tempest and echelon - 123seminarsonly.com
Post on 18-Dec-2021
2 Views
Preview:
TRANSCRIPT
Submitted ByGAYATHRY K VR7 – AROLL NO. 27
Under the guidance of SHILPA KAMALAN
INTRODUCTION
• Interception of communications is a method of spying done by intelligence agencies
• Keep track of the spies and terrorists• Preserves security of our country• Preventing from terrorist attacks
TEMPEST
Transient Electro Magnetic Pulse Emanation StandardRefers to investigations and studies of compromising
emanations(CE)CE
Unintentional intelligence bearing signals Consists of electrical or acoustical energy emitted
by systems processing security informationLead to discovery of plain textRecovery depends on certain factorsEg:-electromagnetic fields,soundwaves,text related
signals
Sources of TEMPEST signals
• Functional resources Designated for the specific purpose of
generating electromagnetic waves eg:-switching transistors,oscillators
• Incidental resources Not designated for specific purpose of
generating electromagnetic waves eg:-electromechanical switches,bushtype
motors
Types of TEMPEST signals
• RED base band signalsMost easily recognised CEProduced by capacitive or inductive couplingDuring high data rates
• Modulated spurious carriersGenerated as modulation of a carrier by RED
dataAmplitude or angle modulated
Ctd...Radiated in to space or coupled into EUT
external conductors• Impulsive emanations
Common in EUT processing digital signal
Caused by very fast mark_to_space or space_to_mark transition of digital signal
Technology behind TEMPEST
• Reproduce the view in the monitor kms away• Computer is not networked
Ctd..
• Techniques enable software on computer to control electromagnetic radiation it transmits
• Used for both attack and defense
• Here’s an example of how TEMPEST information gets out:
Message -----> Message -----> Communications -----> Intended Sender Encoder | Channel Recipient | |-----> TEMPEST -----> Unintended Channel Recipient
Attacks Short wave attacks
Spying kit consists of radio receiver connected to an audio cassette recorder
VDU produce audible tones on radioPower lines acts powerful than antennasImplants attack sofware using virusSoftware uses frequency shift keying with 0 and 1
Broadband transmission attacksProfessional attack affects only small part of screen
layoutReception using modified TV setsRequires exact horizontal and vertical deflection
frequencies to adjust pulse generatorsSpread spectrum techniques are usedNoise signals can be separated by averaging the
periodic signal over a period of time
Protection from TEMPEST attacks
TEMPEST testingPerformed to prove that information handling system
processing security information provide emission security
3 types of testsElectric radiation testsMagnetic radiation testsConduction tests
EUT: Equipment under testVisualised as a box receiving input signal and
produces an output signal
TEMPEST fontsUsed to protect computers from spyingSoftware for this calculates power dissipation of
normal fonts and filters the textFiltered text looks blurred and unpleasantLoss in text quality unnoticeable for the user
at computer screen
TEMPEST proof walls
Special walls used to reflect electromagnetic waves back to same room
Protects databases from hackers
ECHELON
Stands for NSA’s secret Global Surveilance System developed for intercepting messages allover the world
EspionageIs simply the organised theft of information.Systematic collection and evaluation of information about
certain situations in other states.Serves as a basis for decisions concerning the armed
forces, foreign policy.Account for at least 80% of the work of the intelligence
services.
Processing of electromagnetic signals
Uses satellite photography
SIGINT:-Signals intelligenceIntercepting any kind of electromagnetic signals
ELINT: Electronic intelligenceIntercepting electromagnetic signals in military fields
INTERCEPTION
Interception on spotConversations
Using microphones or laser equipmentsScreens
By picking up radiationsTelephones, fax and e-mail messages
By tapping cables
SCOPE FOR INTERCEPTION
From aircrafts and shipsAWACS:-Airborne Warning and Control System
Used for locating other aircraftUses radar equipment in conjunction with a detection
systemSlow flying EP-3 spy plane
Intercepts microwave,USW and shortwave transmissions
Surface ships and sub marinesIntercepts military radio transmissions
SCOPE FOR INTERCEPTION BY SPY SATELLITES
Back bone of ECHELON Low-orbit Signals Intelligence Satellite
lock on to target transmitter for fewer minutesFiltering individual signals impossible during higher
density of transmitters Quasi-geostationary SIGINT satellites
High earth orbit(42000km)Inclination between 3 and 10degree
Ctd.....Elliptical orbitCover large areaUsed for military purposes24Ghz downlink frequencyFig:-NSA’s listening station with radomes in England
AUTOMATIC ANALYSIS OF INTERCEPTED COMMUNICATION
Filtering of communications using keywords and dictionaries
Eg:-system recognizing a voice Filtering is restricted by :
Capacity of computerLanguage problemLimited number of analysts who read and assess
filtered messages
KeywordsSensitive words to find out messages which carries
sensitive informationOnly few messages and phone calls are recordedMessages producing keyword hits are taggedKeywords relates to:-
MilitaryDrug traffickingInternational crimes
ECHELON dictionariesPower of ECHELON lies in
decryption,filtering,examining and codifying messagesFiltering done using
Speech recognition techniqueOptical character recognition software
Dictionaries are databases containing keywordsEach station has a dictionary
Dictionary managerResponsible for:-
Adding, deleting or changing keyword search criteria Each station has a code
Eg:- COWBOY for Yakima facility
PROBLEMS OF ECHELON
Privacy of people at home and abroad Military secrets Helps terrorists
CONCLUSION
Tempest is the technology for spying from electronic equipments with out any physical contact.
Echelon is the vast network formed by NSA and its allies all over the world to intercept the messages sent through any transmission media
Nothing can be hidden from the these systems Unfortunately our India does not have a Tempest
equipment developed yet.
top related