tempest and echelon

19
TEMPEST AND ECHELON BY – Y.SRUTHI

Upload: louisa

Post on 25-Feb-2016

245 views

Category:

Documents


0 download

DESCRIPTION

TEMPEST AND ECHELON. BY – Y.SRUTHI. INTRODUCTION. TEMPEST and ECHELON are the method of spying in a sophisticated manner. Both technologies are a part of secret project developed by National Security Agency (NSA),US. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: TEMPEST AND ECHELON

TEMPEST AND

ECHELONBY –Y.SRUTHI

Page 2: TEMPEST AND ECHELON

INTRODUCTION TEMPEST and ECHELON are the method of spying in a sophisticated manner.

Both technologies are a part of secret project developed by National Security Agency (NSA),US.

Intended to keep track of spies and terrorists activities for preserving the security of the American country.

But now used for political spying and industrial espionage (espionage refers to the organized theft of information).

Page 3: TEMPEST AND ECHELON

1) Tempest is the technology, which can

reproduce what you are seeing in your monitor, what you are typing in your keyboard.

2) Echelon is the spying on a large network by sniffing through the words.

TWO POWERFUL INTELLIGENCE GATHERING TOOLS

Page 4: TEMPEST AND ECHELON

To spy on people

Tracing their messages

To find out the terrorist activities across the globe

Developing a powerful method of interception

PURPOSE

Page 5: TEMPEST AND ECHELON

SCOPE• Tempest, this intelligence tool can sniff through the pc, keywords, cash registers and automatic teller machines from as far as a half mile away using the emission of electro-magnetic waves.

• Echelon is developed with the highest computing power of computers connected through the satellites all over the world. It can intercept as many as 2 million communications per hour, through phone calls,faxes,e-mails,downloads,microwave,cellular etc.

Page 6: TEMPEST AND ECHELON

A. The extremely high volume of traffic makes exhaustive, detailed monitoring of all communications impossible in practice.

B. The final analysis of intercepted communications imposes further restrictions.

C. Very small proportion of those communications are transmitted by satellite.

LIMITATIONS

Page 7: TEMPEST AND ECHELON

••••••••••••••••••••••••••••••••••TEMPEST

Page 8: TEMPEST AND ECHELON

TEMPEST Stands for Transient Electromagnetic Pulse Emanation Standard.

It is based on the study of CE(compromising emanations).

Networking is not needed to hack into victims computer as it uses a concept of EM radiations.

Electro-magnetic radiations of specific keys are obtained from respective electrical devices.

Using these specific keys of radiations data can be intercepted at remote stations.

EM radiation from the victim’s monitor, keyboard, even pc memory and hard disk can be traced.

Page 9: TEMPEST AND ECHELON

Reading a computer monitor remotely using TEMPEST

Page 10: TEMPEST AND ECHELON

A monitor emitting EM radiation

Collecting the signal <-

Page 11: TEMPEST AND ECHELON

TEMPEST ATTACKS AND PROTECTION

Two types of attacks-:

1. Short wave attacks 2. Broad band transmission attacks

Three types by which tempest attacks can be protected-:

1. Tempest testing & selection of appropriate devices2. Tempest Fonts3. Tempest Proof Walls

Page 12: TEMPEST AND ECHELON

••••••••••••••••••••••••••••••••••ECHELON

Page 13: TEMPEST AND ECHELON

The biggest secret spy project.Contains a vast network of electronic spy stations located around the world and maintained by five countries: the US, England, Canada, Australia, and New Zealand.These countries are in a secret agreement called UKUSA.Spy on each other’s citizens by intercepting of almost every telephone call, fax transmission and email message transmitted around the world daily.Sniffing of messages can be through both wired and wireless networks.Developed with the highest computing power connected through the satellites all over the world.Super computers look for certain keywords called the ECHELON “dictionaries.”

Page 14: TEMPEST AND ECHELON

ECHELON Keywords and Dictionary“Sensitive Words” used to find out the messages which carries the sensitive information are known as the Keywords.

The huge database containing keywords is called as the Dictionaries.

Only those messages that produce keyword “hits” are tagged for future analysis .

A Dictionary Manager from each of the respective agencies is responsible for adding, deleting or changing the keyword search criteria for their dictionaries at each of the stations.

Page 15: TEMPEST AND ECHELON

messages from the Internet

from undersea cables

from radio transmissions

from secret equipment installed inside embassies

using orbiting satellites to monitor signals anywhere on the earth’s surface

Echelon Spying Methods

Page 16: TEMPEST AND ECHELON

Echelon communications receiving stations over the world

Page 17: TEMPEST AND ECHELON
Page 18: TEMPEST AND ECHELON

CONCLUSION Tempest is the technology for spying from electronic equipments with out any physical contact.

Echelon is the vast network formed by NSA and its allies all over the world to intercept the messages sent through any transmission media.

Nothing can be hidden from the these systems.

Unfortunately our India does not have these technologies developed yet.

Page 19: TEMPEST AND ECHELON

••••••••••••••••••••••••••••••••••THANK YOU