Submitted by: Himanshi Sharma(IV yr.IT,Sec-a).  The notion of spying is a very sensitive topic after the September 11 attack of Terrorists in New York.

Slides:



Advertisements
Similar presentations
Direct Attacks on Computational Devices
Advertisements

Waves in Space—Transferring Energy
Unbounded media have network signals that are not bound by any type of fiber or cable; hence, they are also called wireless technologies Wireless LAN.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Chapter 8 COMMUNICATION AND COMPUTER NETWORK
331: STUDY DATA COMMUNICATIONS AND NETWORKS.  1. Discuss computer networks (5 hrs)  2. Discuss data communications (15 hrs)
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Submitted by: Abhashree Pradhan CA (1)
Chapter 2.  Types of Network  Circuit Switched & Packet Switched  Signaling Techniques  Baseband & Broadband  Interference  Transmission Medium.
Introduction.
Engr Fundamental Ideas.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Data Communication. 2 Data Communications Data communication system components: Message Message Information (data) to be communicated. Sender Sender Device.
Physical Transmission
Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities.
Data Communications Chapter 16, Exploring the Digital Domain.
TELECOMMUNICATIONS Dr. Hugh Blanton ENTC 4307/ENTC 5307.
7.1 Chapter 7 Transmission Media Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1. Physical Transmission Transmission Media Wire (guided) Coaxial cable Twisted Pair UTP STP Fiber Optic Wireless (unguided) Radio waves Microwave Infrared.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Communications security
Pertemuan 4 Bandwidth.
Telephone and Telecommunication. Telephone - a device for transmitting and receiving sound at a distance. Modern phones are performed through the transmission.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
BY: NICK DOWNER TEMPEST EMISSIONS. OVERVIEW What are tempest emissions? Detecting tempest emissions Security concerns How to protect against leakage.
COMPUTER NETWORKS Lecture-3 Husnain Sherazi. Review Lecture 2  Resource Sharing  Growth of the Internet – Linear Scale – Log Scale  Tools for Probing.
Unit 32 – Networked Systems Security
INTRODUCTION. Electrical and Computer Engineering  Concerned with solving problems of two types:  Production or transmission of power.  Transmission.
Senior Science Information Systems
Computer is a general-purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically. Since a sequence of.
Chapter 6 Long Distance Communication. Long-Distance Communication Important fact: an oscillating signal travels farther than direct current For long-distance.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Digital Ham Radio An Introduction to DMR and Fusion
The signal range radio decametre
CHAPTER 3 Physical Layer.
Data Communication IT-402.
MONITORING OF USE RADIO FREQUENCY SPECTRUM AND METHODS OF MEASUREMENT.
Home automation using Arduino & ‘PIR sensor’
Physical Transmission
Intro to MIS – MGS351 Network Basics
Physical Transmission
Network Media Types COMPUTER NETWORKS 4TH Edition Chapter3
Bandwidth Utilization
Electronic Communication
WELCOME TO ALL.
4-3-1 Data Transfer. By the end of this topic you should be able to:-
Introduction to electronic communication systems
Overview Communication is the transfer of information from one place to another. This should be done - as efficiently as possible - with as much fidelity/reliability.
Mobile Phone Techniques
The Internet and the World Wide Web
Network Basics Extended Learning Module E
Light Waves and the Human Eye
Physical Transmission
Light Waves and the Human Eye
Communication Medium Transmission Medium.
Data Communication and Networks
ROHIT RAJ TEMPEST AND ECHELON A SEMINAR BY ROLL NO VII TH SEM
Data Communication and Networks
Electromagnetic Spectrum
Data Communication.
ELECTROMAGNETIC WAVES Radio Communication
Data Communication and Networks
Data Communication and Networks
Introduction Analog and Digital Signal
Data Communication and Networks
Electromagnetic Spectrum Notes
Data Transmission And Digital Communication
Chapter 7 – Data Communications
NPHS 1510 Federal and International
Security in Wide Area Networks
Presentation transcript:

Submitted by: Himanshi Sharma(IV yr.IT,Sec-a)

 The notion of spying is a very sensitive topic after the September 11 attack of Terrorists in New York.  The National security Agency Of USA developed a secret project to spy on people.  The project trace their messages to find out the terrorist activities across the globe.  The project is named as Echelon.  The allies of USA in this project are UK, Australia, New Zealand and Canada.  Developed with the highest computing power of computers connected through the satellites all over the world.  NSA left the wonderful method of Tempest and Carnivores behind.

 Stands for “Transient Electro-Magnetic Pulse Emanation Standard”.  Intercept electromagnetic waves over the air.  It even sniffs signals emanating from computer screens (range of few Kilometers).  Captures signals through walls.  Short name referring to investigations and studies of compromising emanations (CE).  CE are un intentiorial intelligence-bearing signals which, if intercepted and analyzed, disclose the national security information transmitted, received, handled.

 CE consist of electrical or acoustical energy unintentionally emitted by a source.  The emanations occur as – Electro magnetic fields set free by elements of the plain text processing equipment or its associated conductors.  Propagation of sound waves from mechanical or electro mechanical devices.  Text-related signals through (a) common circuit elements such as grounds and power supplies. (b) inductive and capacitive coupling.

 Functional Sources: Design for specific purpose of generating electromagnetic energy.. Examples are switching transistors, oscillators, Signal generators, synchronizers, line drivers, and line relays.  Incidental Sources: Which are not designed for the specific purpose of generating electromagnetic energy.Examples are electro mechanical switches and brush-type motors.

 RED Base band Signals- Can be introduced into electrical conductors connected to circuits. It can be introduced into an escape medium by capacitive or inductive coupling. especially by radiation with RED baseband signals of higher frequencies or data rates.  Modulated Spurious Carriers - Generated as the modulation of a carrier by RED data. The carrier is usually amplitude or angle-modulated by the basic RED data signal.  Impulsive Emanations -- Impulsive emanations are quite common in Equipment and are caused by very fast mark- to-space and space-to-mark transitions of digital signal.

 Tempest is the technology, which can reproduce what you are seeing in your monitor, what you are typing in your keyboard from a couple of kilometres away.  It traces all electromagnetic radiation from the victim’s monitor, keyboard, even pc memory and hard disk, and then it reproduces the signals.  By using this technology it is possible to intrude in to a person’s computer from a couple of kilometres away, even it is a computer which is not “Networked”.  Enables the intruder to hack without any connection to the victim’s computer.

 Short wave attacks: Attack software can read the parameters of signals directly from the video controller chip, or find them in configuration files.  Broadband Transmission attacks: A professional eavesdropper is more likely to select a method that affects only a small part of the screen layout and that is optimized for maximum range and robust reception with sophisticated equipment.

 TEMPEST testing and selection : Provide emission security. Unintentional signals and RED signals may be generated in an EUT are the object of detection and measurement during TEMPEST tests.  TEMPEST FONTS: TEMPEST fonts are used for protecting the computers form the eavesdropper.  TEMPEST PROOF WALLS: TEMPEST proof walls are developed for preventing from TEMPEST attacks. These walls are designed for reflecting the electromagnetic waves back to the same room it self.

 Technology for sniffing through the messages sent over a network or any transmission media, even it is wireless messages.  Developed by National Security Agency of USA.  A secret project to spy on people by tracing their messages.  To find out the terrorist activities across the globe.  Developed with the highest computing power connected through the satellites all over the world.  Maintained by five countries: the US, England, Canada, Australia, and New Zealand.

 Position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications.  Process this information through the massive computer capabilities of the NSA.  Use advanced voice recognition and optical character recognition(OCR) programs  Look for code words or phrases (known as the ECHELON “Dictionary”).

 Espionage is simply the organised theft of information.  Espionage targets :Involves targets such as military secrets, other government secrets or information concerning the stability of or dangers to governments.  Espionage methods :Involves gaining access to information which the holder would rather protect from being accessed by outsiders. This is the case with both political and industrial espionage.

 Even the technology made us to access the spying methods and prevention of terrorist activities up to certain extend. The Echelon system has its drawbacks.  The Echelon system will not provide any privacy for our own people in home and abroad. Every thing is monitored by the Big- Brother. It will not provide any security of the data of the corporate firms. It will cause a threat to our modern culture.  Every military secret is public to NSA and it’s allies, even though if we are hiding that from their eyes. It will lead to the mass destruction of human kind. Even a single war can cause the complete destruction of the man-kind.  If the terrorists got the sensitive information about the military secrets and the intelligence secrets, the terrorists can cause a world war.

 About the future scope of Tempest and Echelon, these can be used to empower our intelligence agencies to do their job better than before.  Unfortunately our India does not have a Tempest equipment developed yet. But we have to take care of the foreign intelligence agencies stealing our military data and the diplomatic data.  We have to take the counter measures to protect our secret data from them.  And we are not a part of Echelon network developed by NSA, so we have to develop one such for empowering our intelligence agencies and military agencies.