Computer Snoopers Read Electromagnetic Emissions

Researchers were able to track the keystrokes of a nearby computer via fluctuations in its electromagnetic radiation output. Christopher Intagliata reports

Illustration of a Bohr atom model spinning around the words Science Quickly with various science and medicine related icons around the text

Join Our Community of Science Lovers!


On supporting science journalism

If you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.


Connecting your computer to the Internet gives would-be spies an obvious entry point to your machine. But other ways exist to snoop. Because even computers that aren't connected to the Internet broadcast their activity in the form of electromagnetic radiation. 

"Basically your computer is full of transistors. And they're switching current from high to low depending if it is a zero or a one of the bit that they're trying to execute." Alenka Zajic, an electrical engineer at Georgia Tech. "When you do that you're creating a voltage fluctuation and current fluctuation. And that basically creates electromagnetic field." 

By hooking an antenna and receiver up to a laptop, Zajic and her colleagues were able to log the keystrokes of a computer in the next room, by measuring exceedingly tiny fluctuations in the computer's radiation. The same technique can reveal which programs you're using, too. "Every one of them has a different signature in electromagnetic fields. So I can tell which application you opened by looking into the spectrum."

The researchers quantified the signal available to eavesdroppers in a recent paper, presented at the IEEE/ACM International Symposium on Microarchitecture in the U.K. [Robert Callan, Alenka Zajic, and Milos Prvulovic: A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events]

Of course, real spies at the NSA and the CIA probably already know about this trick, she says. But by alerting developers to the problem, it might be possible to mask these electromagnetic leaks. And keep your computer's activity to yourself.

—Christopher Intagliata

[The above text is a transcript of this podcast.]
 

It’s Time to Stand Up for Science

If you enjoyed this article, I’d like to ask for your support. Scientific American has served as an advocate for science and industry for 180 years, and right now may be the most critical moment in that two-century history.

I’ve been a Scientific American subscriber since I was 12 years old, and it helped shape the way I look at the world. SciAm always educates and delights me, and inspires a sense of awe for our vast, beautiful universe. I hope it does that for you, too.

If you subscribe to Scientific American, you help ensure that our coverage is centered on meaningful research and discovery; that we have the resources to report on the decisions that threaten labs across the U.S.; and that we support both budding and working scientists at a time when the value of science itself too often goes unrecognized.

In return, you get essential news, captivating podcasts, brilliant infographics, can't-miss newsletters, must-watch videos, challenging games, and the science world's best writing and reporting. You can even gift someone a subscription.

There has never been a more important time for us to stand up and show why science matters. I hope you’ll support us in that mission.

Thank you,

David M. Ewalt, Editor in Chief, Scientific American

Subscribe