tempest and echelon - 123seminarsonly.com

Post on 18-Dec-2021

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Submitted ByGAYATHRY K VR7 – AROLL NO. 27

Under the guidance of SHILPA KAMALAN

INTRODUCTION

• Interception of communications is a method of spying done by intelligence agencies

• Keep track of the spies and terrorists• Preserves security of our country• Preventing from terrorist attacks

TEMPEST

Transient Electro Magnetic Pulse Emanation StandardRefers to investigations and studies of compromising

emanations(CE)CE

Unintentional intelligence bearing signals Consists of electrical or acoustical energy emitted

by systems processing security informationLead to discovery of plain textRecovery depends on certain factorsEg:-electromagnetic fields,soundwaves,text related

signals

Sources of TEMPEST signals

• Functional resources Designated for the specific purpose of

generating electromagnetic waves eg:-switching transistors,oscillators

• Incidental resources Not designated for specific purpose of

generating electromagnetic waves eg:-electromechanical switches,bushtype

motors

Types of TEMPEST signals

• RED base band signalsMost easily recognised CEProduced by capacitive or inductive couplingDuring high data rates

• Modulated spurious carriersGenerated as modulation of a carrier by RED

dataAmplitude or angle modulated

Ctd...Radiated in to space or coupled into EUT

external conductors• Impulsive emanations

Common in EUT processing digital signal

Caused by very fast mark_to_space or space_to_mark transition of digital signal

Technology behind TEMPEST

• Reproduce the view in the monitor kms away• Computer is not networked

Ctd..

• Techniques enable software on computer to control electromagnetic radiation it transmits

• Used for both attack and defense

• Here’s an example of how TEMPEST information gets out:

Message -----> Message -----> Communications -----> Intended Sender Encoder | Channel Recipient | |-----> TEMPEST -----> Unintended Channel Recipient

Attacks Short wave attacks

Spying kit consists of radio receiver connected to an audio cassette recorder

VDU produce audible tones on radioPower lines acts powerful than antennasImplants attack sofware using virusSoftware uses frequency shift keying with 0 and 1

Broadband transmission attacksProfessional attack affects only small part of screen

layoutReception using modified TV setsRequires exact horizontal and vertical deflection

frequencies to adjust pulse generatorsSpread spectrum techniques are usedNoise signals can be separated by averaging the

periodic signal over a period of time

Protection from TEMPEST attacks

TEMPEST testingPerformed to prove that information handling system

processing security information provide emission security

3 types of testsElectric radiation testsMagnetic radiation testsConduction tests

EUT: Equipment under testVisualised as a box receiving input signal and

produces an output signal

TEMPEST fontsUsed to protect computers from spyingSoftware for this calculates power dissipation of

normal fonts and filters the textFiltered text looks blurred and unpleasantLoss in text quality unnoticeable for the user

at computer screen

TEMPEST proof walls

Special walls used to reflect electromagnetic waves back to same room

Protects databases from hackers

ECHELON

Stands for NSA’s secret Global Surveilance System developed for intercepting messages allover the world

EspionageIs simply the organised theft of information.Systematic collection and evaluation of information about

certain situations in other states.Serves as a basis for decisions concerning the armed

forces, foreign policy.Account for at least 80% of the work of the intelligence

services.

Processing of electromagnetic signals

Uses satellite photography

SIGINT:-Signals intelligenceIntercepting any kind of electromagnetic signals

ELINT: Electronic intelligenceIntercepting electromagnetic signals in military fields

INTERCEPTION

Interception on spotConversations

Using microphones or laser equipmentsScreens

By picking up radiationsTelephones, fax and e-mail messages

By tapping cables

SCOPE FOR INTERCEPTION

From aircrafts and shipsAWACS:-Airborne Warning and Control System

Used for locating other aircraftUses radar equipment in conjunction with a detection

systemSlow flying EP-3 spy plane

Intercepts microwave,USW and shortwave transmissions

Surface ships and sub marinesIntercepts military radio transmissions

SCOPE FOR INTERCEPTION BY SPY SATELLITES

Back bone of ECHELON Low-orbit Signals Intelligence Satellite

lock on to target transmitter for fewer minutesFiltering individual signals impossible during higher

density of transmitters Quasi-geostationary SIGINT satellites

High earth orbit(42000km)Inclination between 3 and 10degree

Ctd.....Elliptical orbitCover large areaUsed for military purposes24Ghz downlink frequencyFig:-NSA’s listening station with radomes in England

AUTOMATIC ANALYSIS OF INTERCEPTED COMMUNICATION

Filtering of communications using keywords and dictionaries

Eg:-system recognizing a voice Filtering is restricted by :

Capacity of computerLanguage problemLimited number of analysts who read and assess

filtered messages

KeywordsSensitive words to find out messages which carries

sensitive informationOnly few messages and phone calls are recordedMessages producing keyword hits are taggedKeywords relates to:-

MilitaryDrug traffickingInternational crimes

ECHELON dictionariesPower of ECHELON lies in

decryption,filtering,examining and codifying messagesFiltering done using

Speech recognition techniqueOptical character recognition software

Dictionaries are databases containing keywordsEach station has a dictionary

Dictionary managerResponsible for:-

Adding, deleting or changing keyword search criteria Each station has a code

Eg:- COWBOY for Yakima facility

PROBLEMS OF ECHELON

Privacy of people at home and abroad Military secrets Helps terrorists

CONCLUSION

Tempest is the technology for spying from electronic equipments with out any physical contact.

Echelon is the vast network formed by NSA and its allies all over the world to intercept the messages sent through any transmission media

Nothing can be hidden from the these systems Unfortunately our India does not have a Tempest

equipment developed yet.

top related