Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
4Activity
0 of .
Results for:
No results containing your search query
P. 1
Tempest and Echelon

Tempest and Echelon

Ratings: (0)|Views: 1,092|Likes:
Published by Simon Benjamin
http://gangstalkingbelgium.wordpress.com/presse/
http://peacepink.ning.com/profile/bsimon
http://www.scribd.com/bensim24
http://fr.gravatar.com/bensim23
http://www.chauffage-indusriel.be/
http://gangstalkingenwallonie.blogspot.be/
http://gangstalkingbelgium.wordpress.com
http://gangstalkingbelgique.blogs.dhnet.be/
http://www.gang-stalking.be/
http://www.linkedin.com/pub/simon-benjamin/50/337/5a1
http://gangstalkingbelgium.wordpress.com/presse/
http://peacepink.ning.com/profile/bsimon
http://www.scribd.com/bensim24
http://fr.gravatar.com/bensim23
http://www.chauffage-indusriel.be/
http://gangstalkingenwallonie.blogspot.be/
http://gangstalkingbelgium.wordpress.com
http://gangstalkingbelgique.blogs.dhnet.be/
http://www.gang-stalking.be/
http://www.linkedin.com/pub/simon-benjamin/50/337/5a1

More info:

Categories:Types, Research, Science
Published by: Simon Benjamin on Aug 21, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/08/2014

pdf

text

original

 
 
TEMPEST AND ECHELON
A SEMINAR REPORT
Submitted by 
ABNA RAHIM
in partial fulfillment for the award of the degree of 
B-TECH DEGREEin
COMPUTER SCIENCE & ENGINEERING
SCHOOL OF ENGINEERING
COCHIN UNIVERSITY OF SCIENCE &TECHNOLOGY KOCHI- 682022
JULY,2010
 
ABSTRACT
TEMPEST
is a codename referring to investigations and studies of conductedemission (CE). Compromising emanations are defined as unintentionalintelligence-bearing signals which, if intercepted and analyzed, may disclose theinformation transmitted, received, handled, or otherwise processed by anyinformation-processing equipment.TEMPEST is a code word that relates to specific standards used to reduceelectromagnetic emanations. In the civilian world, you'll often hear aboutTEMPEST devices (a receiver and antenna used to monitor emanations) orTEMPEST attacks (using an emanation monitor to eavesdrop on someone).While not quite to government naming specs, the concept is still the same.Echelon is the technology for sniffing through the messages sent over a network or any transmission media, even it is wireless messages. Tempest is thetechnology for intercepting the electromagnetic waves over the air. It simplysniffs through the electromagnetic waves propagated from any device, even it isfrom the monitor of a computer screen. Tempest can capture the signals throughthe walls of computer screens and keystrokes of keyboard even if the computeris not connected to a network. Thus the traditional way of hacking has a littleadvantage in spying.
 
TABLE OF CONTENTS
 
CHAPTER TITLE PAGEABSTRACT i1. INTRODUCTION 12. TEMPEST and ECHELON 4
2.1 The Need for an Interception System 4
3. INSIDE TEMPEST 7
3.1 Sources of TEMPEST Signals 83.2 Types of TEMPEST signals 83.3 Propagation of TEMPEST signals 103.4 Technology behind TEMPEST 10
4. PROTECTION FROM TEMPEST ATTACKS 18
4.1TEMPEST Testing and selection 184.2 TEMPEST Fonts 194.3 TEMPEST Proof Walls 20
5. INSIDE ECHELON 21
5.1 Espionage 215.1.1 Espionage Targets 225.1.2 Espionage Methods 225.1.2.1 Scope for interception from aircraft and ships 265.1.2.2 Scope for interception by spy satellites 265.2 The ECHELON Dictionaries 29
7. CONCLUSION AND FUTURE SCOPE 32REFERENCE 34

Activity (4)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->