We demonstrate [tau.ac.il] the extraction of secret decryption keys from laptop computers, by nonintrusively measuring electromagnetic emanations for a few seconds from a distance of 50 cm. The attack can be executed using cheap and readily-available equipment: a consumer-grade radio receiver or a Software Defined Radio USB dongle...
It seems to me from the following that there still needs to be a known time marker, software access, or that the device needs to be in proximity for an extended period of time to analyze and figure out when a key is being used.
We successfully extracted keys from laptops of various models running GnuPG (popular open source encryption software, implementing the OpenPGP standard), within a few seconds. The attack sends a few carefully-crafted ciphertexts, and when these are decrypted by the target computer, they trigger the occurrence of specially-structured values inside the decryption software...
Is it time for full Faraday cages in our boxes? Perhaps there can be another piece of hardware that obfuscates the EM radiation with some junk EM.
-Frantically wraps cable around his machine-
Link to the technical PDF [tau.ac.il].