Return to Notebooks

Van Eck Phreaking

a precise exploitation of electromagnetic emanations from electronic devices

start: 2026.05.01, 13:04 · end: 2026.05.01, 13:04
status: In Progress

Status Indicator

The status indicator reflects the current state of the work: - Abandoned: Work that has been discontinued - Notes: Initial collections of thoughts and references - Draft: Early structured version with a central thesis - In Progress: Well-developed work actively being refined - Finished: Completed work with no planned major changes This helps readers understand the maturity and completeness of the content.

· certainty: certain

Confidence Rating

The confidence tag expresses how well-supported the content is, or how likely its overall ideas are right. This uses a scale from "impossible" to "certain", based on the Kesselman List of Estimative Words: 1. "certain" 2. "highly likely" 3. "likely" 4. "possible" 5. "unlikely" 6. "highly unlikely" 7. "remote" 8. "impossible" Even ideas that seem unlikely may be worth exploring if their potential impact is significant enough.

· importance: 8/10

Importance Rating

The importance rating distinguishes between trivial topics and those which might change your life. Using a scale from 0-10, content is ranked based on its potential impact on: - the reader - the intended audience - the world at large For example, topics about fundamental research or transformative technologies would rank 9-10, while personal reflections or minor experiments might rank 0-1.


I don't quite remember where I first encountered the idea of Van Eck phreaking. Probably a blog in some sense related to cybersecurity, although the topic is not quite in that general domain. The name is derived from the Dutch PTT researcher Wim van Eck, who in 1985 published an unclassified technical demonstration which displayed a TV set reconstructing the screen content from a CRT monitor hundreds of meters away, using components that cost less than $15. The phenomenon itself was however widely known by intelligence agencies since at least World War II. Bell Labs had detected teletype cipher leakage in 1943, but van Eck's paper brought proper attention to the subject.

If it is still unclear, the act of VEP is compromising emanations from electronic equipment. All electronic equipment radiates signals that are correlated with its internal state. It is the information in those signals that is susceptible to being targeted while leaving no forensic trace on the target.

See Also

Notes

To Read

Primary Source Material

Papers

Secondary

Van Eck phreaking demonstration setup with antenna intercepting CRT emissions
Van Eck phreaking demonstration: reconstructing a display from its electromagnetic emanations.
TEMPEST lab with spectrum analyzer, parabolic antenna, and target monitor
TEMPEST lab setup with spectrum analyzer and parabolic antenna aimed at a target display.
EMC testing bench with Aaronia antenna, spectrum analyzer, and target laptop
EMC testing bench with directional antenna and spectrum analysis equipment.

permanent link Notebooks RSS feed