"Ah, you are interested in Van Eck?" asked one of the German hackers. They maintained a clean cut appearance, and through discussion Scott learned that they were funded as part of a university research project in Frankfurt.

Scott watched and listened as they set up a compelling demonstra- tion. First, one computer screen displayed a complex graphic picture. Several yards away another computer displayed a foggy image that cleared as one of the students adjusted the antenna attached to the computer.

"Aha! Lock!" one of them said, announcing that the second comput- er would now display everything that the first computer did. The group played with color and black and white graphics, word proc- essing screens and spreadsheets. Each time, in a matter of seconds, they 'locked' into the other computer successfully.

Scott was duly impressed and asked them why they were putting effort into such research. "Very simple," the apparent leader of the Frankfurt group said. "This work is classified in both your country and mine, so we do not have access to the answers we need. So, we build our own and now it's no more classified. You see?"

"Why do you need it?"

"To protect against it," they said in near unison. "The next step is to build efficient methods to fight the Van Eck."

"Doesn't Tempest do that?"

"Tempest?" the senior student said. "Ha! It makes the computer weigh a thousand pounds and the monitor hard to read. There are better ways to defend. To defend we must first know how to attack. That's basic."

"Let me ask you something," Scott said to the group after their lengthy demonstration. "Do you know anything about electromag- netic pulses? Strong ones?"

"Ya. You mean like from a nuclear bomb?"