RE: [Full-disclosure] Tempest today

2006-08-20 Thread Bill Stout
You have your answer, but I'll add some background anyway.

TEMPEST is old stuff (US/UK).  Anyone who's ever worked in COMSEC
(Government Communications Security) knows about TEMPEST, it was a big
deal during the cold war.  Most of the basic stuff was declassified in
1995.

It's simply the ability to block any and all unintentional signals
('electro-magnetic radiation') which may emanate from communication or
data processing equipment.  There's two parts of COMSEC equipment, the
part than handles the plain text data like I/O, processor and memory
(red side), and the part that's not involved in unencrypted data like
power supplies and I/O that carries encrypted data (black side).  One of
the earlier examples of a TEMPEST leak was the ability to pick up typed
text from the power lines into teletype equipment or even the IBM
Selectric typewriters.  Some of the embassies on both sides of the cold
war were found to have innocent wires stretched across the ceiling of
the comm center but with both ends unterminated, which apparently
operated as a simplistic amplifier or pickup.  Many bugs picked up and
repeated electronic, not audio signals.  The U.S. Embassy in the USSR
had to be rebuilt in the '80s because the concrete was peppered with
passive electronic components (things like resistors and real bugs).  

A simple demonstration of TEMPEST vulnerability is by using a telco
impedance pickup.  The impedance pickup will amplify voice (or data) on
a phone wire without needing to touch the metal wire.  It picks up the
varying magnetic field around a wire which expands and collapses as the
signal changes.  (It also buzzes radically when near fluorescent bulbs,
old high-leakage CRT monitors, some LCDs, some keyboards, and some
mice).

Another related term you might want to google is SIGINT, or Signals
Intelligence.  It covers the ability to collect, and process, signals.
There's more to it than meets the eye.  The position of a signal can be
triangulated electronically within a few milliseconds, 'position' is
data.  The keystrokes or other characteristics of encrypted data can
tell you who the operator is, 'characteristic' is data you can link with
HUMINT (Human Intelligence).  Then there's the conversation, sorta tells
you who's talking to who and what's been escalated up to or repeated
from headquarters (makes life easy if someone in the conversation passes
along a message using weak crypto or a compromised key).  Many INTEL
satellites are SIGINT, more like radioscopes pointed down which join the
hubble-sister telescopes pointed down.  

(Note: Encryption applies privacy only temporarily.  Encryptions of the
past are obsolete and weak today, and can be decrypted at leisure.)

That's what TEMPEST is worried about.  Leaking signal from red side to
black side, that signal getting picked up by some guy with telco gear, a
bug in the wall or an antenna in the ceiling, or a trio of satellites
above.   Doesn't help you used that 3DES PGP key 5 years ago.

Bill Stout


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Paul
Sebastian Ziegler
Sent: Friday, August 18, 2006 9:45 AM
To: full-disclosure
Subject: [Full-disclosure] Tempest today

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi list,

I've seen some fuss about the technique called "tempest" lately. Some
people claim it would be "the thing" in modern security. This bugs me
somehow because first of all I think it is way to much of an effort
compared to the more casual techniques used today. Also all information
that I can find on the Internet refers to some stuff the NSA released in
the mid-nineties. Now that is not really a good and reliable source of
information in my believe. :)

Can anybody tell me how far evolved this technique is today and who uses
it? Maybe some reference to a whitepaper or something similar. Would be
great.

Thanks
Paul


Brief definition of tempest for those who have never heard of it:
Picking up the radiation produced by a monitor or cables that connect
the graphics-card or graphics-chipset with the monitor in order to spy
the screen of the user. Kind of like getting access to a VNC server on
the box without having input yourself. The interesting part is that it
is technically undetectable.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFE5e6XaHrXRd80sY8RCg/9AKCBAs2SjvitArRFHs+6moRb0UX4GQCfbCo9
wi9z1V+h5m0YJFdz9IZK+EI=
=2pu2
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] RealVNC 4.1.2 minor heap corruption/DoS vulnerability (authentication required)

2006-08-20 Thread Juha-Matti Laurio

They probably will post patch information here:
http://www.realvnc.com/pipermail/vnc-announce/2006/date.html

- Juha-Matti


Niall FitzGibbon <[EMAIL PROTECTED]> wrote: 


This vulnerability affects the latest version of RealVNC (4.1.2) on all 
platforms.  It is tested on Windows.


To exploit the vulnerability, the attacker must either control a connected and 
authenticated client connected to a vulnerable VNC server or control a VNC 
server with at least one vulnerable connected and authenticated client.


The attack exploits a signed/unsigned integer mismatch leading to an integer 
overflow and subsequent allocation of very large or zero size areas on the 
heap.  The result of the attack is Denial of Service due to heap corruption 
and improper program flow.  It doesn't seem possible to exploit the heap 
corruption in order to gain code execution the source of the copy operation 
is not defined by the attacker.  The attack is thus of limited usefulness due 
to the necessity of prior authentication.


The vulnerability lies in the following functions:
rfb/SMsgReader.cxx : readClientCutText()
rfb/CMsgReader.cxx : readServerCutText()

These functions handle clipboard changes propagated from the other party.  The 
simplest way to trigger this vulnerability is to modify the 
CMsgWriter::clientCutText or SMsgWriter::writeServerCutText in order to send 
an integer length of -1 on clipboard updates.  This results in an allocation 
of zero bytes to the heap on the other party and subsequent write of a zero 
terminator to an address immediately before the allocated zero-length buffer 
followed by a large memcpy to that buffer.  When an exception is finally 
thrown, RealVNC handles this by terminating the connection and possibly the 
process, throwing an error message about the message type.


Reported to vendor ([EMAIL PROTECTED]) 01 August 2006.  No response at time 
of writing.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] New PowerPoint 0-day and Trojan - FAQ document ready

2006-08-20 Thread Juha-Matti Laurio

I have constructed a FAQ document about the recent 0-day vulnerability in 
Microsoft PowerPoint disclosed on Saturday.

This vulnerability is being exploited by Trojan horse TROJ_SMALL.CMZ.

The document entitled as Microsoft PowerPoint 0-day Vulnerability FAQ - August 
2006, CVE-2006- (CVE name will be updated when it is available)
is located at http://blogs.securiteam.com/?p=559

New related malware names assigned will be updated to the document when they 
are available.

- Juha-Matti

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] is watching you!!!

2006-08-20 Thread Exibar



SHH!!!  we're finally rid of him!  Never ever EVER 
speak his name again

  -Original Message-From: yearsilent 
  [mailto:[EMAIL PROTECTED]Sent: Saturday, August 19, 2006 5:40 
  AMTo: vodka hooch; 
  full-disclosure@lists.grok.org.ukSubject: [inbox] Re: 
  [Full-disclosure] n3td3v is watching you!!!back to home, 
  and watch you mother !vodka hooch 
  <[EMAIL PROTECTED]> wrote: 
  
the biggest hackers is watching google and yahoo
 
we watch fd too
 
people think we disappear
 
we still strong
 
we biggest hackers around
 
big bad hackers!
 
you think you can bad mouth n3td3v in threads and talk about mail 
filters
 
we beat mail filter, we beat everyone
 
governments, businesses and everyone!
 
we got techniques to penetrate windows vista
 
windows vista hacks be made public soon
 
we distribute on public list
 
you think you win, no n3td3v win
 
n3td3v not just one person, we big
 
you think we lamers, no we hav 0day programs and techniques
 
we can engineer the security industry and make things happen
 
to get securityfocus.com and news.com to write stories
 
we not care anymore what people think we do our own thing
 
n3td3v security group are best, we is new movement
 
you not say anything to change what we is
 
we new, we big, we bold
 
we here to stay
 
n3td3v


Do you Yahoo!?Get on board. You're 
invited to try the new Yahoo! Mail 
Beta.___Full-Disclosure - We 
believe in it.Charter: 
http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and 
sponsored by Secunia - http://secunia.com/
  
  
  Want to be your own boss? Learn how on Yahoo! 
  Small Business. 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [SECURITY] [DSA 1154-1] New squirrelmail packages fix information disclosure

2006-08-20 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1154-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
August 20th, 2006   http://www.debian.org/security/faq
- --

Package: squirrelmail
Vulnerability  : variable overwriting
Problem-Type   : remote
Debian-specific: no
CVE ID : CVE-2006-4019

James Bercegay of GulfTech Security Research disovered a vulnerability
in SquirrelMail where an authenticated user could overwrite random
variables in the compose script. This might be exploited to read or
write the preferences or attachment files of other users.

For the stable distribution (sarge) this problem has been fixed in
version 1.4.4-9.

For the unstable distribution (sid) this problem has been fixed in
version 1.4.8-1.

We recommend that you upgrade your squirrelmail package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9.dsc
  Size/MD5 checksum:  678 de55f30e42570db82bec8aefe90093ac

http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9.diff.gz
  Size/MD5 checksum:25409 b9e9854e2702f34a7d5bede75942a391

http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4.orig.tar.gz
  Size/MD5 checksum:   575871 f50548b6f4f24d28afb5e6048977f4da

  Architecture independent components:


http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9_all.deb
  Size/MD5 checksum:   569078 1510859cc583447180b761ae38895191

  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE6N1SXm3vHE4uyloRAtM9AJ0Q2WbKe5eiMpKlPAFtTR9s8V3J6gCfaMXA
xsv481/mlpJlBEIE9u5DX7o=
=5D0M
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] LOL HY

2006-08-20 Thread Flavio Visentin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Edward Pearson wrote:
> Fuck you all. I'm going to Bugtraq.

Bye Bye... We'll miss you!!

- --
Flavio Visentin
GPG Key: http://www.zipman.it/gpgkey.asc

There are only 10 types of people in this world:
those who understand binary, and those who don't.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE6NgOusUmHkh1cnoRAnSZAJ4rB9/YGH2JCQY7BzlkRvWhOajL0QCfRvBY
gODcvlxOPjm1y3YDpEzMfMU=
=y1Fa
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Tempest today

2006-08-20 Thread Randal T. Rioux
[EMAIL PROTECTED] wrote:
> On Sat, 19 Aug 2006 18:49:09 -0500 Bipin Gautam
> <[EMAIL PROTECTED]> wrote:
>> Ok, here is something from the book that I was trying to
>> assemble/write.
> 
>> Some Links: http://www.eskimo.com/~joelm/tempest.html
>> http://www.erikyyy.de/tempest/
> 
>> Lets begin&
>>
>> SNIP SNIP SNIP
> 
> Please help make the list self-policing.  Follow the list charter
> and note that self-promotion is forbidden.

Please don't quote the entire message in your response if you have
nothing useful to add.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: Tempest today

2006-08-20 Thread Bipin Gautam

With double layered windows (double glazed), the ability to use
triangulation between laser TX and rx means it may be possible to capture
vibrations from the inner glass panel.




Infra-red absorbtive/scattering glass makes the most sense, or external
curtain materials, but we are int purpose built locations at this point.



a poor mans solution should be THE semi opaque glass we use in kitchen
that has those INCLINED trangular cut surfaces throughout while the
granular surface on the other side. Any light (though depends on the
wavelength) would bounce to the extreme right or left. Moreover,
without a small bug in the windows itself (say a prism) it would be
difficult to capture the reflected beem anyways. or yes as u
suggested, scattering glass.

a double layered window with distinct difference in refractive index
of  exterior & interior glass "might" be a better solution. I
experimented a simple solution. A 3v DC motor pressed in the glass
window to cause a small noise & glass vibration would almost
completely remove the chances for evasdroping. (but hey it was a
extermely simple amature solution to defeat my own amature equpment
anyways. Any coment on this, welcome!)

-bipin

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: Tempest today

2006-08-20 Thread Marcin Owsiany
> >Faraday cages may be used to provide protection from HERF and EMP 
> >effects.

This reminds me of a novel (http://en.wikipedia.org/wiki/Limes_inferior)
by a Polish S-F writer, late Janusz A.  Zajdel, who once wrote about a
"bug" which transmitted information through shielded walls by using a
modulated X-ray stream.. :)

Marcin
-- 
Marcin Owsiany <[EMAIL PROTECTED]>  http://marcin.owsiany.pl/
GnuPG: 1024D/60F41216  FE67 DA2D 0ACA FC5E 3F75  D6F6 3A0D 8AA0 60F4 1216
 
"Every program in development at MIT expands until it can read mail."
  -- Unknown

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Tempest today

2006-08-20 Thread Lyal Collins
Some comment inline...

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Sunday, 20 August 2006 4:45 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Tempest today


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Sat, 19 Aug 2006 18:49:09 -0500 Bipin Gautam <[EMAIL PROTECTED]>
wrote:
>Ok, here is something from the book that I was trying to 
>assemble/write.
>
>Some Links: http://www.eskimo.com/~joelm/tempest.html
>http://www.erikyyy.de/tempest/
>
>Lets begin.
>
>Faraday cages may be used to provide protection from HERF and EMP 
>effects.
>
>Countermeasures:
>It is easy to defeat ordinary audio eavesdropping, just by 
>sound-proofing a room. And simply drawing the curtains or creating a
>specially crafted background noise or by using double glass with
>air
>gap in the middle can soundproof and can defeat newer systems,
>which
>shine a laser beam onto a glass window and decode any modulation of
>the reflected beam caused by sound vibrations in the room.

Actually, it depends on the laser's light frequency somewhat.  The curtain
only helps when the laser is reflecting off objects inside the room, not the
window itself.
With double layered windows (double glazed), the ability to use
triangulation between laser TX and rx means it may be possible to capture
vibrations from the inner glass panel.

As most curtains don't make much difference to sound, simply drawing them is
not going to make a major difference in these situations.
Infra-red absorbtive/scattering glass makes the most sense, or external
curtain materials, but we are int purpose built locations at this point.

>
>Faraday's cage: The charge on a charged conductor resided only on its
>exterior, and had no influence on anything enclosed within it. To
>demonstrate this fact he built a room coated with metal foil, and
>allowed high-voltage discharges from an electrostatic generator to
>strike the outside of the room. He used an electroscope to show
>that
>there was no electric charge present on the inside of the room's
>walls. A Faraday cage is best understood as an approximation to an
>ideal hollow conductor. A round drum, sphere etc can act like a
>Faraday's Cage. Basically, the enclosure may be made of an unbroken
>conducting sheet, like the metal box surrounding a sensitive radio
>receiver, or a wire mesh, like that in the door of a microwave
>oven.
>Any holes in the box or mesh must be significantly smaller than the
>wavelength of the radiation that is being kept out, or the
>enclosure
>will not effectively approximate an unbroken conducting surface.
>
>This shielding effect is used to eliminate electric fields within a 
>volume, for example to protect electronic equipment from lightning 
>strikes and other electrostatic discharges (ESDs). Faraday cages are
>often put to a dual purpose: to block electric fields, as explained
>above, and to block electromagnetic radiation. The latter
>application
>is known as RF shielding.
>
>Some traditional architectural materials act as Faraday shields in 
>practice. These include plaster with wire mesh, and rebar concrete. 
>These will affect the use of cordless phones and wireless networks 
>inside buildings and houses. While Some buildings have designs that 
>block radio signals by accident due to thick concrete walls or a steel
>skeleton.

This blocking is generally very unpredictable between different buildings,
and moy not coincide wih the radiation characteristics of the target system.
Don't rely on this.

>RF and Magnetic shielding: Radio frequency (or RF) shielding is
>required when it is necessary to block high frequency - 100
>kilohertz
>and above - interference fields. These shields typically use
>copper,
>aluminum, galvanized steel, or conductive rubber, plastic or
>paints.
>These materials work at high frequencies by means of their high
>conductivity, and little or no magnetic permeability. Magnetic
>shields
>use their high permeability to attract magnetic fields and divert
>the
>magnetic energy through them. With proper construction, magnetic
>shielding alloys have the ability to function as broadband shields,
>shielding both rf and magnetic interference fields.
>
>Electromagnetic shielding: It is the process of limiting the coupling
>of an electromagnetic field between two locations. Typically it is
>applied to enclosures, separating electrical content from the
>outside
>world, and to cables, separating internal wires from the
>environment
>the cable runs through. The shielding is achieved using a
>conductive
>material as a barrier. Typical materials include sheet metal, metal
>mesh, ionized gas, plasma and aluminum foil. The shielding can
>reduce
>the coupling of radio waves, visible light, electromagnetic fields
>and
>electrostatic fields. The amount of reduction depends very much
>upon
>the material used, the method of connection of the shield (or
>screen)
>and the frequency of the fields of interest. One 

Re: [Full-disclosure] Tempest today

2006-08-20 Thread daylasoul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Sat, 19 Aug 2006 18:49:09 -0500 Bipin Gautam
<[EMAIL PROTECTED]> wrote:
>Ok, here is something from the book that I was trying to
>assemble/write.
>
>Some Links: http://www.eskimo.com/~joelm/tempest.html
>http://www.erikyyy.de/tempest/
>
>Lets begin…
>
>Faraday cages may be used to provide protection from HERF and EMP
>effects.
>
>Countermeasures:
>It is easy to defeat ordinary audio eavesdropping, just by
>sound-proofing a room. And simply drawing the curtains or creating
>a
>specially crafted background noise or by using double glass with
>air
>gap in the middle can soundproof and can defeat newer systems,
>which
>shine a laser beam onto a glass window and decode any modulation of
>the reflected beam caused by sound vibrations in the room.
>
>Faraday's cage: The charge on a charged conductor resided only on
>its
>exterior, and had no influence on anything enclosed within it. To
>demonstrate this fact he built a room coated with metal foil, and
>allowed high-voltage discharges from an electrostatic generator to
>strike the outside of the room. He used an electroscope to show
>that
>there was no electric charge present on the inside of the room's
>walls. A Faraday cage is best understood as an approximation to an
>ideal hollow conductor. A round drum, sphere etc can act like a
>Faraday's Cage. Basically, the enclosure may be made of an unbroken
>conducting sheet, like the metal box surrounding a sensitive radio
>receiver, or a wire mesh, like that in the door of a microwave
>oven.
>Any holes in the box or mesh must be significantly smaller than the
>wavelength of the radiation that is being kept out, or the
>enclosure
>will not effectively approximate an unbroken conducting surface.
>
>This shielding effect is used to eliminate electric fields within a
>volume, for example to protect electronic equipment from lightning
>strikes and other electrostatic discharges (ESDs). Faraday cages
>are
>often put to a dual purpose: to block electric fields, as explained
>above, and to block electromagnetic radiation. The latter
>application
>is known as RF shielding.
>
>Some traditional architectural materials act as Faraday shields in
>practice. These include plaster with wire mesh, and rebar concrete.
>These will affect the use of cordless phones and wireless networks
>inside buildings and houses. While Some buildings have designs that
>block radio signals by accident due to thick concrete walls or a
>steel
>skeleton.
>RF and Magnetic shielding: Radio frequency (or RF) shielding is
>required when it is necessary to block high frequency - 100
>kilohertz
>and above - interference fields. These shields typically use
>copper,
>aluminum, galvanized steel, or conductive rubber, plastic or
>paints.
>These materials work at high frequencies by means of their high
>conductivity, and little or no magnetic permeability. Magnetic
>shields
>use their high permeability to attract magnetic fields and divert
>the
>magnetic energy through them. With proper construction, magnetic
>shielding alloys have the ability to function as broadband shields,
>shielding both rf and magnetic interference fields.
>
>Electromagnetic shielding: It is the process of limiting the
>coupling
>of an electromagnetic field between two locations. Typically it is
>applied to enclosures, separating electrical content from the
>outside
>world, and to cables, separating internal wires from the
>environment
>the cable runs through. The shielding is achieved using a
>conductive
>material as a barrier. Typical materials include sheet metal, metal
>mesh, ionized gas, plasma and aluminum foil. The shielding can
>reduce
>the coupling of radio waves, visible light, electromagnetic fields
>and
>electrostatic fields. The amount of reduction depends very much
>upon
>the material used, the method of connection of the shield (or
>screen)
>and the frequency of the fields of interest. One example is a
>coaxial
>cable, which has electromagnetic shielding in the form of a wire
>mesh
>surrounding an inner core conductor. The shielding impedes the
>escape
>of any signal from the core conductor, and also signals from being
>added to the core conductor.
>
>Though i have practically seen putting a dipole near the coaxial
>cable
>can sniff its signal within despite the sealing. The rf sealing
>strict
>depends on the quality which i've seen is rare in MOST commercial
>products for general uses.
>
>Shielded Tent: It Shielded enclosures, tempest equipment, shielded
>chambers Another way of making sure you are not being bugged is to
>use
>a shielded tent, which prevents radio waves entering or leaving.
>Though Mobile phone calls are impossible from inside the tent, but
>no-one will be able to listen to your conversations using bugs or
>radio wave listening devices. It will also prevent anyone
>intercepting
>radio emissions from computers, preventing them from seeing what
>you
>have on screen. A more sophisticated - and expensive - method i