Optical Espionage
This talk demonstrates the use of laser-based optical side-channel attacks to exfiltrate data from air-gapped systems and perform keystroke logging. By measuring the physical vibrations of a target device using a laser reflected off its surface, the speaker reconstructs keystrokes and monitors system activity. The research highlights the vulnerability of physical hardware to remote optical surveillance and provides a methodology for signal processing to extract information from these side channels. The presentation includes a practical demonstration of a laser microphone setup and the use of software-defined radio for signal demodulation.
Beyond the Air Gap: Extracting Data via Optical Side Channels
TLDR: Researchers have demonstrated that physical hardware, including keyboards and smart speakers, leaks sensitive data through optical and acoustic side channels that can be captured remotely. By using a laser to measure microscopic vibrations on a device surface or capturing light emissions from LEDs, an attacker can reconstruct keystrokes or trigger voice commands. This research proves that even air-gapped systems are vulnerable to sophisticated physical surveillance, requiring defenders to consider physical environmental security as a critical component of their threat model.
Physical security is often treated as a secondary concern in modern security assessments, relegated to badge readers and locked server room doors. However, the latest research into optical and acoustic side channels shows that your hardware is constantly broadcasting its secrets to anyone with a clear line of sight. We are no longer just talking about theoretical physics experiments; we are talking about practical, low-cost techniques that allow an attacker to exfiltrate data from a target without ever touching the network or the device itself.
The Mechanics of Optical Exfiltration
The core of this research relies on the fact that every physical interaction with a computer creates a physical manifestation. When you type on a keyboard, the chassis vibrates. When an LED blinks, it emits light. These are not just digital signals; they are physical events that interact with the environment.
The most compelling technique demonstrated involves using a laser to measure these vibrations. By pointing a laser at a reflective surface on or near a target device—such as the plastic casing of a laptop or a nearby object—an attacker can capture the reflected beam. As the device vibrates due to keystrokes, the reflected laser light modulates. By capturing this light with a photodiode and feeding the signal into a software-defined radio or a high-speed sound card, the attacker can reconstruct the keystrokes.
This is essentially a laser microphone, but instead of listening to audio, you are listening to the mechanical rhythm of a user’s work. The signal processing required to isolate these vibrations from ambient noise is non-trivial, but the tools to do it are readily available. Using GNU Radio, a researcher can build a signal processing chain that filters out the noise, demodulates the signal, and extracts the keystroke data.
Practical Implementation and Signal Processing
To reproduce this, you need a stable laser source, a photodiode, and a way to digitize the signal. The challenge is not the hardware; it is the signal-to-noise ratio. In a real-world engagement, you are dealing with ambient light, building vibrations, and electrical interference.
The signal processing chain typically looks like this:
- Source: A laser diode (red or infrared) pointed at the target.
- Capture: A photodiode converts the modulated light into an electrical signal.
- Amplification: A transimpedance amplifier boosts the weak signal.
- Demodulation: Using GNU Radio, you apply a band-pass filter to isolate the frequency range of the mechanical vibrations.
- Analysis: Tools like iZotope RX allow you to visualize the spectrogram and identify the unique frequency signatures of different keys.
Once you have the raw audio of the keystrokes, you can use keytap3 to perform the actual keystroke recovery. This tool is designed to analyze the acoustic emanations of a keyboard and map them back to specific characters. While it was originally built for audio, the principle remains identical for optical vibrations.
Real-World Risks for Pentesters
For a penetration tester, this changes the scope of a physical security assessment. If you are performing a red team engagement, you should be looking for line-of-sight vulnerabilities. Can you see the target’s desk from an adjacent building? Is there a window that provides a clear view of the hardware?
The impact of these attacks is significant. If you can log keystrokes, you can capture credentials, private keys, or sensitive communications. Because this attack is entirely passive from the perspective of the target’s operating system, there are no logs to review and no EDR alerts to trigger. It is the ultimate "ghost" attack.
Defensive Considerations
Defending against optical side channels requires a shift in how we think about physical workspace security. The most effective mitigation is simple: block the line of sight. If an attacker cannot see your hardware, they cannot point a laser at it. This means using blinds, frosted glass, or simply positioning sensitive equipment away from windows.
For high-security environments, consider the physical properties of your hardware. Matte finishes are less reflective than glossy ones, making them harder to target with a laser. Additionally, some organizations have begun implementing "acoustic masking" or white noise generators in sensitive areas to disrupt the capture of both acoustic and mechanical vibrations.
Ultimately, this research serves as a reminder that the air gap is a myth. Every device exists in a physical space, and that space is part of the attack surface. As researchers continue to refine these techniques, the barrier to entry for optical espionage will only continue to drop. Start looking at your office windows not just as a source of natural light, but as a potential vulnerability that needs to be managed.
Vulnerability Classes
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference

Breaking Secure Web Gateways for Fun and Profit

Listen to the Whispers: Web Timing Attacks That Actually Work

Abusing Windows Hello Without a Severed Hand
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

