Air-gapped secured systems


One thing to understand that a signal does not have to be something programmed.

A very simplistic example, heat is is signal. With the right equipment you can see a device getting hotter or cooler. Program a program, that sends S.O.S with interval of 1minute, 1minute hot(full load cpu), 1min cool(no cpu activity), then 1min full load again etc. Then someone who is looking at the heat signature and see it getting hotter, cooler, hotter in a patern, it can receive a message like that.
The device that is getting hotter and cooler, was not designed to broadcast a signal like that, however it could.
Same goes with some of the noise an device gives off, controlling the fan speed. Or creating a workload that changes cpu frequenes that can be lisend to. Or the EM redation a device gives off.
But what you desribe are big things, like an ON / OFF switch or.
The processes inside a computer with bits all over the place in CPU, GPU, memory, flash drive etc. - that is millions of 1 and 0 / + and - / ON and OFF per second.
And that is was makes it hard for me to understand, that it can be possible?

One thing to understand that a signal does not have to be something programmed.

Same goes with some of the noise an device gives off, controlling the fan speed. Or creating a workload that changes cpu frequenes that can be lisend to. Or the EM redation a device gives off.
The not-programmed signals, that still can be intercepted.
Can they be received through walls etc.?

And the receiver, what is that?
Some super advanced equipment, that like only NSA has?
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    Laptop
Would anyone please help me with my remaining questions in #21 / above.

Thank you
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    Laptop
Real examples of attacks devised by security researchers.

Using audio frequencies to transmit data.
Using monitors to encode data by refreshing the screen and decoding from video surveillance equipment.
Even using fluctuations in power supplies.

Basically any form of energy that can be manipulated and read/measured can be used as a means of transmission.

Air gapped usually just means, no Internet access or no direct Internet access
 

My Computer

System One

  • OS
    Linux Mint
    Computer type
    Laptop
    Manufacturer/Model
    System76 Lemur Pro
Real examples of attacks devised by security researchers.

Using audio frequencies to transmit data.
Using monitors to encode data by refreshing the screen and decoding from video surveillance equipment.
Even using fluctuations in power supplies.

Basically any form of energy that can be manipulated and read/measured can be used as a means of transmission.

Air gapped usually just means, no Internet access or no direct Internet access

And the instrument / receiver, what would that be like?
Some super advanced equipment, that like only NSA has or some other high level gouverment stuff?
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    Laptop
No, can be a mic or a webcam. Depends on the transmission type
 

My Computer

System One

  • OS
    Linux Mint
    Computer type
    Laptop
    Manufacturer/Model
    System76 Lemur Pro
Break out the tinfoil hats. :-) I don't think any of our systems have enough important data to get concerned about these techniques. :p
 

My Computers

System One System Two

  • OS
    Win 11 Pro 24H2, Build 26100.4652
    Computer type
    PC/Desktop
    Manufacturer/Model
    Home Brew
    CPU
    Intel Core i5 14500
    Motherboard
    Gigabyte B760M G P WIFI
    Memory
    64GB DDR4
    Graphics Card(s)
    GeForce RTX 4060
    Sound Card
    Chipset Realtek
    Monitor(s) Displays
    LG 45" Ultragear, Acer 24" 1080p
    Screen Resolution
    5120x1440, 1920x1080
    Hard Drives
    Crucial P310 2TB 2280 PCIe Gen4 3D NAND NVMe M.2 SSD (O/S)
    Silicon Power 2TB US75 Nvme PCIe Gen4 M.2 2280 SSD (backup)
    Crucial BX500 2TB 3D NAND (2nd backup)
    External off-line backup Drives: 2 NVMe 4TB drives in external enclosures
    PSU
    Thermaltake Toughpower GF3 750W
    Case
    LIAN LI LANCOOL 216 E-ATX PC Case
    Cooling
    Lots of fans!
    Keyboard
    Microsoft Comfort Curve 2000
    Mouse
    Logitech G305
    Internet Speed
    Verizon FiOS 1GB
    Browser
    Firefox
    Antivirus
    Malware Bytes & Windows Security
  • Operating System
    Win 11 Pro 24H2, Build 26100.4652
    Computer type
    PC/Desktop
    Manufacturer/Model
    Home Brew
    CPU
    Intel Core i5 14400
    Motherboard
    Gigabyte B760M DS3H AX
    Memory
    32GB DDR5
    Graphics card(s)
    Intel 700 Embedded GPU
    Sound Card
    Realtek Embedded
    Monitor(s) Displays
    27" HP 1080p
    Screen Resolution
    1920x1080
    Hard Drives
    Crucial P310 2TB 2280 PCIe Gen4 eD NAND PCIe SSD
    Samsung EVO 990 2TB NVMe Gen4 SSD
    Samsung 2TB SATA SSD
    PSU
    Thermaltake Smart BM3 650W
    Case
    Okinos Micro ATX Case
    Cooling
    Fans
    Keyboard
    Microsoft Comfort Curve 2000
    Mouse
    Logitech G305
    Internet Speed
    Verizon FiOS 1GB
    Browser
    Firefox
    Antivirus
    Malware Bytes & Windows Security

Latest Support Threads

Back
Top Bottom