NY Times – Eight years ago, while working late in a darkened computer lab at the University of Seattle, Joe Loughry became fascinated with the lights blinking on the face of his modem. They seemed to be relaying information about the long file transfer he had started, and he wondered exactly how much information the tiny light-emitting diodes were transmitting.
Quite a lot, it turns out.
Using a process called optical emanations detection, similar to the technology used in fiber optic networking, Mr. Loughry, then a graduate student in software engineering, and his thesis adviser, David Umphress, tested 39 different communications devices, like modems and the routers that shuttle data across networks. They wanted to see if they could recreate some or all of the data passed through them just by detecting variations in their light-emitting diodes, or L.E.D.â€™s.
Ultimately, 14 of the common devices they tested blinked their secrets in a kind of high-speed Morse code, and with light detectors the two researchers could capture data up to 100 feet away. The information intercepted included passwords, Web addresses and text files.
Download 192.168.1.1 Admin apk 3.0 and all version history for Android 192.168.l.l ipAdmin helps you to manage the admin security page of any routers
Because most home computers now have internal modems without visible lights, consumers will be largely unaffected by the discovery. But those with complex home or office networks, and businesses like Internet service providers, may have to rethink the locations of their computer hardware.
â€œWe discovered that anywhere you have a modem and itâ€™s close to a window, somebody can see potentially what youâ€™re transferring,â€? Mr. Umphress said.
Mr. Loughry estimated that there were several million devices â€œin the wild,â€? from network routers to airport currency dispensers, that might be broadcasting sensitive data through their blinking lights. A diligent hacker with a video camera rootexplorer apk download could theoretically record the patterns and reconstruct e-mail or credit card information, he said.
Although the lights provide some valuable troubleshooting information to experts, in most cases they are just for show. Some companies actually place their racks of blinking machines near a window for effect, Mr. Umphress said, a practice he now discourages. One of the best ways to prevent information leakage, he said, is simply to cover the L.E.D.â€™s with duct tape.
Mr. Loughry, 37, who now works at Lockheed Martin in Denver, was surprised that no one else had stumbled on the idea, even in the eight years it took for the team to complete their paper on the subject.
Mr. Umphress, 46, who is now an associate professor at Auburn University, said: â€œWe discovered that no one really had done this kind of research. The reaction that we received from the security community was one of surprise.â€?
The paper will appear in the August issue of ACM Transactions on Information and System Security.
â€œWe did all of this on a shoestring,â€? Mr. Umphress said. He emphasized that the project was not underwritten by any â€œcloak-and-dagger-type organization.â€?
â€œNo spy stuff,â€? he said. â€œWe did have to clear the paper with the National Security Agency, however. That took six months.â€?