Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities.

Slides:



Advertisements
Similar presentations
UAbove Law fahrul hakim2003 Wireless LAN implications Project managers and design engineer should be aware, the following potential problems from the implementation.
Advertisements

Communications Equipment. Telephone Intercom Systems Means of communication for patients and staff even though they cannot see each other.
Radio over fiber.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Chapter 1 Introduction to Computers. What Is a Computer? What is a computer? An electronic machine, operating under the control of instructions stored.
Satellite Communication
Tempest Emanations Jacklyn Truong University of Tulsa April 16, 2013.
Direct Attacks on Computational Devices
Waves in Space—Transferring Energy
Unbounded media have network signals that are not bound by any type of fiber or cable; hence, they are also called wireless technologies Wireless LAN.
Introduction to Networking. Spring 2002Computer Network Applications Analog Devices Maintain an exact physical analog of (some form of) information. Ex:
Office 2003 Introductory Concepts and Techniques M i c r o s o f t CPTG104 Intro to Information Systems Dr. Hwang Essential Introduction to Computers.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
Section 3: Radio Communication Radio Transmission – The music and the words are sent to the radio by radio waves. – The radio’s metal antenna detects the.
Chapter 8 COMMUNICATION AND COMPUTER NETWORK
How Global Positioning Devices (GPS) work
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Basic Data Communication
© Paradigm Publishing Inc. 1-1 Chapter 1 Our Digital World.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Introduction to Computers
Chapter 7 Transmission Media. Transmission medium (layer zero) A transmission media defined as anything that carry information between a source to a destination.
TELECOMMUNICATIONS –Communication over a long distance; deals with devices used to transmit and receive messages over a distance. –Examples: Telegraph.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Security Fundamentals Group TEMPEST Security Hidema Tanaka.
Flash Cards Computer Technology.
COMMUNICATION GADGETS
INTRODUCTION TO COMPUTING
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
Electronic Communications Electronic communications describes a process in which two or more computers or devices transfer data, instruction, and information.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Media Devices Ms. K. Scruggs. Given instructions, the learner will discuss different components of telecommunications with 85% accuracy.
Radio Transmission Music and words are sent to your radio by radio waves. The metal antenna of your radio detects radio waves. As the electromagnetic.
© Paradigm Publishing Inc © Paradigm Publishing Inc. 1-2 Chapter 1 Our Digital World.
Data Communications & Computer Networks, Second Edition1 Chapter 3 The Media: Conducted and Wireless.
RADIO AIDS & NAVIGATION RAN 2204 LECTURE 2: RADIO COMMUNICATIONS.
1. Physical Transmission Transmission Media Wire (guided) Coaxial cable Twisted Pair UTP STP Fiber Optic Wireless (unguided) Radio waves Microwave Infrared.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Communications security
Unit 1—Computer Basics Lesson 1 Understanding Computers and Computer Literacy.
Computer Parts There are many parts that work together to make a computer work.
Telephone and Telecommunication. Telephone - a device for transmitting and receiving sound at a distance. Modern phones are performed through the transmission.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
Chapter 1. SIGNAL PROCESSING:  Signal processing is concerned with the efficient and accurate extraction of information in a signal process.  Signal.
TELECOMMUNICATION. Communication over a long distance.
Introduction To Computers
Travel through empty space or through matter and is produced by charged particles that are in motion. An electromagnetic wave is a wave that can A different.
The Online World DATA EXCHANGE. Introduction data devices/componentsperipheral Data exchange is the term used to cover all methods of passing data (including.
Senior Science Information Systems
SEMINAR ON SEMINAR ON RADAR JAMMING RADAR JAMMING PRESENTED PRESENTED BY BY K PAVAN KUMAR SATEESH KUMAR P K PAVAN KUMAR SATEESH KUMAR P REG NO.:
Submitted by: Himanshi Sharma(IV yr.IT,Sec-a).  The notion of spying is a very sensitive topic after the September 11 attack of Terrorists in New York.
Unit Connectivity Methods
Network Operating Systems (NOS)
The Internet and the World Wide Web
Lecture # 1 M.Sc / BS(CS)/ BS(I.T) DPT.
Physical Transmission
ROHIT RAJ TEMPEST AND ECHELON A SEMINAR BY ROLL NO VII TH SEM
Electromagnetic Spectrum
Computers Are Your Future
Chapter 1 Our Digital World. Chapter 1 Our Digital World.
ELECTROMAGNETIC WAVES Radio Communication
Electromagnetic Spectrum Notes
Security in Wide Area Networks
Presentation transcript:

Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities across the globe. › The allies of USA in this project- UK, Australia, New Zealand and Canada. › Developed with the highest computing power connected through the satellites all over the world. › Sniffing of messages over a network or any transmission media, even wireless.

› Stands for “Transient Electro-Magnetic Pulse Emanation Standard”. › Main theory - Any electronic or electrical device emits electromagnetic radiations of specific key when it is operated. › Intercept electromagnetic waves over the air. › It even sniffs signals emanating from computer screens(range of few Kilometers). › Can detect keystrokes without network connection. INTRODUCTION (cont:)

Refers to the study of compromising emanation. Compromising Emanations(CE) are defined as unintentional intelligence-bearing signals. CE consist of electrical or acoustical energy unintentionally emitted by a source THE energy may relate to the original message, which leads to the recovery of plain text. Can propagate through space and near by conductors.

Sources of TEMPEST › Functional Sources: › Incidental Sources:. Propagation of TEMPEST Signals  Electromagnetic Radiation  Line Conduction  Fortuitous Conduction  Acoustics

 Uses the electromagnetic waves propagated from the electronic devices intentionally or unintentionally.  It traces all electromagnetic radiation from the victim’s monitor, keyboard, even pc memory and hard disk, and then it reproduces the signals.  Enables the intruder to hack without any connection to the victim’s computer.

Snooping in to a computer’s VDU > Video display units output their frame buffer content periodically > Use character recognition techniques to give a better SNR Snooping on CPUs  Execution of a known pattern of instructions  If signals caused by any instruction are lost in the noise, correlation techniques can be used.

 Protection from TEMPEST  TEMPEST testing and selection of appropriate devices  TEMPEST Fonts  TEMPEST Proof walls

An equipment or system tested is called equipment under test (EUT). An EUT can be visualized as an input/output box which receives an input signal and produces an output signal. The figure below shows this. Fig 2 Tempest Testing And Selection

 Because of design weaknesses, some unintentional signals may be generated in an EUT and emitted through space.  Such unintentional signals are the object of detection and measurement during TEMPEST tests.  Test types are of three, they are 1. Electric radiation test 2. Magnetic radiation test 3. Conduction test

 TEMPEST fonts are used for protecting the computers form the eavesdropper.  The software will filter that text and show that font as the most convenient way  The filtered text looks rather blurred and unpleasant in the magnified representation.  The loss in text quality is almost unnoticeable for the user at the computer screen

True text Filtered text The text on the left is displayed with a conventional font. Text on the right has been filtered to protect itself from interception. User can see practically no difference between the fonts Text disappears from the eavesdropping monitor Fig 3

o TEMPEST proof walls are developed for preventing from TEMPEST attacks. o These walls are specially designed for reflecting the electromagnetic waves back to the same room it self. o TEMPEST –Proof walls are the most effective one

 Satellite photography  Electromagnetic signals(SIGINT) of any kind are intercepted and analysed  Radar stations, may provide valuable information about the organisation of enemy air defences  Monitoring other states, spy satellites is also useful

On spot  Conversations: planted microphones (bugs) or laser equipment which picks up vibrations in window panes.  Screens emit radiation.  Telephone, fax, and messages can be intercepted if the eavesdropper taps into a cable leaving the relevant building.  Mobile phone can be intercepted if the interception station is situated in the same radio cell.

 AWACS aircraft are used for the purpose of locating other aircraft over long distances.  The slow-flying EP-3 spy plane used by the US Navy has the capability to intercept microwave and short-wave transmissions.  Submarines are used to intercept military radio transmissions.

 The satellites move in a complex elliptical orbit, to cover a larger area of the earth in one day.  The signals received are transmitted to the receiving station by means of a strongly- focused, 24GHz downlink.

 Use of Directories and Keywords.  Using the modern techniques for searching by use of the sophisticated speech recognition software and OCR software.  An echelon system can intercept about billions of messages every hour.

 KEYWORD - “ Sensitive Words” to find out the messages which carries the sensitive information.  DICTIONARIES - The database containing the keywords  Each of these station dictionaries is given codeword

 The Echelon system will not provide any privacy for our own people in home and abroad.  Every military secret is public to NSA and it’s allies, even though if we are hiding that from their eyes.  We have to ensure that these systems are protected from intrusion and if it occurs the result will be hazardous.

 Tempest is the technology for spying from electronic equipments with out any physical contact.  Echelon is the vast network formed by NSA and its allies all over the world to intercept the messages sent through any transmission media.  Nothing can be hidden from the these systems.  Unfortunately our India does not have a Tempest equipment developed and we are not a part of Echelon network developed by NSA  We have to develop one such for empowering our intelligence agencies and military agencies.

Thank you