1. Introduction
Information security (IS) over time has become a major issue for both the scientific community and business. The massive growth of data has made it difficult for organizations to maintain visibility into their data, resulting in an incomplete understanding of data storage and processing. The data at risk are mostly data stored on outdated or deteriorating media that are difficult to access or are readily available but at risk of being lost or modified. Intrusion by electromagnetic (EM) emission leaves no trace of an attacker’s presence; the attacked device operates regularly and the infiltration does not cause any physical damage. The emitted EM waves often contain important data being processed by devices. It may be possible in some cases to reconstruct the hidden information by intercepting unwanted EM emissions (leakage). There are many sources of EM leakage, including computer monitors, wireless keyboards and mice, scanners, printers, piezoelectric sensors (PES), radio-frequency identification devices (RFIDs), and conductors.
Various sources of unintentional EM emissions have been thoroughly explored from different viewpoints [
1,
2,
3,
4,
5,
6,
7,
8,
9,
10,
11,
12]. Computer monitors emit EM waves related to the horizontal frequency and pixel frequency, as well as the refresh rate used to display video images. In [
1], the authors describe problems caused by four types of EM emissions from (1) displays, (2) keyboard input data, (3) printed information, and (4) communication data. The authors of [
2] investigated the radiation effects of cathode ray tubes (CRTs), laptops, and flat panel displays. Recognizing the potential risks associated with EM leaks has proven to be important in maintaining the monitoring of information security. Furthermore, other protective measures can be applied. A special glass providing EM protection (a shielding window) can be placed on the computer monitor to eliminate high-frequency components, which increases the difficulty of reproducing the EM signals [
3]. In [
4], the authors consider the interception and security risks of wireless keyboard signals, regardless of communication protocols, noise, and physical obstacles. This article further explores the topic of wireless keyboards, mice, and universal serial bus (USB) dongles and focuses on preventive measures against attackers’ malicious activity. Printers as sources of unintentional EM emissions are discussed in [
5,
6,
7]. Using commercial printers connected via a local area network is quite common for printing large amounts of data in office environments. These printers are typically equipped with various components, such as hard drives, power and signal lines, connectors, and wireless transceivers. Measuring the EM emissions near the printer enables the reconstruction of printed data. EM leakage from various sources, such as signal lines, power lines, telephone lines, and water pipes, can also cause numerous security issues, as discussed in [
8]. The main cause of concern in such scenarios is the characteristic of the conductor acting as an antenna at high frequencies. Advances in wireless communications research have led to numerous new applications that require the acquisition and transmission of vast amounts of sensor data. Processing and storage of data from sensors subjected to EM interference (EMI) and inductive coupling are discussed in [
9]. In the context of RFID, attackers primarily focus on probing a wide range of operating frequencies from the device’s EM spectrum. It is important to emphasize that accessibility makes RFID tags very vulnerable to side-channel attacks. Different types of security issues in RFID are discussed in [
10,
11,
12].
The main problem associated with unwanted EM emanation is that the data can be accessed via EM emissions from electronic components and devices that process sensitive information. One type of protection against intrusions based on unintentional EM emissions is to place electronic equipment and devices in Faraday cages and shielded chambers. Other measures include shielding, zoning, separating transmission lines, and masking. In the context of unintentional EM emissions, we have discussed in detail the security issues associated with EM leakage from computer monitors [
13] and wireless keyboards [
4] in our previous work. This research aims to expand our understanding of the EM emanation of devices such as laser printers, scanners, conductors, PES, and RFID devices in the context of the growing concern over security threats once reserved exclusively for the military and now for general-purpose devices. More precise computing and greater storage capabilities available in recent years have played a significant role in this transition. Attacks on sensitive data through EM leaks have become simpler and more frequent as a consequence of the above.
The contribution of this study can be summarized based on several objectives, main goals, and considerations:
The first objective of this study is to advance the prevention of EM data leakage by providing valuable insights into the latest trends and standards to effectively mitigate the risk of unintentional EM emissions.
We provide a comprehensive analysis of side-channel attacks and various telecommunication electronics materials protected from emanating spurious (TEMPEST) specifications and settings by reviewing the available references. TEMPEST specifications include EM shielding, zoning, and masking, as well as the minimum physical distance between wires or equipment that transmit or process sensitive data.
Another goal is to provide a detailed analysis of TEMPEST specifications and configurations, emphasizing their relevance and implications in the context of unintentional EM emanations.
We also discuss countermeasures against malicious activity and techniques for protecting devices, tools, and equipment with EM shielding.
Finally, we consider TEMPEST profiling associated with various EM leakage sources.
This paper is organized as follows:
Section 1 is an introduction, followed by a related work.
Section 3 describes the sources of electromagnetic leakage.
Section 4 focuses on TEMPEST profiling.
Section 5 contains a comparative analysis and discussion.
Section 6 concludes the paper.
2. Related Work
Attacks against user information can be either passive or active [
14]. Passive attacks do not affect the transmitter, receiver, or data sent over the communication channel, while active attacks can be performed by malicious users to compromise any of these. An active attack is a type of cyber security breach in which an unauthorized intruder attempts to modify or delete data or disrupt the regular function of a system or network. The malicious user in this attack directly takes action against the targeted system or network [
15]. Cybercriminals often use tactics to disguise their true identity or impersonate themselves to infiltrate restricted areas within networks or systems to reach the data. During an active attack, they aim to use or modify compromised data to facilitate access to more confidential and valuable data. The most used types of active attacks are denial-of-service, masquerading, message tampering, replay, and bounce. Denial-of-service occurs when an attacker disrupts the regular operation of communication systems. In a masquerade attack, malicious users impersonate themselves to obtain confidential information. Message tampering is an attack on the integrity of the original data. A replay attack involves intercepting and resending a message to achieve a semblance of authorization. A bounce attack occurs when a malicious user manipulates data and stores false data in log files. To improve protection against an active attack, it is critical to implement certain protective measures that may include the use of one-time passwords for transaction and session authentication, a unique session key for each transaction, an authentication protocol, and cyber risk ratings to monitor the threat environment in real time. Passive attacks include various techniques allowing attackers to monitor or exploit system data without any noticeable impact on system resources or data modifications. These attacks can be difficult to detect, leaving the victim unaware of the attack. The primary goal of passive attacks is to gather sensitive information or identify network vulnerabilities. An example of a passive attack is eavesdropping; attackers intercept and use data transmitted between two devices connected to a computer network. Eavesdropping attacks often involve inserting software into the network that intercepts and analyzes current network traffic. The release of messages is another form of passive attack; attackers install malware on the device to monitor activities such as sending messages, email exchanges, or file sharing. Protection against passive attacks involves access control and data encryption. Two encryption methods are most commonly used: symmetric key encryption, which uses a single encryption/decryption key for both parties, and public key encryption, where each party has a public and private key in communication.
A side-channel attack is a passive attack based on monitoring communication between two (or more) parties by “sniffing” on devices, equipment, and transmissions without leaving any trace. This attack uses specific factors such as EM emission, timing, and power consumption [
16]. The side-channel attack goal is to exploit unintentional EM emissions [
13,
17]. According to [
18], side-channel attacks usually involve physical intrusions. An attacker steals protected and sensitive data by observing the physical behavior of a system. This problem is also related to the compromising EM radiation (CER) associated with devices protected by some of the cryptographic techniques [
19]. The best way to effectively counter side-channel attacks is to develop encryption systems resistant to physical observation and manipulation. This can be achieved through the implementation of various techniques, such as balancing, blinding, and masking. To effectively counter side-channel attacks, it is also necessary to monitor and detect unusual behavior within the encryption system using sensors that measure and document various system parameters, such as energy consumption or EM radiation. Authentication can also be used to confirm the identity and credibility of users. If side-channel attacks cannot be prevented or detected, they can be mitigated by reducing their impact or effectiveness. This can involve implementing different strategies, including encryption, key management, or appropriate countermeasures [
20].
In [
2], the author investigated compromised emanation from CRTs, laptops, and flat panel displays. He successfully reconstructed an image on a CRT display from a three-meter distance. The authors of [
21] published another study on information leakage in optical emissions. They demonstrated that LED status indicators on data transmission devices can transmit modulated optical signals correlating with the information being processed. According to [
22], eavesdropping on emitted video signals is another EM security issue because the information shown on displays requires a high level of security, and the amount of related data is much greater than others. The emanation strength of wireless devices is weaker than the displayed signal, making it difficult to decipher the original signal.
Wireless communication is regulated worldwide. The choice of frequency range and RF communication system power can be determined by specific application requirements and existing regulations [
23]. The industrial, scientific, and medical (ISM) bands range from 2.4 GHz to 2.5 GHz and are determined by the International Telecommunication Union (ITU) radio regulations (RR). The family of standards created by the Institute of Electrical and Electronics Engineers (IEEE) 802.11 specifies the set of medium access control (MAC) and physical layer protocols for implementing computer communication over wireless local area networks (WLANs) [
24]. The standards use 2.4 GHz, 5 GHz, 6 GHz, and 60 GHz frequency bands. Since wireless keyboards use the ISM band, information can also be intercepted via wireless local area networks [
25]. It should be noted that well-designed systems take into account various factors such as data transfer rate, quality of service, interference, security, and coverage. The security risks caused by wireless signal interception, regardless of the communication protocol, radio noise, or physical obstacles, are discussed in [
4]. In [
1], the authors describe the problems caused by EM emissions from keyboards and communication data. They were able to decode the keys pressed on the keyboard by the operator. The authors of [
26,
27,
28] discussed the security risks of wireless USB keys because an unencrypted input signal can be intercepted and used to access the attached device.
One of the issues related to EM leakage is conducted emission. A conductor charged to a nonzero potential or carrying electrical current acts as an antenna that releases energy into the environment in the form of an EM wave. Emissions can be conducted directly into the circuit on the input lines or through near-field energy that is capacitive coupled (electrical field). Conductive coupling occurs when the coupling path between a source and receptor forms contact through a wire, cable, or transmission line [
29]. Conductive emissions can also be conducted unintentionally through near-field energy magnetically coupled to a circuit (a magnetic field). Energy from these fields can couple to other conductors within the device and radiate into the environment outside the device. Conversely, every conductor acts as an antenna that converts the energy of the EM field into voltages and currents [
30]. The possibility of EMI caused by unintentional emissions from cables is discussed in [
31]. The authors studied the emission of unshielded twisted pair (UTP) cables carrying high-frequency signals (up to 10 GHz) and found that UTP cables emit unwanted emissions in the 6 GHz band.
A printed image can be reconstructed by receiving radiation emitted by a laser printer [
1]. The authors of [
32] improved the measurement of monochrome laser printer radiation using several special test patterns. In [
20], the authors analyzed compromising emanations of laser printers from signal line conductors, power cables, and electrical radiation testing. The authors of [
33] investigated the acoustic emanations of the printer and succeeded in distinguishing the letters W and J. An attack method based on dot matrix printer sound recording is presented in [
34].
In most scanners, the sensing medium is an electronic, photosensitive integrated circuit known as a charge-coupled device (CCD). A light-sensitive photo is placed along the CCD that converts the brightness level into an electrical signal, which is then processed into a digital image [
35]. Scanners create digital files from paper documents. Therefore, it is important to consider file security to ensure its confidentiality. In [
36], the authors used two methods to securely scan documents: (1) scan to an encrypted, password-protected pdf file sent via USB device or e-mail; (2) scan to a local USB drive that provides hardware encryption.
Piezoelectric sensors convert mechanical energy (pressure, strain, and vibration) into electrical signals. Researchers have so far succeeded in producing sensors that are durable, efficient, and lightweight. These sensors can be used as stand-alone energy sensors, useful for medical, industrial, and home applications [
37,
38]. Their typical application is in the flat area between the two extremes of the frequency response curve. The response of the sensor decreases at low frequencies because the generated charge cannot be retained. At high frequencies, there is a peak at the resonant frequency [
9]. Data transmission, reception, and processing over wireless channels are of particular interest when it comes to personal information generated by PES that must be transmitted in this way [
39] due to EM interference and inductive coupling.
Digital data processed by RFID have a limited number of signal transmissions, which affects the data rate. The transmitter and receiver must use the same data rate and be synchronized to transmit the correct data. Current RFID technologies are primarily designed to optimize performance and are less concerned with resilience or security [
11]. The threats and attacks described in [
12] are classified based on network layers. In [
40], the authors also consider the network protocol as a source of attacks on RFID systems. The authors of [
41] investigate side-channel attacks on RFID systems and discuss information leakage during their activities related to time information, energy consumption, or EM leakage. The authors demonstrated the high efficiency of side-channel attacks. A software-defined radio involves many radio components replaced by their software variants, allowing flexible software control of the radio [
42].
It is necessary to emphasize the application of network security standards designed to prevent, detect, and address network compromises. The US National Institute of Standards and Technology (NIST) has developed cybersecurity standards to meet the specific needs of US industry, government, and the public. NIST focuses on key areas such as cryptography, education, technologies, risk management, identity and access management, and privacy, as well as ensuring the reliability of networks and platforms [
23]. The ISO/IEC 27k [
43] international standard for cyber security offers a best practice approach to helping organizations manage their information security by addressing people, processes, and technology [
24]. It is important to note, however, that these standards do not include protection against EM leakage. Due to the general improvement in information technology, in some cases, hidden information can be reconstructed by intercepting EM emissions. TEMPEST is considered a tool for identifying vulnerabilities in information systems processing sensitive data and plays a key role in improving security measures. EM waves can partially or completely interrupt communication, depending on their strength. TEMPEST integrates various security measures, such as zoning, shielding, filtering, and masking, to protect sensitive data. Devices must be positioned at certain distances with additional built-in protection [
4,
7]. Wires transmitting sensitive data should be isolated from those transmitting unclassified data through RED/BLACK separation [
44]. Overlapping jamming signals can also be used to mask real data [
1].
This study aims to improve the understanding of EM leakage from devices designed for general purposes, as there is increasing concern about security threats to sensitive data. Compromising security through EM leaks has become simpler and more cost-effective, so attackers can perform their malicious activities in shorter periods. This study also makes a valuable contribution to EM data leakage prevention research by providing insight into the latest trends and standards for effectively mitigating the potential risk of inadvertent EM emanation.
3. Sources of Electromagnetic Leakage
Electronic devices and gadgets are getting smaller, lighter, faster, have longer battery life, and continue to increase computing power. Such devices require smaller electronic components, which reduce electromagnetic interference. A compact design, on the other hand, also means smaller distances between components, traces, and packages, leading to increased field interactions, current loops, ground loops, and other potential sources of EM leakage [
45]. An electrical device characteristic that allows it to function properly in the presence of other devices without affecting them is called electromagnetic compatibility (EMC) [
4]. The main focus of EMC is to analyze unwanted EM emissions, which are categorized into two groups: conductive coupling and radiative coupling. Conductive coupling requires physical support due to transmission interference within the system. Although the radiation is usually low, the circuits are often connected with long conductors or wires, which act as antennas [
46]. Radiative coupling occurs when internal circuit components act as antennas and emit EM waves [
47]. Radiation emissions usually originate from electronic circuits acting as electric dipoles produced by the voltage between signal conductors or as magnetic dipoles produced by a current flowing in a loop [
46]. EM emissions from computer monitors, wireless keyboards and mice, printers, scanners, conductors, PES, and RFID devices are discussed below.
3.1. Computer Monitors
Computer monitors emit electromagnetic information due to three important factors used to display video images: (1) refresh rate, (2) horizontal frequency, and (3) pixel frequency [
48]. Information from a computer screen can be reconstructed as it appears by monitoring and demodulating the radiation generated by the computer and its peripherals [
1]. The video signals processed by the monitor, both video graphics array (VGA) and digital video interface/high-definition multimedia interface (DVI/HDMI), have strictly defined time frames and maintain the image framing principle [
13,
49]. In [
50], the authors conducted a study on EM interference unintentionally generated by electronic devices and showed that information leakage is a consequence of displayed video signals, from a TEMPEST perspective. The authors of [
51] discussed the relation between the image recovery frequency and the compromising leakage degree. Furthermore, the authors analyzed the unwanted emissions from a display and introduced a secure font used against eavesdropping. The authors also emphasized the effectiveness of shielding against EM leakage, including display housings and Faraday cages. Advanced types of protection for display assemblies are listed in
Table 1.
A computer monitor can be equipped with a construction such as a metal mesh between two layers of glass or transparent foil. This construction directs most of the information towards the ground through the ground wires. Even if eavesdroppers manage to intercept the signals, they will not be able to reconstruct the information. Eavesdroppers often take advantage of the high-frequency spectrum to reproduce the image from the monitor. The elimination of high-frequency components is therefore an advantage, as it makes the reproduction of EM signals more difficult [
3].
Several well-known manufacturers offer North Atlantic Treaty Organization (NATO) TEMPEST-protected monitors available in SDIP-27 Level A, B, or C versions. C2 company (Riga/Latvia) provides a wide range of equipment products and services, including computer monitors and large format displays offered in Level A, B, and C versions [
52]. SIPAL (Turin/Italy) offers monitors available at TEMPEST Level B [
53]. Eurotempest (Neuen/The Netherlands) specialized the production of TEMPEST Level A and B monitors [
54]. Siltec (Pruszkov/Poland) is another reputable manufacturer offering Level A and B protected monitors [
55]. Cissecure (Ashbrun, VA 20147/USA) is also widely known as a prominent manufacturer of TEMPEST monitors [
56]. More detailed descriptions of the TEMPEST monitors and screens are given in
Table 2.
3.2. Wireless Keyboards and Mice
Wireless devices using event-driven communication present critical privacy concerns, primarily due to inherent information leakage resulting from radio frequency (RF) emissions [
51]. RF communication relies on two key elements: a transmitter and a receiver. The transmitter, located in the device, emits an EM signal that encodes the user’s activity information. On the other hand, the receiver connected to the computer receives the signal, decodes it, and then transmits it to the operating system. Wireless signals travel through the air and can be intercepted and read by a skilled attacker. That is why wireless devices and connectivity technologies are almost always a security risk, regardless of the communication protocol, radio noise, or physical obstacles [
4]. The IEEE 802.11 wireless network protocol family enables wireless interaction between devices [
57].
The most usual vulnerability sources are wireless peripherals open to keystroke injection attacks, according to the authors of [
58]. Tracking data from the keyboard and mouse is unidirectional. Hacked wireless keyboards or mice can reveal sensitive information due to encryption errors, firmware bugs, keyloggers, key readers, and compromised access points. The problems arise from the way the key manages communication. Wireless USB dongles are susceptible to security risks because the unencrypted input signal can be intercepted and used to gain access to the attached computer [
26]. A malicious user can passively and covertly record everything typed on a wireless keyboard from several meters away using an antenna, a wireless dongle, and a few lines of software code [
27,
28]. Attackers often target network protocols, configurations, and encryption mechanisms of wireless devices. That is why strong protection of wireless keyboards and mice, as well as wireless networks, is crucial. There are various preventive measures against malicious attacks, including turning off the Service Set Identifier (SSID), changing the default SSID name of the device, or data encryption. In 1993, the Navy prepared a document to help naval centers implement network environment security regulations. The authors of this document claim that anyone within range of the transmitter, using the appropriate equipment, can receive and read the information being transmitted if the wireless communication is not encrypted [
59]. It should be noted that wireless connections are usually protected by a widely used encryption algorithm, Advanced Encryption Standard—AES [
4,
60]. Wireless devices should use a secure connection-only mode, and an anti-rollback feature for security-based device firmware upgrades should be considered [
61,
62].
3.3. Printers
Printers convert the data symbolic form processed by the computer into a graphic form. Printers are, like other electronic devices, sources of electromagnetic emissions [
5]. In addition to control signals that do not convey sensitive data, useful signals correlate with the information in process [
5,
6,
7]. The author of [
46] discusses the increased current loop emissions in combination with large cable loops and gives an example of a dramatic increase in emissions when a computer is connected to a printer and both main cables are connected to the same wall outlet. The radiation from the laser printer is compromised, and the magnetic field near the laser printer can be measured and used to reconstruct the printed image [
63]. Few companies make printers with EM leakage protection. The Eurotempest offers a TZ551 pull printing system for customers with high-security requirements for their IT infrastructure [
64]. The TZ551 printer is based on the standard HP 500 series network printer and is equipped with TEMPEST and encryption capabilities. The pull printer feature provides additional security by first sending the data to the pull server for printing. The TZ551 includes a formally assessed authentication architecture designed to meet secret security levels. The OSPL (Eindhoven/The Netherlands) Tempest offers a wide range of printers with different security levels determined by the SDIP-27 standard. The OSPL Tempest printers have a high-speed USB interface, a 1.8 m shielded cable (DB9), and TEMPEST-filtered AC input [
65]. C2 offers a diverse range of Hewlett-Packard office laser B/W and color printers designed for desktop or small workgroup use, meeting the requirements of SDIP-27 Levels A, B, and C [
66]. Siltec offers a wider range of printers using Epson and Hewlett-Packard technology, suitable for A4, A3, and A0 paper formats [
67]. These printers come in Level A, B, and C versions. A detailed description of these printers is given in
Table 3.
These manufacturers also offer multifunctional TEMPEST printers that have print, scan, copy, and fax performance and fulfill Level A, B, and C security requirements.
3.4. Scanners
Scanners transfer information by scanning documents into searchable PDF, BMP, GIF, or JPEG formats and sending the scanned image to pre-programmed destinations such as a printer, editing software application, or email. A scanner uses a light-sensitive sensor to read the content of a document. The document is placed, scanning begins, a light source illuminates the document, a sensor detects the reflected light, and the light pattern is converted into digital information. The scanning function is based on the quantum nature of light and the photoelectric effect on the metals it hits. When light with energy above the threshold hits the metal, the number of emitted electrons is proportional to the intensity of the light beam, and the kinetic energy of the emitted electrons is proportional to the frequency of the light [
35].
There are different types of document scanners on the market. Drum scanners are primarily used in the publishing industry because they print high-resolution images; flatbed scanners scan documents placed on a flat glass surface; portable scanners scan text-based documents; handheld scanners are designed to scan text documents by swiping the scanner over the text or images; and paper scanners scan text and images by simply holding and dragging the scanner across the page. All-in-one scanners are usually designed to combine multiple functions (printing, copying, and scanning) into one device. The market also offers different types of scanners protected against unwanted EM emanations. Eurotempest offers eight Modulus TEMPEST scanners based on EPSON, HP, and Avision scanners [
68]. OSPL [
65] produces four scanners based on the HP Scanjet Pro 2500. All OSPL scanners are equipped with a high-speed DB9 cable and a TEMPEST filtered AC input with 100–230 VAC, 50/60 Hz operation, and a C/w 1.8 m shielded power cable with country-specific plug. Siltec provides SDIP Level A scanners based on A4, A3, and A0 Avision scanners [
67]. C2 offers two Modulus T-scanners: a Flatbed/ADF scanner and a Flatbed/ADF network scanner [
69] (
Table 4.).
3.5. Conductors
Switches, contacts, relays, power cables, wires, connectors, and other components emit radio frequency or acoustic energy whenever a device processes information electrically. The emanations can be transmitted over considerable distances through free space or be induced into nearby conductors such as signal lines, power cables, telephone lines, or water pipes, and then conducted along these paths for some distance. The information emitted by these devices can lead to sensitive data reconstruction [
8]. The authors of [
70] investigated the process of reconstructing a personal computer (PC) display image.
The power cable, linked to the external electrical grid, acted as an antenna for both emitted and conducted noise, resulting in a significant security concern (
Figure 1).
Interfering signals generally appear in the form of EM waves emitted into the surrounding space by radiation or conducted currents emitted along various conductors connected to the involved hardware. In most cases, there is an interaction between these signals. Radiated interference is caused by induced currents in conductors connected to or near hardware, such as feeders and transmission lines. Similarly, an unshielded conductor transmitting interference signals can act as a transmitting antenna. Conductors that connect multiple devices, whether internal or external, in addition to the basic functions of providing energy transport between two points, act as an interfering medium. The conductor then plays the role of a receiver. Interferences can also be reflected from conductors by EM radiation or conduction. The conductor then becomes the transmitter.
A solution that can eliminate interference in conductors is to reduce the sensitivity of the cable to the unacceptable effects of electromagnetic fields. For this purpose, it is recommended to use shielded cables and symmetrical wires in addition to disturbed cables. In [
71], the author describes cable products for military, marine, and aerospace applications that are designed to provide superior EMI protection. One of the most known shielded cables are Black Box cables used to connect serial devices (printer, monitor) and are protected from interference by 100% aluminum foil [
72]. One of the fully shielded, end-to-end (E2E) cabling systems is Siemon’s TERA (Watertown, CT 06795-04000/USA) cables, tested for superior performance and security and validated for TEMPEST high-security applications [
73]. The cables are terminated with connectors with a slim, insulated quadrant design that accepts one, two, and four patch cord pairs. The cable assembly manufactured by Cinch Connectivity Solution (Lombard, IL 60148/USA) has, at its end, a robust, compact, and lightweight high-performance connector with gold-plated copper alloy screw-in contacts that provide multiple contacts for maximum reliability. It also has EMI ground spring gaskets on the plug shells and a braided EMI sleeve connected to the integrated back shells, providing 360° EMI shielding. In [
74], the author outlines the use of cable shielding as one of the hardware solutions implemented to ensure compliance with rigorous information security standards during processing and transmission over a computer network. Shielded copper cables offer an additional layer of physical security by significantly limiting emanations. Implementing shielded cable can reduce cable separations, remove or reduce the need for signal isolation and filtering, and potentially reduce or eliminate the need for additional cable shielding. The paper suggests that foil-shielded/unshielded-twisted-pair (UTP) cable consists of a complete foil shield surrounding four unshielded twisted pairs and is typically used in situations where shielded cable is required; however, it may not be adequate for all TEMPEST installations. Additional signal isolation in some cases can be achieved through braided shields, tighter braids, braided foil, or individual pair shields with an overall foil shield. The author mentions independent testing showing that a combination of cabling and connectivity solutions effectively minimizes, if not eliminates, emanations when used within a secure network system.
3.6. Piezoelectric Sensors
The ability of a material to generate an electrical charge in response to an applied mechanical stress is called the piezoelectric effect. Piezoelectric sensors use piezoelectricity to measure physical stimuli such as pressure, force, temperature, and strain [
75]. An electric charge arises at the crystal surface when a force is applied to the piezoelectric diaphragm. Since the output signal is generated by the piezoelectric element itself, it is inherently a low-power device. Piezoelectric sensors are sensitive to dynamic pressure changes over a wide frequency and pressure range. These sensors generate output signals directly from the applied strain instead of using an external voltage source. They are robust, shock-resistant, small, and compact. Robustness, high frequency, and fast response make them useful for security alarms, smartphones, smart watches, accelerometers, aviation, and medical devices. It should be noted that piezoelectricity has also been found in bones, indicating the presence of important signals involved in tissue function [
76]. Flexible piezoelectric biosensors applicable to the skin have been developed in recent years, making them promising candidates for use in Internet-of-Things (IoT) technologies [
77]. In [
76], the authors presented a self-monitoring analysis and reporting technology (SMART) implant containing PES. Monitoring the mechanical response of the external fixation device reveals the relative translation and rotation of the external fixation pins and determines the state of long bone healing [
78]. SMART implants not only provide but also analyze the data, independently recognize normal or abnormal patterns, and proactively alert the physician [
79]. A PES frequency response decreases at low frequencies because the generated charge cannot be held. At high frequencies, there is a peak at the piezoelectric element resonant frequency. Sensors are usually used within the flat region of the response curve between two extreme values (see
Figure 2) [
80].
Piezoelectric sensors generally have a wide frequency range and are not affected by EM radiation. Storage, processing, and wireless data transmission in SMART systems containing these sensors, however, are susceptible to EM interference and inductive coupling [
9]. In [
39], the authors describe a simple wireless piezoelectric strain measurement using the FM technique. The sensors use a piezoelectric transducer that generates an electrical voltage under mechanical stress. After connecting the PES to a single-transistor FM circuit, the output voltage of the sensor induces a shift in the frequency of the modulation circuit. Subsequently, the modulated signal is transmitted wirelessly to the remote location, where the demodulation circuit acquires the data in real time. This type of sensor finds application in various fields, especially in stress measurement in moving or rotating structures. It is advisable to increase the protective distance and apply EM shielding to reduce the risk of EM leakage. Wireless connectivity within a shielded space can be influenced by absorbing and reflecting RF waves, resulting in a reduction in signal strength; they become attenuated, while the extent of attenuation is determined by the thickness and composition of the shielding material. Shielding can reduce signal diversity, i.e., the number of available paths for the wireless signal to reach its intended receiver. Shielding is more effective in blocking lower frequencies than higher frequencies because of longer wavelengths, which are more easily absorbed and reflected. Additionally, the type of shielding material also affects the attenuation rate. Moreover, the thickness of the shielding material influences blocking RF signals. However, achieving effective protection measures can be a challenge due to the compact structure and dimensions of these systems [
81].
3.7. Radio Frequency Identification
A deep understanding of how high-frequency (HF) radio signals move through a real circuit is imperative for RF design and analysis. The fact is that the components inside the circuit have tolerances and temperature dependencies, as well as parasitic elements; wires have resistance, inductance, and capacitance; and signals are susceptible to noise. Low-frequency (LF) systems, on the other hand, are less affected by non-ideal signals or component behavior. Radio-frequency identification is a wireless technology using EM or capacitive coupling in the RF spectrum to identify subjects or objects. RFID consists of an RFID tag (transponder), antenna, RFID transceiver, and software [
82]. The tag contains a microchip with a unique ID number and an antenna. There are three types of RFID tags: (1) passive tags without a power source that receive power from radio signals sent by the RFID receiver and operate when the reader is near the tag; (2) battery tags that have built-in batteries for the logic chips but still require a RF signal from the reader to activate and operate; and (3) active tags that use batteries and do not require reader power. RFID antennas are designed to operate at specific frequencies, depending on the application. The antenna is usually attached to the RFID reader and is available for tag attachment. Some handheld devices often have an attached antenna. An RFID reader is a hardware component that reads information from tags, connects them to a database, and transmits data. The specifications for low-frequency, high-frequency, ultra-high-frequency (UHF), and microwave RFID readers are shown in
Table 5.
The most important electrical parameter of RFID is tag sensitivity, which determines the maximum working distance. It should be noted that the specified reading distance is a theoretical open-space reading distance and may be reduced due to incorrect tag or reader usage. It can also be expanded due to multi-path propagation. UHF tags operate in the far-field region, which is significantly different from LF and HF technologies. RFID uses a specific application system depending on the service provider; local regulations on radio transmission dictate the frequencies for RFID operation.
The software controls the RFID reader, initiates the scan, retrieves information from the tag, stores the data on a local computer, or sends it to cloud storage. The reading process begins by using the reader to access the information on the tag. RFID sends an RF signal using an antenna and receives a signal from a reader to activate the tag. An activated tag sends data back to the reader using the same antenna and inductive coupling method.
Some tags have no security features, and some are protected and/or encrypted to improve security and privacy [
10]. The attacks described by the authors of [
12] are classified by network layers. Physical layer attacks are those that permanently or temporarily disable RFID tags. Network and transport layer attacks are based on how the RFID system communicates and transfers data between entities such as tags (spoofing, cloning), readers (eavesdropping, spoofing), and network protocols. Application layer attacks target information related to the application and the binding between the user and the RFID tag (unauthorized tag reading, tag modification, middleware attacks). There are also various multi-layered attacks, such as denial-of-service, covert channels, traffic analysis, replay attacks, and side-channel attacks [
41]. In [
83], the authors investigated a possible vulnerability of RFID to side-channel attacks. They demonstrated a non-invasive attack method involving information capturing from the EM field using the device during cryptographic operations. This technique requires placing near-field probes close to the chip to gather the relevant data. It turns out that more robust hardware or cryptographic computation techniques will improve protection against attacks. Limiting the EM emissions of the system can prevent side-channel attacks, but this usually limits the operating range. Another approach is to increase the RFID chip complexity and make it difficult for attackers to find out information about its internal system and operations. This solution is, however, limited by the small physical dimensions of the tags and cost factors. The author of [
84] examines the integrated circuit bandwidths and emphasizes the importance of their performance in a wide frequency range. The author investigates EM perturbations of HF waves caused by differential electrical and physical characteristics of an integrated circuit and proposes a new authentication methodology that exploits the process variation effects through EM and RF-based approaches.
4. From van Eck Phreaking to TEMPEST Profiling
Whenever an electronic device is used to process information, the various components can unintentionally emit EM radiation that may pose a security risk. Intercepted and recorded emissions can be analyzed, and the information processed by the device can be recovered [
60]. EM leaks can be monitored in different ranges, depending on the environmental conditions. In most cases, the signal can be detected and observed even hundreds of meters from the device. If the signal is, however, transmitted over a conductive medium such as a transmission line, monitoring can be performed over a much greater distance (several kilometers) [
85]. In 1985, van Eck first presented a type of eavesdropping, known as van Eck phreaking, or van Eck radiation. This activity involves the interception and decoding of EM radiation emitted from video displays, with the aim of unauthorized access to information. His research revealed that this method of information theft could be easily accomplished using a standard television receiver, specialized equipment, advanced technical expertise, and proximity to the target device [
86]. Countermeasures against van Eck’s phreaking include shielding devices to minimize or distort EM emission, using specialized software and hardware, and maintaining physical security measures to prevent potential attackers from being near the target device for executing such an attack.
The protective area of the device against EM leakage can be determined based on the distance to the device location and the boundaries of the controlled area. The TEMPEST profile, or footprint, is the point from the processing device to the farthest point where unwanted EM radiation can be detected or exploited. The footprint measures were first identified by Bell Laboratories during World War II. Bell Laboratories proposed shielding against radiation through space and magnetic fields, filtering of conducted signals on power and signal lines, and masking of spatial radiation or conducted signals [
7]. TEMPEST uses a combination of distance, shielding, filtering, and masking techniques to protect target devices. Devices must be installed at certain distances, including additional shielding; wires transferring sensitive data must be separated from those transferring unclassified data (RED/BLACK separation); and overlapping jamming signals can be used for masking real data. The United States National Security Agency (NSA) established regulations for EM emissions, as outlined in National Communications Security Memorandum (NACSIM) 5100A [
87]. Electrical devices and equipment that meet NSA standards are considered secure. Surveillance and countersurveillance investigation tools are overseen by the government and a small number of NACSM 5100A-licensed companies. Since certification for private sector needs is extremely expensive, this has led to the development of zoning regulations that provide more cost-effective alternatives but with a slightly lower level of security.
4.1. Shielding and Zoning Standards
The United States and NATO have SDIP standards for shielding and zoning. SDIP stands for SECAN doctrine and information publication. SECAN stands for security and evaluation agency. The SDIP standards are shown in
Table 6.
The SDIP-27 shielding standard is divided into three levels of protection requirements according to the following zones: Zone 0—an environment where an attacker is expected to have almost immediate access (up to 1 m distance); Zone 1—an environment where an attacker is expected to be unable to approach within approximately 20 m or an environment where building materials are assumed to provide attenuation equivalent to 20 m; and Zone 2—an environment where an attacker must deal with an equivalent free space attenuation of 100 m or equivalent attenuation through building material (see
Table 7).
SDIP-28 defines attenuation measurement methods for dividing individual areas into zones within a security perimeter and specifies the standards required for installed equipment processing sensitive data. SDIP-29 defines installation requirements such as grounding and cable spacing. SDIP-30 describes how to install electrical equipment for sensitive data processing [
88]. Shielded devices and rooms with metal materials are a reliable method to reduce emissions. Achieving complete protection is difficult and expensive, especially when it concerns rooms or buildings.
4.2. RED/BLACK Separation and Filtering
Careful design can greatly reduce conductive information leakage by properly filtering and suppressing power supplies and signal cables [
89]. The RED/BLACK separation is a TEMPEST security strategy for separating systems, components, cables, and circuits handling sensitive information from those that do not [
44]. The NSA uses the term baseband RED signal to describe compromising emanations that can reveal national security information. RED is a generic term referring to conductors, optical fibers, components, devices, and systems transmitting unencrypted and classified defense signals and the areas where those signals occur. The TEMPEST specification can be applied to RED devices as protection against EM leakage. BLACK is a generic term describing conductors, optical fibers, components, equipment, or systems transmitting unclassified or encrypted signals and the areas where those signals occur. It is necessary to separate the part processing the RED information and the part processing the BLACK information. The RED/BLACK concept allows for defining the architecture and needs of TEMPEST protection, the protective device type, and these device locations. The goal is that an unauthorized entity can only access BLACK information (
Figure 3) [
90].
Several designs need to be considered to ensure physical and logical RED/BLACK separation and minimize the risk of data leakage and compromise. One aspect is efficient cable management within the RED/BLACK engineering installation. This includes using separate conduits, pathways, or dedicated cable trays for RED and BLACK cables. The possibility of data leakage is significantly reduced by physically separating the cables. Another key factor is the careful selection and configuration of equipment. Routers, switches, and firewalls play a vital role in ensuring the secure flow of information. Proper configuration of these components is essential to preventing data leakage. Maintaining RED/BLACK separation requires robust network architecture. This can be achieved by using separate networks, virtual local area networks (VLANs), or physically isolated network segments. The author of [
91] described the concept of separating classified and unclassified information as a RED/BLACK separation through physical distance and the implementation of appropriate shielding measures. According to NSTISSAM TEMPEST/2-95 (the document specifies the shielding or minimum physical distance between wires or equipment that transmits or processes RED and BLACK signals), RED and BLACK computers should be kept a minimum distance of 1 m (39 inches) from each other. In [
92], however, the authors demonstrated a technique for effective communication over this distance. This technique used silent high-frequency sounds emitted by the target device speakers to transmit data to a nearby computer equipped with a microphone. The authors of [
93] introduced RED/BLACK separation within the power supply. The uninterruptible power supply (UPS) was tested to evaluate asymmetric, symmetric, and non-symmetric isolation. The results indicated an exceptional level of isolation that, in combination with the existing power transmission line filters in the equipment, adequately met the necessary isolation requirements for RED/BLACK separation. In the study of [
94], the authors investigate the application of an air-gap strategy as a preventive measure against potential security breaches in computer networks that store or handle sensitive and confidential data. Air-gapped networks are designed to be completely isolated from public networks and to keep data safe and protected. This approach is particularly useful when the information stored or generated by the system is considered highly sensitive and any risk of data leakage is unacceptable. Attackers exploit the emanations emitted by various computer components to exfiltrate data from such networks, thus establishing covert communication channels with external entities operating outside regular data transmission channels. The author of [
95] introduced a new approach to compromising isolated air-gapped workstations. Air-gapped computers can still be vulnerable to attacks, despite the lack of wireless connectivity. The authors showed that attackers can use a Serial Advanced Technology (SATA) cable commonly used for data transmission as a wireless antenna. This technique enables radio signal transmissions in the 6 GHz frequency range. The results show that even highly secure air-gapped computers can wirelessly leak sensitive information to a nearby receiver over a SATA cable.
It can be concluded that the implementation of RED/BLACK separation significantly reduces the risk of unintentional data leakage and information disclosure. The success of this approach depends on several factors, including effective cable management, careful equipment selection, proper configuration, and a robust network architecture.
4.3. Masking and Overlaying
Masking and noise addition are countermeasure techniques used to add random noise or meaningless signals to the original emanation. Masking is a successful, cost-effective countermeasure, although the masking signal and additional noise must be carefully selected, as the signal may affect the proper functioning of other devices or nearby systems. Spatial noise is one of the active protection techniques usually used when passive methods are not feasible for various reasons. EM noise, including EMI, radio noise, radio interference, and active interference masking, refers to a dynamic EM phenomenon that has no informational content and can overlap or merge with a valuable signal. Spatial EM noise generators aim to prevent informative signal interception for subsequent analysis and retrieval of original information [
96]. A study described in [
97] demonstrates the use of an EM noise generator as a technique for obfuscating side-channel attack analysis that complicates the sensitive data extraction from EM emanations. The software defense mechanism is explored through a case study involving the Raspberry Pi. The authors investigated the sensitivity of devices using the AES algorithm. The AES implementation was found to be prone to side-channel attacks. In [
98], the authors introduce a new cognitive approach to the mitigation of side-channel attacks without relying on architecture or operating system. The proposed method, unlike current protection strategies relying on randomization, is based on cognitive perturbations that appear legitimate but are designed to deceive attackers and lead them to wrong conclusions. By strategically inserting perturbations at key points in time to introduce an additional operation, the attacker is misled, and any extracted data are rendered useless. The proposed methodologies are listed in
Table 8.
Another effective countermeasure is to superimpose an EM field stronger than the leaking emanation. The effectiveness of the eavesdropping barrier, however, is highly dependent on the interfering signal modulation pattern, so the interfering signal must be chosen very carefully [
1]. This can be achieved by designing devices to reduce emissions at the component, system, circuit board, and device level [
99].
5. Discussion
The primary goal of this study was to analyze the scope of existing research on sensitive information and unintentional emission through EM leakage. Various challenges are associated with TEMPEST-protected devices and equipment due to the limited access to TEMPEST standards available only to the US government, NATO, and a selected group of manufacturers and vendors (see
Table 9).
In the domain of TEMPEST equipment development, there are numerous companies not included in
Table 9, such as Advanced Programs Inc (Columbia, MD 21046/USA), Advanced Technologies Institute (Bucharest/Romania), API CRIPTEC (Columbia, MD 21046/USA), ATM Computer Systems GmbH (Konstanz/Grmany), EMCON Emanation Control (Kanata, Ontario, K2K 2P5, CA/Canada), Head Italia S.p.A. (Rome/Italy), IDE-INTRACOM Defense Electronics (Koropi/Greece), Siemens AG (Munich/Germany), Secure Systems and Technologies Ltd. (Glouchester/UK), and others. A lot of vendors also sell TEMPEST and zoning equipment worldwide, including cables, connectors, filters, foils, honeycomb vents, shielding glasses, protective tents, TEMPEST gaskets, and waveguides. Although all these companies claim to offer TEMPEST protection (TEMPEST certificates), none of the standards are available to customers. A comparison of devices and TEMPEST protection measurements is shown in
Table 10.
Complex devices using an AC source for operation create a stronger EM field that results in reading data from a greater distance. TEMPEST equipment manufacturers try to eliminate or reduce the risk of data leakage by implementing TEMPEST-filtered AC input, cable shielding, or EM shields. It is very difficult to reduce this risk to zero, but it can be reduced with appropriate measures. One way is to prevent an attacker from exploiting EM radiation from a safe distance. Another measure of protection is to filter the AC input. Connecting a filter to the device circuit can suppress EM noise transmitted through the line. Power supply filters typically consist of passive components such as inductors and capacitors connected to form an LC circuit. Inductors allow DC or LF currents to pass through while suppressing unwanted HF currents. In this way, the filter removes unwanted current to flow freely. Cables can also be a major source of EMI, both as sources and receivers. The shield works in both directions. First, it can reflect the energy. Second, it can absorb noise and transmit it to the ground. Typically, two types of shielding are used in cables: foil and braid. A foil shield is a thin layer of aluminum, usually attached to a surrounding conductor support. Braids are woven meshes made from bare copper wire or tinned copper wire. Braid provides a low-resistance path to the ground and is much easier to terminate by crimping or soldering when attaching the connector. Protection against unwanted EM emissions also includes placing electronic equipment and devices in Faraday cages or shielded chambers. A Faraday cage scatters the charge or radiation to the outside of the cage and cancels out the charge or radiation inside the cage. The use of a shielded chamber also ensures an EMI-free environment. The chamber filters out unwanted background signals and noise, and the internal components are protected from external EM radiation by a special enclosure, ensuring a controlled environment.
Manufacturers of active TEMPEST equipment (monitors, scanners, and printers) use existing devices from renowned manufacturers and install appropriate TEMPEST protection measures them (A, B, and C levels). Users without sufficient financial resources can choose equipment with a lower level of TEMPEST protection, but they can complement it with physical protection measures and obtain a satisfactory level of EM protection for security-sensitive data.
It is difficult to implement shielding measures for equipment (keyboards, mice, cables, PES, and RFID) that is not directly connected to AC (excluding cables) because their basic functions would be disabled. Solutions for TEMPEST protection are increasing distance, EM shielding of equipment, increasing complexity, include applying robust cryptographic techniques.
In addition to direct TEMPEST protection measures on equipment (AC input filtering, EM shields, and cryptography), indirect measures such as RED/BLACK separation and filtering, zoning, masking, and overlaying are also applied. NATO introduces SDIP standards for shielding and zoning. Zoning regulations provide more cost-effective alternatives for the private sector to avoid costly certification. Such alternatives can be used in an environment with a lower level of security, while other TEMPEST measures must be used for security-sensitive data. RED/BLACK separation and filtering imply the physical separation of cables, data flows, and public and private networks to reduce unintentional data leakage. Recent research by air-gapped networks shows that this kind of protection cannot be considered reliable because attackers can use the emanations of individual computer components. Masking and overlaying are techniques that can prevent an attacker from detecting and interpreting emanations. It is very important with these techniques to carefully select the EM noise generator.
This work is motivated by growing concerns about security threats to general-purpose devices. The study presents an analysis of different TEMPEST standards and configurations and highlights their importance concerning unintentional EM emissions. It also contributes to the field of EM data leakage prevention, providing valuable information on the latest trends in effectively reducing the risks of EM leakage.
6. Conclusions
Unintentional intrusion by EM emission leaves no trace of an attacker’s presence; the attacked device operates properly, and the infiltration does not cause physical damage. It is possible in some cases to intercept and reconstruct hidden information based on electromagnetic leakage. This study investigates various sources of EM leakage, including computer monitors, wireless keyboards and mice, printers, scanners, conductors, piezoelectric sensors, and radio-frequency identification devices. The TEMPEST profile is used to describe how devices are protected against EM leakage.
Side-channel attacks are significant security threats to hardware systems and applied software. The risks of these attacks can be mitigated by applying various preventive measures. It is difficult to completely prevent side-channel attacks, but designers can implement several strategies to mitigate the potential risks. The strategies involve either eliminating EM data leakage and/or removing the link between sensitive data and information leakage.
The expansion of innovative devices and services driven by the growing interest in the Internet of Things and 5G technologies will lead to an increase in potential vulnerabilities in the foreseeable future. Conducting basic TEMPEST measurements on newly developed electronic devices would therefore be useful and would mean significant progress in this particular domain.
This paper provides a comprehensive overview of the literature and highlights interesting research directions and their future potential. Future work includes applications to real-life EM side-channel attack scenarios, such as data encryption, network protocols, and file system reads and writes. Establishing future standards and tools requires consideration of relevant standards and tools in both the hardware and software security areas. It can be important to assess the potential of machine learning models in classifying data arising from EM radiation from electronic equipment and devices. EM side-channel attacks to recover cryptographic keys and other sensitive information can be evaluated as a possible solution to cryptographic challenges in digital forensics, especially on IoT devices. Our further work will focus on researching EM leakage protection measures, which mainly include strategies aimed at eliminating EM leakage by protecting vulnerable components and devices from potential security threats.