tempest and echelon full report
#4
Submitted by:
Himanshi Sharma

[attachment=10065]
Introduction
 The notion of spying is a very sensitive topic after the September 11 attack of Terrorists in New York.
 The National security Agency Of USA developed a secret project to spy on people .
 The project trace their messages to find out the terrorist activities across the globe .
 The project is named as Echelon.
 The allies of USA in this project are UK, Australia, New Zealand and Canada.
 Developed with the highest computing power of computers connected through the satellites all over the world.
 NSA left the wonderful method of Tempest and Carnivores behind.
What is Tempest?
 Stands for “Transient Electro-Magnetic Pulse Emanation Standard”.
 Intercept electromagnetic waves over the air.
 It even sniffs signals emanating from computer screens (range of few Kilometers).
 Captures signals through walls.
 Short name referring to investigations and studies of compromising emanations (CE).
 CE are un intentiorial intelligence-bearing signals which, if intercepted and analyzed, disclose the national security information transmitted, received, handled.
What is inside Tempest?
 CE consist of electrical or acoustical energy unintentionally emitted by a source.
 The emanations occur as – Electro magnetic fields set free by elements of the plain text processing equipment or its associated conductors.
 Propagation of sound waves from mechanical or electro mechanical devices.
 Text-related signals through
(a) common circuit elements such as grounds and power supplies.
(b) inductive and capacitive coupling.
Sources of Templest Signals
 Functional Sources: Design for specific purpose of generating electromagnetic energy.. Examples are switching transistors, oscillators, Signal generators, synchronizers, line drivers, and line relays.
 Incidental Sources: Which are not designed for the specific purpose of generating electromagnetic energy.Examples are electro mechanical switches and brush-type motors.
Types of Tempest Signals
 RED Base band Signals- Can be introduced into electrical conductors connected to circuits .
It can be introduced into an escape medium by capacitive or inductive coupling. especially by radiation with RED baseband signals of higher frequencies or data rates.
 Modulated Spurious Carriers - Generated as the modulation of a carrier by RED data. The carrier is usually amplitude or angle-modulated by the basic RED data signal.
 Impulsive Emanations -- Impulsive emanations are quite common in Equipment and are caused by very fast mark-to-space and space-to-mark transitions of digital signal.
Technology behind Tempest
 Tempest is the technology, which can reproduce what you are seeing in your monitor, what you are typing in your keyboard from a couple of kilometres away.
 It traces all electromagnetic radiation from the victim’s monitor, keyboard, even pc memory and hard disk, and then it reproduces the signals.
 By using this technology it is possible to intrude in to a person’s computer from a couple of kilometres away, even it is a computer which is not “Networked” .
 Enables the intruder to hack without any connection to the victim’s computer.
Tempest attacks
 Short wave attacks: Attack software can read the parameters of signals directly from the video controller chip, or find them in configuration files.
 Broadband Transmission attacks: A professional eavesdropper is more likely to select a method that affects only a small part of the screen layout and that is optimized for maximum range and robust reception with sophisticated equipment.
PROTECTION FROM TEMPEST ATTACKS
 TEMPEST testing and selection : Provide emission security. Unintentional signals and RED signals may be generated in an EUT are the object of detection and measurement during TEMPEST tests.
 TEMPEST FONTS: TEMPEST fonts are used for protecting the computers form the eavesdropper.
 TEMPEST PROOF WALLS: TEMPEST proof walls are developed for preventing from TEMPEST attacks. These walls are designed for reflecting the electromagnetic waves back to the same room it self.
What is Echelon?
 Technology for sniffing through the messages sent over a network or any transmission media, even it is wireless messages.
 Developed by National Security Agency of USA.
 A secret project to spy on people by tracing their messages.
 To find out the terrorist activities across the globe.
 Developed with the highest computing power connected through the satellites all over the world.
 Maintained by five countries: the US, England, Canada, Australia, and New Zealand.
Design Of Echelon
 Position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications.
 Process this information through the massive computer capabilities of the NSA.
 Use advanced voice recognition and optical character recognition(OCR) programs
 Look for code words or phrases (known as the ECHELON “Dictionary”).
Echelon Device
ESPIONAGE???

 Espionage is simply the organised theft of information.
 Espionage targets :Involves targets such as military secrets, other government secrets or information concerning the stability of or dangers to governments.
 Espionage methods :Involves gaining access to information which the holder would rather protect from being accessed by outsiders. This is the case with both political and industrial espionage.
Problems of Echelon
 Even the technology made us to access the spying methods and prevention of terrorist activities up to certain extend. The Echelon system has its drawbacks.
 The Echelon system will not provide any privacy for our own people in home and abroad. Every thing is monitored by the Big- Brother. It will not provide any security of the data of the corporate firms. It will cause a threat to our modern culture.
 Every military secret is public to NSA and it’s allies, even though if we are hiding that from their eyes. It will lead to the mass destruction of human kind. Even a single war can cause the complete destruction of the man-kind.
 If the terrorists got the sensitive information about the military secrets and the intelligence secrets, the terrorists can cause a world war.
Future Scope
 About the future scope of Tempest and Echelon, these can be used to empower our intelligence agencies to do their job better than before.
 Unfortunately our India does not have a Tempest equipment developed yet. But we have to take care of the foreign intelligence agencies stealing our military data and the diplomatic data.
 We have to take the counter measures to protect our secret data from them.
 And we are not a part of Echelon network developed by NSA, so we have to develop one such for empowering our intelligence agencies and military agencies.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: curso academico usa, polamalu interception colts, logo fonts, electrical seminar on tempest echelonagement system, echelon effect, ppt on tempest and echelon, constitutional,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: tempest and echelon full report - by Zigbee - 18-08-2010, 11:28 AM
RE: tempest and echelon full report - by Wifi - 09-10-2010, 03:03 PM
RE: tempest and echelon full report - by seminar class - 12-03-2011, 11:43 AM
RE: tempest and echelon full report - by rahnaar - 11-07-2011, 10:22 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,997 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,853 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 26,014 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,728 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,119 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,350 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,532 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,671 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,458 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,447 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: