Bugs detection using acoustic location
DOI:
https://doi.org/10.18372/2225-5036.21.9689Keywords:
information leakage channels, acoustic information, detection technique, bug, nonlinear locator, hardware system, acoustic location, detection deviceAbstract
This paper adduces the analysis of the efficiency of modern equipment and existing methods of bugs detection. The main characteristics, physical properties, classification features and bugs working principle, the characteristics of the information loss channels that they create was reviewed. It is well known that the research of the basic and most effective methods of bugs’ detection, conduct, based precisely on the principles of their work, physical characteristics and the methods of their installation. Considering that nowadays the most multipurpose device is a non-linear search radar, which may find any type of electronic devices of covert information collection in any of its condition, the main principle of its work was reviewed and main disadvantages was marked. Also the main advantages and disadvantages between existing hardware tools and complexes were marked out. Highlighted that large and expensive devices are used for bugs detecting, searching methods are require lots of time. Bug detection device based on the main principle of work to fix the distance to the object by the time of voice passing to this object was suggested. Suggested method contributes to conclude problems of mobility, cost and searching time reduction.References
Корнеев И.К., Степанов Е.А. Защита информации в офисе: учеб. – М.: ТК Велби, Изд-во Проспект, 2008. – 336 с.
Торокин А.А. Основы инженерно-технической защиты информации. – М.: «Ось-89», 1998. – 331 с.
Хорев А.А. Техническая защита инфор-мации: учеб. пособие для студентов вузов. В 3 т. Т. 1. Технические каналы утечки информации. – М.: НПЦ «Аналитика», 2008. – 436 с.
Энциклопедия промышленного шпионажа /Ю.Ф. Каторин, Е.В. Куренков, А.В. Лысов, А.Н. Остапенко /под общ. ред. Е. В. Куренкова. – СПб: ООО «Издательство Полигон», 2000. – 512 с.
Каторин Ю.Ф., Разумовский А.В., Спивак А.И. Защита информации техническими средствами: Учебное пособие / под ред. Ю.Ф. Каторина – СПб: НИУ ИТМО. – 2012. – 416 с.
НД ТЗІ 2.7-011-12 Захист інформації на об’єктах інформаційної діяльності. Методичні вказівки з розробки методики виявлення закладних пристроїв. – 2012. – 17 с.
Измеритель спектра вторичных полей (детектор нелинейных переходов) «NR-μ». Руковод-ство по эксплуатации. – ЗАО «Группа защиты ЮТА». – С. 2-5.
Конахович Г. Ф., Климчук В.П., Паук С.М., Потапов В.Г. Защита информации в телекоммуни-кационных системах. – К.: «МК-Пресс», 2005. – 288 с.
Руководство пользователя. Программное обеспечение DigiScan EX для приемников AOR, ICOM версия 1.65. Редакция: Lite, Standard, Monitor, Professional, 2006 – 81 с.
Журиленко Б.Є., Левандівська Л.І., Ніколаєва Н.К. Захист циркулюючої в приміщенні акустичної інформації тональним сигналом // Защита информации. – Киев: НАУ, 2007. – С. 36–39.
Патент UA 43628U Пристрій для визначення місця знаходження закладного пристрою за допомогою лазера кл. G 01 S 7/00, 15/00 бюл. №16 опубл. 25.08.2009.
Патент UA 86600 Пристрій пошуку закладного пристрою за допомогою акустичної локації кл. G 01 S 7/52, 15/10 бюл. №1 опубл. 10.01.2014.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.