TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.

Slides:



Advertisements
Similar presentations
Networking: Computer Connections Chapter 7 Data Communications Send and receive information over communications lines.
Advertisements

Direct Attacks on Computational Devices
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Unbounded media have network signals that are not bound by any type of fiber or cable; hence, they are also called wireless technologies Wireless LAN.
1-1 Presentation Tips Click the mouse to advance the slides Click the hyperlink to directly advance to the slide associated with the link; click Return.
Wireless Security.
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
Chapter 15 Emission Security. Introduction Emissions Security (Emsec) Tempest defenses Stray RF emitted by Electronics Power Analysis Set back Smart Card.
Competencies (Page 1 of 2)
Chapter 9 Communications and Network Tyler Clutts.
Introduction to Wireless Communication. History of wireless communication Guglielmo Marconi invented the wireless telegraph in 1896 Communication by encoding.
Communications and Networks Chapter 6. Objectives Defines the components required for successful communications Describe uses of communications Identify.
Chapter 26 Communication Systems. Objectives After reading the chapter and reviewing the materials presented the students will be able to: Identify common.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 1 Information Technology, The Internet, and You.
How Global Positioning Devices (GPS) work
Communications & Networks
Cyber Crimes.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
It is a device that is able to work on its own without the help of another device or the help of the internet. An example of a standalone device would.
COMMUNICATION GADGETS
Communication channels and transmission media
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
Introductory Communications Objectives  To gain an overview of: Modems and digital telephone lines Analogue to digital conversion and digital to analogue.
6.1. Communication Methods Revision using Qwizdom.
Data Communication. 2 Data Communications Data communication system components: Message Message Information (data) to be communicated. Sender Sender Device.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Section 4 – Computer Networks
Electronic Communications Electronic communications describes a process in which two or more computers or devices transfer data, instruction, and information.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities.
Certain security vulnerabilities exist in every mode of wireless communications.
Media Devices Ms. K. Scruggs. Given instructions, the learner will discuss different components of telecommunications with 85% accuracy.
Computer Networks. Why Create Networks? Communication Communication technologies such as , sms, video-conference can be used Makes communication.
Data Communications & Computer Networks, Second Edition1 Chapter 3 The Media: Conducted and Wireless.
Carnegie Mellon University © Robert T. Monroe Management Information Systems Mobile Computing Management Information Systems Robert.
McGraw-Hill Career Education© 2008 by the McGraw-Hill Companies, Inc. All Rights Reserved. Microsoft Office 2007 Introduction to Computer Essentials.
Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
“ Getting to Know Networks”. What Is a Network? A network is a collection of computers hooked up together, usually by cables or telephone wires, for the.
Ross Elam Kitrail Hargrove Richie Francis Matthew Steffen.
Chapter 9 Installing Communication Devices Prepared by: Khurram N. Shamsi.
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Spy Systems How do the Echelon Spy system may work.
By: D’Kihya Cooper.  The first messages are sent.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Communications security
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Network & Data Transmission Mode Presented By:- Ankit Roll No. 05.
TELECOMMUNICATION. Communication over a long distance.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
BY: NICK DOWNER TEMPEST EMISSIONS. OVERVIEW What are tempest emissions? Detecting tempest emissions Security concerns How to protect against leakage.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
CCTV SYSTEM There is a phrase commonly used among internet users i.e. “Nothing is Safe”. Adhering to this phrase industries have been trying from years.
Wireless Communication Project Ideas for Engineering Students.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
The Online World DATA EXCHANGE. Introduction data devices/componentsperipheral Data exchange is the term used to cover all methods of passing data (including.
What are Satellites?  Artificial satellites are objects built and sent into Earth’s orbit by humans  A “natural” satellite is a small body that orbits.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Submitted by: Himanshi Sharma(IV yr.IT,Sec-a).  The notion of spying is a very sensitive topic after the September 11 attack of Terrorists in New York.
Importance of Wireless Processes of Wireless Internet Known now as WiFi Very similar to how radio and television signals work Information gets coded.
1.4 wired and wireless networks lesson 1
COAXIAL CABLE.
The Internet and the World Wide Web
ROHIT RAJ TEMPEST AND ECHELON A SEMINAR BY ROLL NO VII TH SEM
Computers Are Your Future
Data Communication & Networking
Data Communication.
Presentation transcript:

TEMPEST AND ECHELON BY – Y.SRUTHI

 TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret project developed by National Security Agency (NSA),US.  Intended to keep track of spies and terrorists activities for preserving the security of the American country.  But now used for political spying and industrial espionage (espionage refers to the organized theft of information).

1) Tempest is the technology, which can reproduce what you are seeing in your monitor, what you are typing in your keyboard. 2) Echelon is the spying on a large network by sniffing through the words. TWO POWERFUL INTELLIGENCE GATHERING TOOLS

 To spy on people  Tracing their messages  To find out the terrorist activities across the globe  Developing a powerful method of interception PURPOSE

SCOPE Tempest, this intelligence tool can sniff through the pc, keywords, cash registers and automatic teller machines from as far as a half mile away using the emission of electro- magnetic waves. Echelon is developed with the highest computing power of computers connected through the satellites all over the world. It can intercept as many as 2 million communications per hour, through phone calls,faxes,e- mails,downloads,microwave,cellular etc.

A.The extremely high volume of traffic makes exhaustive, detailed monitoring of all communications impossible in practice. B.The final analysis of intercepted communications imposes further restrictions. C.Very small proportion of those communications are transmitted by satellite. LIMITATIONS

TEMPEST Stands for Transient Electromagnetic Pulse Emanation Standard. It is based on the study of CE(compromising emanations). Networking is not needed to hack into victims computer as it uses a concept of EM radiations. Electro-magnetic radiations of specific keys are obtained from respective electrical devices. Using these specific keys of radiations data can be intercepted at remote stations. EM radiation from the victim’s monitor, keyboard, even pc memory and hard disk can be traced.

Reading a computer monitor remotely using TEMPEST

 A monitor emitting EM radiation Collecting the signal <-

TEMPEST ATTACKS AND PROTECTION  Two types of attacks-: 1.Short wave attacks 2.Broad band transmission attacks  Three types by which tempest attacks can be protected- : 1.Tempest testing & selection of appropriate devices 2.Tempest Fonts 3.Tempest Proof Walls

 The biggest secret spy project.  Contains a vast network of electronic spy stations located around the world and maintained by five countries: the US, England, Canada, Australia, and New Zealand.  These countries are in a secret agreement called UKUSA.  Spy on each other’s citizens by intercepting of almost every telephone call, fax transmission and message transmitted around the world daily.  Sniffing of messages can be through both wired and wireless networks.  Developed with the highest computing power connected through the satellites all over the world.  Super computers look for certain keywords called the ECHELON “dictionaries.”

ECHELON Keywords and Dictionary  “Sensitive Words” used to find out the messages which carries the sensitive information are known as the Keywords.  The huge database containing keywords is called as the Dictionaries.  Only those messages that produce keyword “hits” are tagged for future analysis.  A Dictionary Manager from each of the respective agencies is responsible for adding, deleting or changing the keyword search criteria for their dictionaries at each of the stations.

 messages from the Internet  from undersea cables  from radio transmissions  from secret equipment installed inside embassies  using orbiting satellites to monitor signals anywhere on the earth’s surface Echelon Spying Methods

Echelon communications receiving stations over the world

CONCLUSION   Tempest is the technology for spying from electronic equipments with out any physical contact.  Echelon is the vast network formed by NSA and its allies all over the world to intercept the messages sent through any transmission media.  Nothing can be hidden from the these systems.  Unfortunately our India does not have these technologies developed yet.