Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.6.1157

The danger and vulnerability of eavesdropping by using loud-speakers  

Lee, Seung Joon (Center for Information Security Technologies (CIST), Korea University)
Ha, Young Mok (Center for Information Security Technologies (CIST), Korea University)
Jo, Hyun Ju (Center for Information Security Technologies (CIST), Korea University)
Yoon, Ji Won (Center for Information Security Technologies (CIST), Korea University)
Abstract
The development of electronic devices has recently led to many problems such as personal information rape and leakage of business information. Conventional loud-speakers have been generally used to output devices. It can be, however, operated as a micro-phone which was abused as a means for eavesdropping since the speaker and microphone have basically the equivalent structure. Most importantly, the general peoples are not aware of the approaching danger about using speaker as microphone. And, traditional eavesdropping detection equipment does not check the attack. In this paper, we demonstrate that there is a serious danger and vulnerability in using loud-speakers since they can be used as eavesdropping devices.
Keywords
Eavesdropping; Tapping; Bugging; Speaker;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Nature News Snoopers can hear what you type, http://www.nature.com/news/2005/050922/full/news050919-9.htm
2 Don Davis and Eugene Patronis, "Sound System Engineering", 2nd Ed., Indianapolis, Howard W. Sams Co,, 1987, pp. 85-87, 402-405.
3 "'Borderless' surrender by DPRK adminis tration office sixth cyber attack," Chosun Daily, 2013.4.10., http://biz.chosun.com/site/data/html_dir/2013/04/10/2013041001593.html
4 "Smartphone application 'Spy phone' first exposure," Dong-A Daily, 2013. 4. 5, http://dkbnews.donga.com/3/all/20130405/54219969/3
5 W. Zemlin, "Speech and Hearing Science," 4th Ed., Boston:Allyn & Bacon, 1998.
6 Georgia State University, http://hyperphysics.phy-astr.gsu.edu/hbase/sound/soucon.html
7 T. Yamamoto and T. Tsukagoshi, "New materials for loudspeaker diaphragms and cones-An overview," J. Acoust. Soc. Am. Volume 69, Issue S1, 1981.
8 P. Comon and C. Jutten, Handbook of Blind Source Separation, 1th Ed., Academic Press(Elsevier), Feb 2010.
9 C. M. Grinstead, "Introduction to Probability," 2th Ed., American Mathematical Society, pp.325-364, 1997.
10 J. V.Stone, "Independent Component Analysis : A tutorial Introduction," 1th Ed., The MIT Press Cambridge, Massachusetts, 2004 Londeon, England, Feb. 2010.
11 D. Asonov AND R. AgrawalR. "Keyboard Acoustic Emanations", In Proceedings of the IEEE Symposium on Security and Privacy (2004), pp. 3-11.
12 L. Zhuang and F. Zhou, "Keyboard Acoustic Emanations", In Proceedings of the IEEE Symposium on Security and Privacy (2004), pp. 373-382.
13 Realtek ALC882 Series Datasheet, oct, 2005
14 Korea Electronics Association, "Speaker industrial trend", http://www.eiak.org/electronic_info/data/Speaker_2008.pdf
15 Sedra and Smith, Microelectronic Circuits, 6th Ed., Oxford University Press, USA, 2011.
16 Bosch Audio, Bosch Communications Systems 2011 Bosch Public Address Product Catalogue
17 Daniels, Drew. "Notes on 70-Volt and Distributed System Presentation", db, March/April 1988.