TEMPEST AND ECHELON. A SEMINAR BY ROHIT RAJ ROLL NO-07130 VII TH SEM BRANCH – CSE I. INTRODUCTION. ECHELON. - Developed by National Security Agency of USA. - A secret project to spy on people by tracing their message.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
TEMPEST AND ECHELON
A SEMINAR BY
VII TH SEM
BRANCH – CSE I
Figure : A Lab Experiment
Need for an interception system
Sources of TEMPEST signals
-switching transistors, oscillators, signal generators
synchronizers, line drivers and line relays.
-electromechanical switches and brush type motors.
PROTECTION FROM TEMPEST ATTACK :-
There are 3 methods to protect the computer from TEMPEST attack.
PROBLEMS OF ECHELON
Future scope of tempest&echelon