0% found this document useful (0 votes)
412 views19 pages

Tempest AND Echelon: BY - Y.Sruthi

Tempest and Echelon are secret US spy programs that use technology to intercept electronic communications. Tempest intercepts electromagnetic emissions from devices like keyboards and monitors to read data remotely. Echelon is a global network of spy stations that uses keyword filtering and satellites to intercept billions of communications daily, including phone calls, emails and internet traffic. Both were intended for counterterrorism but are now used for political and commercial espionage.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
412 views19 pages

Tempest AND Echelon: BY - Y.Sruthi

Tempest and Echelon are secret US spy programs that use technology to intercept electronic communications. Tempest intercepts electromagnetic emissions from devices like keyboards and monitors to read data remotely. Echelon is a global network of spy stations that uses keyword filtering and satellites to intercept billions of communications daily, including phone calls, emails and internet traffic. Both were intended for counterterrorism but are now used for political and commercial espionage.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

TEMPEST

AND
ECHELON
BY –
Y.SRUTHI
INTRODUCTION

 TEMPEST and ECHELON are the method of spying in a


sophisticated manner.

 Both technologies are a part of secret project developed by


National Security Agency (NSA),US.

 Intended to keep track of spies and terrorists activities for


preserving the security of the American country.

 But now used for political spying and industrial espionage


(espionage refers to the organized theft of information).
TWO POWERFUL INTELLIGENCE GATHERING TOOLS

1) Tempest is the technology, which can reproduce what


you are seeing in your monitor, what you are typing in
your keyboard.

2) Echelon is the spying on a large network by sniffing


through the words.
PURPOSE

 To spy on people

 Tracing their messages

 To find out the terrorist activities across the globe

 Developing a powerful method of interception


SCOPE
• Tempest, this intelligence tool can sniff through the pc,
keywords, cash registers and automatic teller machines
from as far as a half mile away using the emission of
electro-magnetic waves.

• Echelon is developed with the highest computing power


of computers connected through the satellites all over the
world. It can intercept as many as 2 million
communications per hour, through phone calls,faxes,e-
mails,downloads,microwave,cellular etc.
LIMITATIONS
A. The extremely high volume of
traffic makes exhaustive, detailed
monitoring of all
communications impossible in
practice.

B. The final analysis of intercepted


communications imposes further
restrictions.

C. Very small proportion of those


communications are transmitted
TEMPEST
••••••••••••••••••••••••••••••••••
 TEMPEST Stands for Transient Electromagnetic Pulse
Emanation Standard.
 It is based on the study of CE(compromising emanations).
 Networking is not needed to hack into victims computer
as it uses a concept of EM radiations.
 Electro-magnetic radiations of specific keys are obtained
from respective electrical devices.
 Using these specific keys of radiations data can be
intercepted at remote stations.
 EM radiation from the victim’s monitor, keyboard, even
pc memory and hard disk can be traced.
Reading a computer monitor remotely
using TEMPEST
A monitor emitting EM
radiation

Collecting the signal <-


TEMPEST ATTACKS AND PROTECTION
Two types of attacks-:

1. Short wave attacks


2. Broad band transmission attacks

Three types by which tempest attacks can be


protected-:

1. Tempest testing & selection of appropriate devices


2. Tempest Fonts
3. Tempest Proof Walls
••••••••••••••••••••••••••••••••••
ECHELON
The biggest secret spy project.
Contains a vast network of electronic spy stations located around
the world and maintained by five countries: the US, England, Canada,
Australia, and New Zealand.
These countries are in a secret agreement called UKUSA.
Spy on each other’s citizens by intercepting of almost every
telephone call, fax transmission and email message transmitted
around the world daily.
Sniffing of messages can be through both wired and wireless
networks.
Developed with the highest computing power connected through
the satellites all over the world.
Super computers look for certain keywords called the ECHELON
“dictionaries.”
ECHELON Keywords and Dictionary
“Sensitive Words” used to find out the messages which
carries the sensitive information are known as the Keywords.

The huge database containing keywords is called as the


Dictionaries.

Only those messages that produce keyword “hits” are


tagged for future analysis .

A Dictionary Manager from each of the respective agencies


is responsible for adding, deleting or changing the keyword
search criteria for their dictionaries at each of the stations.
Echelon Spying Methods

messages from the Internet

 from undersea cables

from radio transmissions

from secret equipment installed inside embassies

 using orbiting satellites to monitor signals


anywhere on the earth’s surface
Echelon communications receiving stations over the
world
CONCLUSION
 Tempest is the technology for spying from
electronic equipments with out any physical contact.

 Echelon is the vast network formed by NSA and its


allies all over the world to intercept the messages
sent through any transmission media.

 Nothing can be hidden from the these systems.

 Unfortunately our India does not have these


technologies developed yet.
THANK YOU
••••••••••••••••••••••••••••••••••

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy