The method of active protection of information from the laser acoustic intelligence systems
DOI:
https://doi.org/10.18372/2410-7840.21.13545Keywords:
technical protection of information, methods of active protection, laser microphones, acoustic information protection devicesAbstract
In this paper, we analyzed the optoelectronic technical channel of information leakage and Laser Spy System, analyze the threats which they make and offer solutions to existing information security issues. The Laser Spy System is considered by many to be the Holy Grail of high tech spy devices because it can give the user the ability to listen in on conversations that take place in a distant building without having to install a bug or transmitter at the location. The Laser Spy System was said to be invented in the Soviet Union by Leon Theremin in the late 1940s. Using a non-laser based infrared light source, Theremin's system could detect sound from a nearby window by picking up the faint vibrations on the glass surface. The KGB later used this device to spy on the British, French and US embassies in Moscow. The Laser Spy System goes by several names such as the Laser Microphone, Laser Listener, Laser Bug, Window Bounce Listener and a few similar names. The Laser Spy certainly works well under ideal conditions, but it has many strengths and weaknesses that will be discussed in this paper. General component in the Laser Spy system is the laser, which will target a distant reflective object and send the beam back to your receiver for decoding. When the laser reflects from the target window, the slight vibrations from conversations or noise that vibrate the windows cause a very slight change in position of the returning laser beam. These changes in the laser fluctuations are taken by a phototransistor and then converted into sound. The most common methods and means of protection are presented, these methods can be both active and passive, but they all have a number of shortcomings, such as high cost, the creation of acoustic noise, insufficient protection, etc. We are proposed the method of laser noise as an alternative to the existing one, and the concept of its implementation is given. This method is based on the creation of counter laser radiation. This radiation consists of a plurality of laser beams that have parameters that are similar to the parameters of the rays of the attacker. Experiments have shown that the interception of the reflected laser beam is complicated if anti-radiation is applied.
References
Ю. Каторин, Е. Куренков, А. Лысов, А. Остапенко Большая энциклопедия промышленного шпионажа, СПб.: ООО "Издательство Полигон", 2000, 734 с.
Принципи зняття звукової інформації зі скла і її захист. [Електронний ресурс]. Режим доступу: http://ua.nauchebe.net/2012/09/principi-znyattya-zvukovo%D1%97-informaci%D1%97-zi-skla-i-%D1%97%D1%97-zaxist/.
В. Хорошко, А. Чекатов, Методы и средства за-щиты информации, К.: Юниор, 2003, 504 с.
Glass-shield. Стекло для защиты от прослушива-ния помещений с помощью направленного лазерного луча. [Електронний ресурс]. Режим дос-тупу: http://www.zoohall.com.ua/2541-glass-shield-steklo- proslushivanie.html.
А. Хорев, "Средства акустической разведки: на-правленные микрофоны и лазерные акустиче-ские системы разведки", Спецтехника и связь, № 3, С. 34-43, 2008.
LaserSpyDevice [Електронний ресурс]. Режим доступу: http://www. lucidscience. com/ pro- laser% 20 spy%20device-1.aspx.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).