Information leaks through regular fiber optic communications is possible in the form of eavesdropping on conversations, using standard fiber optic communications as illegal measuring network. The threat of leakage of audio information can create any kind of irregular light emission, as well as regular light beams modulated at acoustic frequencies. For information protection can be used a means of sound insulation, filtration and noising. This paper discusses the technical possibilities of countering threats by monitoring the optical radiation to detect eavesdropping.
Modern technologies of remote and local cable communication systems are based on optical data transmission systems due to the advantages of fiber optic cable over electrical cable as the transport medium. One of the main directions of development is to ensure the broadband subscriber access which is based on optical networks, completely passive (PON) in the future. Technologies such as fiber to the building/home/office/desk (FTTB/FTTH/FTTO/FTTD) lead to the fact that the fiber replaces wire technology in near environment of user [
Advancement of optical structured cable systems (SCS) closer to the man create new threats to information security circulating in building, office, workplace. One of the risks associated with possibility eavesdropping on confidential conversations, using influence of acoustic fields on transmission of light in the fiber. Optical fiber is successfully used to create sensors and distributed measuring networks. Hence regular optic structured cabling system in building is nothing short of a distributed measurement network, which can be used to measure various physical fields, including acoustic field.
Thus, in commercial and government buildings is necessary to protect confidential negotiations in office manager, office space, meeting rooms and other allocated areas of acoustic (speech) information leakage through the optic structured cabling systems. This problem is new, understudied in connection with what is very dangerous.
Covert obtain of acoustic (speech) information by using regular fiber optic communications for various purposes is one of the new methods of acoustic intelligence, which is called an acousto-optic (fiber) information leakage channel [4,5]. Forming leakage channel due to the fact that acoustic field from holder information affects the fiber of regular cable systems and causes a modulation of light passing through optical fiber, passive or active elements of optical equipment by acoustic frequencies, as well as reflection from a heterogeneities in them (
On the principles of acousto-optic modulation implemented fiber optic sensor of acoustic field in sonar [6,7], vibration sensors [8,9], and other devices [2,3]. For example, in fiber optic perimeter security systems by vibration
acoustic effects of the intruder on fiber is registered penetration of object. Also, for a long time being developed fiber optic hydrophones, whose operation is similar to vibration sensors with various types of optical schemes. Thus, our research are supported by numerous practical work in neighboring areas. The intruder using various schemes to connect to fiber optic communications is able to conduct tapping conversations on securable.
The bases of channels leakage are light beams in an optical cable lines. All light beams can be divided into regular (legal), related to the physical implementation of data transmission protocol, and irregular (illegal), specially generated by an attacker to gain unauthorized output of the speech information. Regular light beams that are formed digital transmission techniques can create a leakage channel without disrupting the entire system, since level of acoustic action on a regular light beam reduces the signal/ noise is negligible. By irregular flows will be assigned any radiation, which generated by light sources with unauthorized connections to fiber optic communications.
Research on the effectiveness of speech leakage carried by the articulator method, which defines speech intelligibility W (%) as the number of words correctly understood at channel output to the number of words spoken at entrance channels leakage. They showed a high risk of new method of eavesdropping. Estimation of efficiency made for amplitude modulation of light passing flows in communication line, containing the basic elements of passive optical networks—fiber optic cable free and attached to the building design, detachable connections, attenuators, etc. This research on shared standard equipment was shown possibility eavesdropping of voice over fiber optic communications with the sound pressure level (SPL) of 60 dB in intelligibility of W up to 80%. The modulation depth of intensity of transmitted light reached saturation into 0.3% at an SPL of 90 dB in the surrounding space.
We discuss the overall sequence of actions infringer to obtain acoustic information through fiber optic communications and give a general description used by special technical facilities (
(fiber) information leakage channel is virtually impossible without physical access to optic cable that passes through selected rooms. Cabling must be free of active optical equipment on site between the infringer and the source of acoustical information, which is associated with recovery of regular shape signal and suppressing noise components of radiation in active equipment. Between the infringer and the source of acoustical information must be placed only passive optical elements, which do not change significantly modulation of light. To passive optical elements, except the optical cable relate sockets, adapters, splitters, couplers, attenuators. It should be noted that such a structure of the optical cable network is the most promising for subscriber access and rapidly developing as technology of passive optical networks.
Implementation of leakage channel requires applying technical facilities to connect to the cable and recording optical emission. Connection is implemented through regular plug connections, which are used to connect parts of network among themselves and to attach to optical line (OLT) and optical network (ONT) terminals. Connection is dropped and into gap is inserted insertion with input of probing radiation and outlet of part. Another method of connection is to apply coupler radiation on macrobends optic cable. All the proposed methods do not require special technical facilities, distribution of which is regulated by normative documents, such devices are used for installation the optical network. Another method is using cable break to insert the coupler by welding fibers.
Optical scheme of eavesdropping can be accomplished in several ways (
network. Probing by light can be produced by reflection or by passing from place of modulation. In this case it is possible to combine transmitting and receiving radiation. Second, for eavesdropping can be used regular radiation which applies for traffic within the network.
The danger leakage channel is determined by efficiency of acoustic modulation of light in location of sound source. Acoustic field causes various kinds of modulating light in optical fiber, by choosing parameters demodulation (amplitude, phase, polarization and frequency) is always possible to achieve very high efficiency of leakage channel acoustic (speech) information. Another danger associated with availability of installation equipment that can be used as special technical facilities of acoustic intelligence. For example, for voice communication between installers network uses fiber optic phone, which allows for direct connection to fiber carry voice communications over a distance of 200 km. Fiber optic phone can connect to fiber optic cable without it breaking through macrobend fiber. On the same principle joining works detection of optical signal in fiber, which allows establishing direction of optical signals in coated with 250 micron, 900 microns, as well as in standard optical cords up to 3 mm without gap. Level meters backscatter is designed for monitoring quality of polishing of single-mode fiber optic connectors and measure level of backscatter from other components of communication lines can be used for eavesdropping, also. Still has great potential optical time domain reflectometer (OTDR)—basic device condition monitoring optical. The above instruments are widely available commonly used for installation of optical cable systems, which increases their use in the channel leakage [
All of the major ways to counter of speech information leakage through waveguide channels can be divided into the following types:
• Soundproofing channel environment, the passive method is to reduce influence of acoustic field on channel environment;
• Filtration of data carrier in transmission channel, the method consists in not passing through channel of irregular signals and modulations with confidential speech information;
• Masking data carrier in transmission channel, the method consists in concealment by addition of a special mask signal and modulations;
• Moisy channel environment, the active method consisting in creating synthetic interference and noise on acoustic frequencies [11,12].
Each method has its advantages and disadvantages, but the overall effectiveness of any security depends largely on the technical capabilities of detecting threats to information security [
Features fiber optic channel allows us to offer a simple and effective way to detect unauthorized output of information (eavesdropping) by monitoring the current in channel of light beams. Any attack on the security system via fiber optic channel for accessing acoustic (speech) information associated with light beams in fiber. Monitoring parameters of light beams in the channel allows identifying any possibility of unauthorized output. This will require registration of radiations pass through fiber optic elements, the allocation authorized by the data carriers (regular radiation), to identify unauthorized flows (irregular radiation) and modulation of acoustic frequencies in any of them. Irregular emission (from external sources) may have a spectral composition as the crossover with regular radiation and does not intersect with it, which is modulated by an external acoustic signal contains confidential information.
Preventing eavesdropping is achieved by performing the following rules. First, regular light beams should not be modulated on audio frequencies. Second, irregular flows that are not provided by the physical implementation of data transmission protocol of network must be absent, and when available, they should not be modulated sound. These simple rules make it possible to detect an attack on a security system and neutralize it. Thus, the degree of risk of acoustic (speech) information leakage is determined by the following features:
1) Irregular light beams is detected in the channel information transmission;
2) Regular light beams is modulated by one of the parameters of optical radiation (amplitude, phase, polarization, frequency) and/or simultaneously on several parameters by external acoustic signal;
3) Abnormal light beams which are separated from spectrum are modulated by one of the parameters of optical radiation (amplitude, phase, polarization, frequency) and/or simultaneously on several parameters by external acoustic signal on a given optical wavelength.
That at least one of these conditions is sufficient for the formation of acoustic (speech) information leakage and can be used to estimate threats to information security.
The problem of detecting possibility of speech information leakage through regular fiber optic communication is solved by installing special equipment, registering light beams in transmission channel information. Implementation can be carried out based on standard or specially created items, which include photodetector, connected to the fiber optic link, also, optical, electronic and optoelectronic analytical element for allocation of acoustic oscillations parameters detected optical radiation. Protection device can be done in two structural decisions: as a separate unit, which has its own alarm system threats, or block the built-in active equipment, which has informational link with the main equipment. Let us discuss possible implementation of devices and their features function.
The external indicating device threat (
Although the device registers only amplitude modulation of optical radiation and does not register other modulation types, but given that other types of modulation can be effectively observed only when using probing (illegal) radiation, we can assert control of all types of modulation by detecting irregular radiation. Another possibility inherent in this device is that it acts as a filter irregular optical radiation since the regular radiation passes indicator threats and irregular do not pass. Such property greatly limits the application optical design on the passage, which is more effective scheme for reflection. Reflected signal is always weaker than direct probing radiation. Scheme on reflection to the infringer demands more intense radiation to reach an acceptable echo. However for threat indicator any probe signal is a direct that goes either left or right of him so its check will be much safer than the infringer, recording only reflected signal.
The internal indicating device threat (
to change the driver itself transceiver. The main problem of this conversion is to place additional optical elements in required form factor of transceiver. Discuss the structure and operation of indicator threats in integrated dual-port active equipment with separate fiber optic input (the channel receiver) and output (the channel transmitter). Own monitoring system be put on each fiber in the form of additional sensor. In the port of receiver signal is divided into regular and irregular radiation through an optical circulator. Information signal from the regular receiver is processed by conventional means for transmission channel, and arrives at the integrator output which generates an analog signal from the regular radiation that can be modulated by an acoustic frequencies. Selection of irregular radiation is recorded and converted to its own receiver to an analog signal. In the port of transmitter there is no incoming radiation, thus the channel is required separation of radiation on regular and irregular, they are divided by propagation direction. Photodetector is connected to transmitter through coupler and the signal from it is also integrated. Thus, the control system has three receivers with integrated units that make up three analog signals, by which concludes that existence of a threat eavesdropping. Analysis is performed on the existence of irregular radiation and the presence typical components of speech in signal spectrum. On this basis is generated danger signal.
At present the implementation of methods described above to identify threats to speech information leakage does not exist. As can be seen from a general description of functioning principles of protection devices, to develop working models for detection of eavesdropping by fiber-optic communications is possible based on standard equipment. The main element of protection system is optical detector with an amplifier at sound frequencies, which is present in any analog fiber-optic phone. Standard analog fiber optic phone has high sensitivity which allows recording very small fluctuations in intensity and detect attempts at eavesdropping. However, it has significant disadvantages for the systems security one of them being sensitivity shift in the infrared spectrum, which does not register with highly reliable probing emission of visible spectrum. At distances of several hundred meters, total optical loss will amount to several dB at wavelengths in the visible range in a standard quartz fiber that cannot reliably detect weak optical radiation regular photodetectors.
Another disadvantage is need for additional fiber optic components to register modulation by polarization, frequency and phase. But in any case, a fiber optic phone is closest by principles of functioning for use in protection from eavesdropping through fiber optic communications.
Protection against eavesdropping of selected rooms through a fiber optic communications can be represented as follows (
We conducted a trial listening to fiber optic communication lines consisting of optical cable with dual fibers of length exceeding 25 m and a thickness of 3 mm each. Light output was formed an optical tester or a heliumneon laser and registered a fiber-optic phone with analog modulation. Acoustic effects produced locally using computer speakers, acting directly at cable and network elements. The acoustical signal was very noisy, but the words be recognized speech at the hearing.
The presented modeling studies confirmed possibility of implementing such schemes identify attacks even with the help not profile equipment. Production of specialized equipment can more reliably resolve the problem identification of eavesdropping and the security services to help protect speech information in modern rapid proliferation of fiber optic communications technologies.
This work is a development patent for invention [