A brief, bad history of emissions security exploitation (and why it's cheaper than you think)
In 1985, a Dutch researcher named Wim van Eck published a proof of concept for a simple and inexpensive system that could reproduce the visual data of a remote video display unit (Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? PTT Dr. Neher Laboratories, St. Paulusstroat 4. 2264 XZ Leidschendam, The Netherlands. Download PDF from Cryptome.) Using this method, it became trivial to retrieve visual information from, for example, computer monitors using only a standard television receiver. Using a directional antennae and amplifier, van Eck's method proved effective at several hundred meters.
Many incorrectly believe that van Eck essentially created the technique of remote receiver surveillance. As van Eck explains:
"It is possible in some cases to obtain information on the signals used inside the equipment when the radiation is picked up and the received signals are decoded. [...] This problems is not a new one; defense specialists have been aware of it for over 20 years."Despite the understanding that such techniques were possible, the van Eck paper still proved to be somewhat of a bomb thrown into the security industry. Van Eck again explains why:
"Until recently it was considered very difficult to reconstruct the data hidden in the radiated field, and it was therefore believed that eavesdropping on digital equipment could only be performed by professionals with access to very sophisticated detection and decoding equipment. As a result, digital equipment for processing information requiring medium or low level protection, such as private or business information, is not protected against eavesdropping of this kind."Consequently, when, for example, Markus G. Kuhn of Cambridge University claimed in his (equally ground-breaking) 2004 paper Electromagnetic Eavesdroping Risks of Flat-Panel Displays that "Electromagnetic eavesdropping of computer displays [was] first demonstrated to the general public by van Eck in 1985" we are forced to correct his assertion by maintaining that van Eck was the first to demonstrate cheap and widely available electromagnetic eavesdropping of computer displays to the general public. Those suspicious of my assertion here are welcome to consider R.L. Dennis' August 1966 paper, "Security and Privacy in Computer Systems", a brief summary of which is provided in a text-book of the same title from 1973 edited by Lance Hoffman:
"Passive infiltration may be accomplished by wiretapping or by electromagnetic pickup of the traffic at any point in the system. Although considerable effort has been applied to counter such threats to defense communications, nongovernmental approaches to information privacy usually assume that communication lines are secure, when in fact they are one of the most vulnerable parts of the system. [p. 77]"
"In addition to the spectrum of threats arising from wiretapping, electromagnetic radiation from terminals must be considered.[12] Electromagnetic radiation characteristics will depend heavily on the type of terminal, and may in some cases pose serious shielding and electrical-filtering problems. More advanced terminals using cathode ray tube for information display may create even greater problems in trying to prevent what has been called 'tuning in the terminal on Channel 4.' [p. 84]"
For at least as long as techniques for video display unit reproduction have existed, the US military has invested in countermeasures to foil those techniques. It was as early as the mid-1950's that the US established the Transient Electromagnetic Pulse Emanation Standard with the publication of NAG-1A, in the earliest attempt to shield military and diplomatic communication from electromagnetic eavesdropping. The standard, and the research projects supporting the standard, would collectively become known as TEMPEST. The Cold War would spawn a series of innovations in both surveillance and countermeasures of this kind. Unfortunately, a great deal of that history remains highly contested, classified and often both. One milestone that can provide readers with an idea of just how long this technology has been in practical usage was Operation Rafter, in which British intelligence agents located KGB agent radio transceivers using radiation from oscillators - even when the radios were not transmitting.
A complete history of US TEMPEST research could easily fill a book, as such a history would necessarily cover over 60 years of research and innovation. The brief overview here is meant to help clarify a few important points about electromagnetic eavesdropping.
"Because of the high cost of equipment and the difficulty of intercepting and exploiting RF emanations, reports of successful attacks against emanations have been limited primarily to high-value sources of information such as military targets and cryptologic systems."
This isn't to say that there are not serious practical difficulties with this approach: there are. Electromagnetic radiation exists on a spectrum that includes frequencies with very different types of behavior: X-Rays can go through things, while visible light typically can't. Both are "electromagnetic radiation". Typically, though, PC's don't express X-rays. Furthermore, data centers and similar facilities tend not to have windows. Furthermore, it is unclear how many of these types of attacks could translate to a virtualized environment. This isn't a problem that should keep people in charge of IT resources up at night. But it is worth noting that the reason these attacks are rare is likely the result of these practical limitations, not the general unavailability of the attack vector itself.