pin 4 TMDS data 4− Digital green− (link 2) Pin 5 TMDS data 4+ Digital green+ (link 2) Pin 6 DDC clock Pin 7 DDC data Pin 8 Analog vertical sync Pin 9 TMDS data 1− Digital green− (link 1) Pin 10 TMDS data 1+ Digital green+ (link 1) Pin 11 TMDS data 1/3 shield Pin 12 TMDS data 3- Digital blue− (link 2) Pin 13 TMDS data 3+ Digital blue+ (link 2) Pin 14 +5 V Power for monitor when in standby Pin 15 Ground Return for pin 14 and analog sync Pin 16 Hot plug detect Pin 17 TMDS data 0− Digital blue− (link 1) and digital sync Pin 18 TMDS data 0+ Digital blue+ (link 1) and digital sync Pin 19 TMDS data 0/5 shield Pin 20 TMDS data 5− Digital red− (link 2) Pin 21 TMDS data 5+ Digital red+ (link 2) Pin 22 TMDS clock shield Pin 23 TMDS clock+ Digital clock+ (links 1 and 2) Pin 24 TMDS clock− Digital clock− (links 1 and 2) C1 Analog red C2 Analog green C3 Analog blue C4 Analog horizontal sync C5 Analog ground Return for R, G, and B signals Digital Visual Interface (DVI) is a video display interface developed by the Digital Display Working Group (DDWG).
    [Show full text]
  • Image Steganography Applications for Secure Communication
    IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION by Tayana Morkel Submitted in partial fulfillment of the requirements for the degree Master of Science (Computer Science) in the Faculty of Engineering, Built Environment and Information Technology University of Pretoria, Pretoria May 2012 © University of Pretoria Image Steganography Applications for Secure Communication by Tayana Morkel E-mail: [email protected] Abstract To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication. Encryption is often used to protect secret information from unauthorised access. Encryption, however, is not inconspicuous and the observable exchange of encrypted information between two parties can provide a potential attacker with information on the sender and receiver(s). The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. This dissertation investigates and discusses the use of image steganography, a technology for hiding information in other information, to facilitate secure communication. Secure communication is divided into three categories: self-communication, one-to-one communication and one-to-many communication, depending on the number of receivers. In this dissertation, applications that make use of image steganography are implemented for each of the secure communication categories. For self-communication, image steganography is used to hide one-time passwords (OTPs) in images that are stored on a mobile device. For one-to-one communication, a decryptor program that forms part of an encryption protocol is embedded in an image using image steganography and for one-to-many communication, a secret message is divided into pieces and different pieces are embedded in different images.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Liquid Crystal Display Module
    LIQUID CRYSTAL DISPLAY MODULE Product Specification DENSITRON STANDARD LCD MODULE PRODUCT LM/TS 3234 – LM/TS 4234 – LM/TS 6234 NUMBER DEFINITION Date Display 240*128 dots 19/04/04 INTERNAL APPROVALS Quality Mgr Product Mgr Project Leader Mech. Eng Electr. Eng Date: Date: Date: Date: Date: DENSITRON TECHNOLOGIES plc. – PROPRIETARY DATA – ALL RIGHTS RESERVED TABLE OF CONTENTS 1 PART NUMBER DESCRIPTION FOR AVAILABLE OPTIONS....................................................................................4 2 MAIN FEATURES..................................................................................................................................................................5 3 MECHANICAL SPECIFICATION ......................................................................................................................................6 3.1 MECHANICAL CHARACTERISTICS..........................................................................................................................6 3.2 MECHANICAL DRAWING...........................................................................................................................................7 4 ELECTRICAL SPECIFICATION........................................................................................................................................8 4.1 ABSOLUTE MAXIMUM RATINGS.............................................................................................................................8 4.2 ELECTRICAL CHARACTERISTICS............................................................................................................................8
    [Show full text]
  • Lcd Product Specification
    LCD PRODUCT SPECIFICATION PART NUMBER: USMPG-TQ240128D-SZWBI 240x128 Graphic LCD; STN Blue Display DESCRIPTION: Mode; Transmissive, Negative, with LED Sidelight and 6 O'Clock Viewing Direction. ISSUE DATE APPROVED BY CHECKED BY PREPARED BY (Customer Use Only) PROPRIETARY THIS SPECIFICATION IS THE PROPERTY OF US MICRO PRODUCTS AND SHALL NOT BE REPRODUCED OR NOTE: COPIED WITHOUT THE WRITTEN PERMISSION OF US MICRO PRODUCTS AND MUST BE RETURNED TO US MICRO PRODUCTS UPON ITS REQUEST. www.usmicroproducts.com CONFIDENTIAL (800) 741-7755 USMPG-TQ240128D-SZWBI 1.Features a) +5V power supply b) Built-in controller (RA6963L2NA) c) 240x128 dots graphic LCD module d) STN Blue mode, transmissive; neagative display e) Viewing direction: 6:00 O’clock f) 1/128 duty cycle g) (white)LED backlight 2.Outline dimension CONFIDENTIAL 3.Absolute maximum ratings Item Symbol Standard Unit Power voltage VDD-VSS 0 - 7.0 V Input voltage VIN VSS - VDD Operating temperature range VOP -20 - +70 ℃ Storage temperature range VST -30 - +80 www.usmicroproducts.com 1 (800) 741-7755 USMPG-TQ240128D-SZWBI 4.Block diagram /WR COM /RD LCD PANEL /CE 240X128 Dots C/D COM /RST DB0~DB7 RA6963 FS 13 COL COL COL VDD 8 RAM V0 VSS 2 FG VEE DC/DC LEDA LED SIDE(WHITE) 5.Interface pin description Pin External CONFIDENTIAL Symbol Function No. connection 1 VSS Signal ground for LCM (GND) 2 VDD Power supply Power supply for logic (+5V) for LCM 3 V0 Operating voltage for LCD 4 C/D MPU H: Instruction L: Data 5 /RD MPU Read enable signal 6 /WR MPU Write enable signal 7~14 DB0~DB7 MPU Data bus line 15 /CE MPU Chip enable signal 16 /RST MPU Reset signal 17 VEE Negative voltage output 18 MD2 Selection of number of columns:H-32,L-40 19 FS MPU Font selection: H=6x8 dot matrix, L=8x8 dot matrix 20 LEDA BKL power supply Power supply for BKL(+5.0V) Contrast adjust DC/DC build in VDD~V0: LCD Driving voltage VR: 10k~20k www.usmicroproducts.com 2 (800) 741-7755 USMPG-TQ240128D-SZWBI 6.Optical characteristics θ φ 1 φ1 2 θ2 12:00 9:00 3:00 6:00 STN type display module (Ta=25℃, VDD=5.0V) Item Symbol Condition Min.
    [Show full text]
  • 4957 User Manual
    4957D/E/F Microwave Analyzer User Manual China Electronics Technology Instruments Co., Ltd. Contents Foreword Thanks very much for purchasing and using the 4957D/E/F microwave analyzer produced by China Electronics Technology Instruments Co., Ltd. The Company follows the ISO9000 standard always during production and adheres to the customer-oriented and quality-first principles. Please read carefully the manual, so as to facilitate the operation. We will spare no efforts to meet your requirements, providing you with operating devices with the higher cost performance and better after-sales services. We always adhere to the principle of“Good Quality, Satisfied Service”, providing customers with satisfactory products and services as well as work convenience and shortcut. The hotline is shown below, and we are looking forward to hear from you: Qingdao Tel: +86-0532-86896691 Website: www.ceyear.com E-mail: [email protected] Address: No. 98, Xiangjiang Road, Qingdao City, China Postal code: 266555 The manual introduces the application, performance and features, basic principles, usage, maintenance and precautions of the 4957D/E/F microwave analyzer, facilitating your quick understanding the usage and key points of the tester. To operate the product well and provide you with higher economic effectiveness, please read the manual carefully. Mistakes and omissions can hardly be avoided due to time urgency and writer’s knowledge limit. Your valuable comments and suggestions are highly welcome! We are sorry for any inconvenience caused due to our errors. The manual is the third version of the 4957D/E/F microwave analyzer Manual, with version number of C.2. The contents hereof are subject to change without notice.
    [Show full text]
  • Dell P2319H User's Guide
    Dell P2219H/P2319H/P2419H/P2719H User’s Guide Model: P2219H/P2319H/P2419H/P2719H Regulatory model: P2219Hb/P2319Ht/P2319Hc/P2419Hb/P2419Hc/P2719Ht NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. 2018 - 06 Rev. A00 Contents About your monitor . 6 Package contents. 6 Product features . 8 Identifying parts and controls . 9 Front view . 9 Back view . .10 Side view. 11 Bottom view . 12 Monitor specifications . 13 Resolution specifications . .16 Supported video modes . .16 Preset display modes . .16 Electrical specifications . 17 Physical characteristics . 17 Environmental characteristics . 20 Power management modes. 21 Pin assignments . 24 Plug and play capability . 27 Universal Serial Bus (USB) interface . 27 USB 3.0 . .27 USB 2.0 . .27 USB 3.0 upstream connector . 28 USB 3.0 downstream connector . 28 USB 2.0 downstream connector . 29 USB ports . 29 LCD monitor quality and pixel policy . 29 Maintenance guidelines . 30 │3 Cleaning your monitor . 30 Setting up the monitor . 31 Attaching the stand . 31 Connecting your monitor . 33 Connecting the DisplayPort (DisplayPort to DisplayPort) cable. 33 Connecting the VGA cable (optional) . 33 Connecting the HDMI cable (optional) . 34 Connecting the USB 3.0 cable. 34 Organizing your cables. 35 Removing the monitor stand .
    [Show full text]
  • Image Steganography: Protection of Digital Properties Against Eavesdropping
    Image Steganography: Protection of Digital Properties against Eavesdropping Ajay Kumar Shrestha Ramita Maharjan Rejina Basnet Computer and Electronics Engineering Computer and Electronics Engineering Computer and Electronics Engineering Kantipur Engineering College, TU Kantipur Engineering College, TU Kantipur Engineering College, TU Lalitpur, Nepal Lalitpur, Nepal Lalitpur, Nepal [email protected] [email protected] [email protected] Abstract—Steganography is the art of hiding the fact that Data encryption is basically a strategy to make the data communication is taking place, by hiding information in other unreadable, invisible or incomprehensible during transmission information. Different types of carrier file formats can be used, by scrambling the content of data. Steganography is the art but digital images are the most popular ones because of their and science of hiding information by embedding messages frequency on the internet. For hiding secret information in within seemingly harmless messages. It also refers to the images, there exists a large variety of steganography techniques. “Invisible” communication. The power of Steganography is in Some are more complex than others and all of them have hiding the secret message by obscurity, hiding its existence in respective strong and weak points. Many applications may a non-secret file. Steganography works by replacing bits of require absolute invisibility of the secret information. This paper useless or unused data in regular computer files. This hidden intends to give an overview of image steganography, it’s uses and information can be plaintext or ciphertext and even images. techniques, basically, to store the confidential information within images such as details of working strategy, secret missions, According to Bhattacharyya et al., “Steganography’s niche in criminal and confidential information in various organizations security is to supplement cryptography, not replace it.
    [Show full text]
  • The Fourth Amendment's National Security Exception: Its History and Limits L
    Vanderbilt Law Review Volume 66 | Issue 5 Article 1 10-2013 The ourF th Amendment's National Security Exception: Its History and Limits L. Rush Atkinson Follow this and additional works at: https://scholarship.law.vanderbilt.edu/vlr Part of the Fourth Amendment Commons Recommended Citation L. Rush Atkinson, The ourF th Amendment's National Security Exception: Its History and Limits, 66 Vanderbilt Law Review xi (2019) Available at: https://scholarship.law.vanderbilt.edu/vlr/vol66/iss5/1 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Law Review by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. The Fourth Amendment's National Security Exception: Its History and Limits L. Rush Atkinson 66 Vand. L. Rev. 1343 (2013) Each year, federal agents conduct thousands of "national security investigations" into suspected spies, terrorists, and other foreign threats. The constitutional limits imposed by the Fourth Amendment, however, remain murky, and the extent to which national security justifies deviations from the Amendment's traditional rules is unclear. With little judicial precedent on point, the gloss of past executive practice has become an important means for gauging the boundaries of today's national security practices. Accounts of past executive practice, however, have thus far been historically incomplete, leading to distorted analyses of its precedential significance. Dating back to World War II, national security investigations have involved warrantless surveillance and searches-conduct clearly impermissible in the traditional law-enforcement context- authorized under the theory of a "national security" or "foreign intelligence" exception to the Fourth Amendment.
    [Show full text]
  • An Introduction to Computer Security: the NIST Handbook U.S
    HATl INST. OF STAND & TECH R.I.C. NIST PUBLICATIONS AlllOB SEDS3fl NIST Special Publication 800-12 An Introduction to Computer Security: The NIST Handbook U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards Barbara Guttman and Edward A. Roback and Technology COMPUTER SECURITY Contingency Assurance User 1) Issues Planniii^ I&A Personnel Trairang f Access Risk Audit Planning ) Crypto \ Controls O Managen»nt U ^ J Support/-"^ Program Kiysfcal ~^Tiireats Policy & v_ Management Security Operations i QC 100 Nisr .U57 NO. 800-12 1995 The National Institute of Standards and Technology was established in 1988 by Congress to "assist industry in the development of technology . needed to improve product quality, to modernize manufacturing processes, to ensure product reliability . and to facilitate rapid commercialization ... of products based on new scientific discoveries." NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry's competitiveness; advance science and engineering; and improve public health, safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain custody of the national standards of measurement, and provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce, industry, and education with the standards adopted or recognized by the Federal Government. As an agency of the U.S. Commerce Department's Technology Administration, NIST conducts basic and applied research in the physical sciences and engineering, and develops measurement techniques, test methods, standards, and related services. The Institute does generic and precompetitive work on new and advanced technologies. NIST's research facilities are located at Gaithersburg, MD 20899, and at Boulder, CO 80303.
    [Show full text]
  • Prepared by Dr.P.Sumathi
    COMPUTER GRAPHICS 18BIT53C UNIT I: Overview of Graphics System – Display Devices – CRT – Random Scan and Raster Scan Monitors – Techniques for Producing Colour Display – Beam – Penetration and Shadow – Mask Methods – DVST – Plasma – Panel Displays – Hardcopy Devices – Printers and Plotters – Display Processors – Output Primitives – DDA and Bresenham’s line drawing algorithms – Antialiasing lines – Bresenham’s Circle Algorithm – Character Generation. UNIT II: Two-dimensional Transformations – Scaling, Translation and Rotation – Matrix Representations – Composite Transformations – Reflection – Shearing – Other Transformations. Windowing and Clipping – Concepts – Cohen and Sutherland Line Clipping Algorithm – Midpoint Subdivision. UNIT III: Three dimensional Concept- Three-Dimensional object representations – polygon surfaces – polygon tables- plane equations - Three-Dimensional geometric transformations – translation – rotation – scaling – other transformations. UNIT IV: Three-Dimensional viewing – viewing pipeline - Display Techniques – Parallel Projection – Perspective Projection – Hidden-Surface and Hidden-Line removal – Back face removal – Depth Buffer Method – Scan Line Method – BSP Tree Methods – Depth-Sorting Method – Area-subdivision Method – Octree Methods – Comparison of Hidden-Surface Methods. UNIT V: Colour models and colour applications – properties of light – standard primaries and the chromaticity diagram – xyz colour model – CIE chromaticity diagram – RGB colour model – YIQ, CMY, HSV colour models, conversion between HSV and RGB models, HLS colour model, colour selection and applications. TEXT BOOK 1. Donald Hearn and Pauline Baker, “Computer Graphics”, Prentice Hall of India, 2001. Prepared by Dr.P.Sumathi 1 COMPUTER GRAPHICS Computer graphics is an art of drawing pictures on computer screens with the help of programming. It involves computations, creation, and manipulation of data. In other words, we can say that computer graphics is a rendering tool for the generation and manipulation of images.
    [Show full text]