ROHIT RAJ TEMPEST AND ECHELON A SEMINAR BY ROLL NO VII TH SEM

Slides:



Advertisements
Similar presentations
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Advertisements

Direct Attacks on Computational Devices
Pengantar Teknik Elektro Kuliah I. Topics Introduction Basic Electrical Quantities Circuit Analysis Introduction to Electromagnetism Introduction to Electronics.
Week 1 Things you want to know. Week 1 This is a series of things you want to know as you walk away from the course. What elements make up a communication.
COUNTERINTELLIGENCE TRENDS
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Cell Phone Jammer Sick of cell phones? Then jam them!
WHAT IS JAMMER ?  Jammer are the device by which we can creat a temporary “dead zone”in there immediate proxcimity.  There are three type of jammer.
Electronic Communications Electronic communications describes a process in which two or more computers or devices transfer data, instruction, and information.
Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities.
7.1 Chapter 7 Transmission Media Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer network  A network consists of multiple computers connected to each other to share data and resources.
Managing Telecommunications Chapter 6 Emily Gehm Jessica Paul Melanie Wall.
331: STUDY DATA COMMUNICATIONS AND NETWORKS.  1. Discuss computer networks (5 hrs)  2. Discuss data communications (15 hrs)
CSI 4118Fall Part I Signals, Media, And Data Transmission.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Communications security
ECEn 191 – New Student Seminar - Session 2: Communications ECEn 191 – New Student Seminar – Session 2: Electromagnetic Transmission Electromagnetic Transmission.
COMPUTER NETWORKS Lecture-3 Husnain Sherazi. Review Lecture 2  Resource Sharing  Growth of the Internet – Linear Scale – Log Scale  Tools for Probing.
Gsm Modems Based Irrigation Water Pump Controller for Illiterates
NT1210 Introduction to Networking
WIRELESS CHARGING Presented by: K.MAHESH (08T81A1236)
Senior Science Information Systems
SEMINAR ON SEMINAR ON RADAR JAMMING RADAR JAMMING PRESENTED PRESENTED BY BY K PAVAN KUMAR SATEESH KUMAR P K PAVAN KUMAR SATEESH KUMAR P REG NO.:
Submitted by: Himanshi Sharma(IV yr.IT,Sec-a).  The notion of spying is a very sensitive topic after the September 11 attack of Terrorists in New York.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
Physical Layer CHAPTER 3. Please stop by for a Coffee Chat or Resume Review with Credit Suisse Wednesday, September 9 th – 2:00pm til 4:00pm Student Lounge.
COMPUTER NETWORKS CS610 Lecture-3 Hammad Khalid Khan.
Importance of Wireless Processes of Wireless Internet Known now as WiFi Very similar to how radio and television signals work Information gets coded.
Mobile communication methods
CHAPTER 3 Physical Layer.
Transfer of data in ICT systems
Data Communication IT-402.
Home automation using Arduino & ‘PIR sensor’
Intro to MIS – MGS351 Network Basics
Prepared By: Tejas Shah.(15IT129). Riddhi Tripathi.(15IT147).
Visit for more Learning Resources
Chapter 7 Transmission Media
AUTO SWITCH OFF OF TV WHILE SCREEN GOES WITOUT VIDEO
7. Transmission Media.
Electronic Communication
Telecommunications and Networking
Mobile communication methods
Computers Are Your Future Eleventh Edition
Mobile Phone Techniques
The Internet and the World Wide Web
Cyber Crimes Chunlian QU 9/18/2018.
CHAPTER 3 Physical Layer.
Network Basics Extended Learning Module E
Chapter 1: Introduction
Chapter 7 Transmission Media
Physical Transmission
Computer networking In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network.
Chapter 7 Transmission Media
Chapter 7 Transmission Media
Data Communication and Networks
Data Communication and Networks
Chapter 7 Transmission Media
Chapter 7 Transmission Media
Computers Are Your Future
Chapter 7 Transmission Media
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Communication Systems Continuous Signals and Systems Optical communications Inforamtion and communication systems security Software for communications.
Data Transmission And Digital Communication
Lec 17 Wireless Computer Networks Al-Mustansiryah University
NPHS 1510 Federal and International
Security in Wide Area Networks
Presentation transcript:

ROHIT RAJ TEMPEST AND ECHELON A SEMINAR BY ROLL NO-07130 VII TH SEM BRANCH – CSE I

INTRODUCTION ECHELON - Developed by National Security Agency of USA. - A secret project to spy on people by tracing their message. - To find out the terrorist activities across the globe. Developed with the highest computing power connected through the satellites all over the world. Sniffing of messages over a network or any transmission media , even wireless. - Design: * position intercept stations all over the world to capture all satellite, microwaves , cellular and fiber-optic communications. * process this information through the massive computer capabilities of the NSA * use advanced voice recognition and optical character recognition (OCR) programs and look for code words or phrases known as “echelon dictionary”

TEMPEST - Stands for “Transient Electro-Magnetic Pulse Emanation Standard”. Main Theory * any electronic or electrical device emits electromagnetic radiations of specific key when it is operated. Intercept electro-magnetic waves over the air. It even sniffs signals emanating from computer screens(range of few kilometers). Captures signal through walls. VDUs emit radiations when scanning up on vertical or horizontal range beyond the screen.

Figure : A Lab Experiment Actual VDU Tempest Receiver Figure : A Lab Experiment

Need for an interception system To keep track of spies and terrorists for preserving the security of the country. Also being used for purposes well outside its original mission. For political spying and industrial espionage.

INSIDE TEMPEST: TEMPEST is a short name referring to investigations and studies of compromising emanation(CE). Compromising emanations(CE) are defined as unintentional intelligence bearing signals. CE consists of electrical and acoustical energy unintentionally emitted by a source. The emanations occur as: - text-related signals through a)common circuit element such as ground and power supplies. b)inductive and capacitive coupling. - propagation of sound waves from mechanical and electromechanical sound waves.

Sources of TEMPEST signals a)Functional sources: -switching transistors, oscillators, signal generators synchronizers, line drivers and line relays. b)Incidental sources: -electromechanical switches and brush type motors.

TEMPEST testing and selection of appropriate devices. TEMPEST fonts. PROTECTION FROM TEMPEST ATTACK :- There are 3 methods to protect the computer from TEMPEST attack. TEMPEST testing and selection of appropriate devices. TEMPEST fonts. TEMPEST proof walls.

PROBLEMS OF ECHELON AND TEMPEST:- This system will not provide any privacy for our own people in home and abroad . It will not provide any security of data for the corporate world. Every military secret is public to NSA and it’s allies so if anything goes wrong mass destruction will occur. As stated , echelon can protect us from terrorist attack but we have to ensure that these systems are protected from intrusion. If not so then result will be hazardous. Tempest equipments are only available in AMERICA and it is prohibited to be exported from there so that no terrorist will get these equipments .

CONCLUSION Tempest is the technology for spying from electronic equipments without any physical contact. Echelon is the vast network formed by NSA and its allies all over the world to intercept the messages send through any transmission media. Nothing can be hidden from these systems. Corporate firms are protecting there companies from tempest attacks by the use of software and equipments Unfortunately our INDIA does not have a tempest equipment developed yet.

Future scope of tempest&echelon These can be used to empower intelligence agencies to do their job better than before. As INDIA is not having a tempest equipment developed yet so we have to develop one for empowering our intelligence agencies and military agencies in order to protect our secret data from them.

References: EUROPEAN PARLIAMENT session document 11’th july 2001 http://www.aclu.org/echelon/index.html http://www.wired.com/news/echelon.html http://mit.edu http://cl.cam.ac.uk

THANK YOU…….

ANY QUERIES?????