1 / 14

TEMPEST AND ECHELON

TEMPEST AND ECHELON. A SEMINAR BY ROHIT RAJ ROLL NO-07130 VII TH SEM BRANCH – CSE I. INTRODUCTION. ECHELON. - Developed by National Security Agency of USA. - A secret project to spy on people by tracing their message.

korbin
Télécharger la présentation

TEMPEST AND ECHELON

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TEMPEST AND ECHELON A SEMINAR BY ROHIT RAJ ROLL NO-07130 VII TH SEM BRANCH – CSE I

  2. INTRODUCTION ECHELON • - Developed by National Security Agency of USA. • - A secret project to spy on people by tracing their message. • - To find out the terrorist activities across the globe. • Developed with the highest computing power connected through the • satellites all over the world. • Sniffing of messages over a network or any transmission media , even • wireless. • - Design: • * position intercept stations all over the world to capture all satellite, • microwaves , cellular and fiber-optic communications. • * process this information through the massive computer capabilities • of the NSA • * use advanced voice recognition and optical character recognition • (OCR) programs and look for code words or phrases known as • “echelon dictionary”

  3. TEMPEST • - Stands for “Transient Electro-Magnetic Pulse Emanation Standard”. • Main Theory • * any electronic or electrical device emits electromagnetic • radiations of specific key when it is operated. • Intercept electro-magnetic waves over the air. • It even sniffs signals emanating from computer screens(range of few • kilometers). • Captures signal through walls. • VDUs emit radiations when scanning up on vertical or horizontal • range beyond the screen.

  4. Figure : A Lab Experiment Actual VDU Tempest Receiver

  5. Need for an interception system • To keep track of spies and terrorists for preserving the • security of the country. • Also being used for purposes well outside its original • mission. • For political spying and industrial espionage.

  6. INSIDE TEMPEST: • TEMPEST is a short name referring to investigations and studies • of compromising emanation(CE). • Compromising emanations(CE) are defined as unintentional • intelligence bearing signals. • CE consists of electrical and acoustical energy unintentionally • emitted by a source. • The emanations occur as: • - text-relatedsignals through • a)common circuit element such as ground and power • supplies. • b)inductive and capacitive coupling. • - propagation of sound waves from mechanical and • electromechanical sound waves.

  7. Sources of TEMPEST signals a)Functional sources: -switching transistors, oscillators, signal generators synchronizers, line drivers and line relays. b)Incidental sources: -electromechanical switches and brush type motors.

  8. PROTECTION FROM TEMPEST ATTACK :- There are 3 methods to protect the computer from TEMPEST attack. • TEMPEST testing and selection of • appropriate devices. • TEMPEST fonts. • TEMPEST proof walls.

  9. PROBLEMS OF ECHELON AND TEMPEST:- • This system will not provide any privacy for our own people in home and abroad . It will not provide any security of data for the corporate world. • Every military secret is public to NSA and it’s allies so if anything goes wrong mass destruction will occur. • As stated , echelon can protect us from terrorist attack but we have to ensure that these systems are protected from intrusion. If not so then result will be hazardous. • Tempest equipments are only available in AMERICA and it is prohibited to be exported from there so that no terrorist will get these equipments .

  10. CONCLUSION • Tempest is the technology for spying from electronic • equipments without any physical contact. • Echelon is the vast network formed by NSA and its • allies all over the world to intercept the messages send • through any transmission media. • Nothing can be hidden from these systems. • Corporate firms are protecting there companies from • tempest attacks by the use of software and equipments • Unfortunately our INDIA does not have a tempest • equipment developed yet.

  11. Future scope of tempest&echelon • These can be used to empower intelligence agencies to do their job better than before. • As INDIA is not having a tempest equipment developed yet so we have to develop one for empowering our intelligence agencies and military agencies in order to protect our secret data from them.

  12. References: • EUROPEAN PARLIAMENT session document 11’th • july 2001 • http://www.aclu.org/echelon/index.html • http://www.wired.com/news/echelon.html • http://mit.edu • http://cl.cam.ac.uk

  13. THANK YOU…….

  14. ANY QUERIES?????

More Related