tempest and echelon - 123seminarsonly.com

28
Submitted By GAYATHRY K V R7 – A ROLL NO. 27 Under the guidance of SHILPA KAMALAN

Upload: others

Post on 18-Dec-2021

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tempest and Echelon - 123seminarsonly.com

Submitted ByGAYATHRY K VR7 – AROLL NO. 27

Under the guidance of SHILPA KAMALAN

Page 2: Tempest and Echelon - 123seminarsonly.com

INTRODUCTION

• Interception of communications is a method of spying done by intelligence agencies

• Keep track of the spies and terrorists• Preserves security of our country• Preventing from terrorist attacks

Page 3: Tempest and Echelon - 123seminarsonly.com

TEMPEST

Transient Electro Magnetic Pulse Emanation StandardRefers to investigations and studies of compromising

emanations(CE)CE

Unintentional intelligence bearing signals Consists of electrical or acoustical energy emitted

by systems processing security informationLead to discovery of plain textRecovery depends on certain factorsEg:-electromagnetic fields,soundwaves,text related

signals

Page 4: Tempest and Echelon - 123seminarsonly.com

Sources of TEMPEST signals

• Functional resources Designated for the specific purpose of

generating electromagnetic waves eg:-switching transistors,oscillators

• Incidental resources Not designated for specific purpose of

generating electromagnetic waves eg:-electromechanical switches,bushtype

motors

Page 5: Tempest and Echelon - 123seminarsonly.com

Types of TEMPEST signals

• RED base band signalsMost easily recognised CEProduced by capacitive or inductive couplingDuring high data rates

• Modulated spurious carriersGenerated as modulation of a carrier by RED

dataAmplitude or angle modulated

Page 6: Tempest and Echelon - 123seminarsonly.com

Ctd...Radiated in to space or coupled into EUT

external conductors• Impulsive emanations

Common in EUT processing digital signal

Caused by very fast mark_to_space or space_to_mark transition of digital signal

Page 7: Tempest and Echelon - 123seminarsonly.com

Technology behind TEMPEST

• Reproduce the view in the monitor kms away• Computer is not networked

Page 8: Tempest and Echelon - 123seminarsonly.com

Ctd..

• Techniques enable software on computer to control electromagnetic radiation it transmits

• Used for both attack and defense

• Here’s an example of how TEMPEST information gets out:

Message -----> Message -----> Communications -----> Intended Sender Encoder | Channel Recipient | |-----> TEMPEST -----> Unintended Channel Recipient

Page 9: Tempest and Echelon - 123seminarsonly.com

Attacks Short wave attacks

Spying kit consists of radio receiver connected to an audio cassette recorder

VDU produce audible tones on radioPower lines acts powerful than antennasImplants attack sofware using virusSoftware uses frequency shift keying with 0 and 1

Page 10: Tempest and Echelon - 123seminarsonly.com

Broadband transmission attacksProfessional attack affects only small part of screen

layoutReception using modified TV setsRequires exact horizontal and vertical deflection

frequencies to adjust pulse generatorsSpread spectrum techniques are usedNoise signals can be separated by averaging the

periodic signal over a period of time

Page 11: Tempest and Echelon - 123seminarsonly.com

Protection from TEMPEST attacks

TEMPEST testingPerformed to prove that information handling system

processing security information provide emission security

3 types of testsElectric radiation testsMagnetic radiation testsConduction tests

Page 12: Tempest and Echelon - 123seminarsonly.com

EUT: Equipment under testVisualised as a box receiving input signal and

produces an output signal

Page 13: Tempest and Echelon - 123seminarsonly.com

TEMPEST fontsUsed to protect computers from spyingSoftware for this calculates power dissipation of

normal fonts and filters the textFiltered text looks blurred and unpleasantLoss in text quality unnoticeable for the user

at computer screen

Page 14: Tempest and Echelon - 123seminarsonly.com

TEMPEST proof walls

Special walls used to reflect electromagnetic waves back to same room

Protects databases from hackers

Page 15: Tempest and Echelon - 123seminarsonly.com

ECHELON

Stands for NSA’s secret Global Surveilance System developed for intercepting messages allover the world

EspionageIs simply the organised theft of information.Systematic collection and evaluation of information about

certain situations in other states.Serves as a basis for decisions concerning the armed

forces, foreign policy.Account for at least 80% of the work of the intelligence

services.

Page 16: Tempest and Echelon - 123seminarsonly.com

Processing of electromagnetic signals

Uses satellite photography

SIGINT:-Signals intelligenceIntercepting any kind of electromagnetic signals

ELINT: Electronic intelligenceIntercepting electromagnetic signals in military fields

Page 17: Tempest and Echelon - 123seminarsonly.com

INTERCEPTION

Interception on spotConversations

Using microphones or laser equipmentsScreens

By picking up radiationsTelephones, fax and e-mail messages

By tapping cables

Page 18: Tempest and Echelon - 123seminarsonly.com

SCOPE FOR INTERCEPTION

From aircrafts and shipsAWACS:-Airborne Warning and Control System

Used for locating other aircraftUses radar equipment in conjunction with a detection

systemSlow flying EP-3 spy plane

Intercepts microwave,USW and shortwave transmissions

Surface ships and sub marinesIntercepts military radio transmissions

Page 19: Tempest and Echelon - 123seminarsonly.com

SCOPE FOR INTERCEPTION BY SPY SATELLITES

Back bone of ECHELON Low-orbit Signals Intelligence Satellite

lock on to target transmitter for fewer minutesFiltering individual signals impossible during higher

density of transmitters Quasi-geostationary SIGINT satellites

High earth orbit(42000km)Inclination between 3 and 10degree

Page 20: Tempest and Echelon - 123seminarsonly.com

Ctd.....Elliptical orbitCover large areaUsed for military purposes24Ghz downlink frequencyFig:-NSA’s listening station with radomes in England

Page 21: Tempest and Echelon - 123seminarsonly.com

AUTOMATIC ANALYSIS OF INTERCEPTED COMMUNICATION

Filtering of communications using keywords and dictionaries

Eg:-system recognizing a voice Filtering is restricted by :

Capacity of computerLanguage problemLimited number of analysts who read and assess

filtered messages

Page 22: Tempest and Echelon - 123seminarsonly.com

KeywordsSensitive words to find out messages which carries

sensitive informationOnly few messages and phone calls are recordedMessages producing keyword hits are taggedKeywords relates to:-

MilitaryDrug traffickingInternational crimes

Page 23: Tempest and Echelon - 123seminarsonly.com

ECHELON dictionariesPower of ECHELON lies in

decryption,filtering,examining and codifying messagesFiltering done using

Speech recognition techniqueOptical character recognition software

Dictionaries are databases containing keywordsEach station has a dictionary

Page 24: Tempest and Echelon - 123seminarsonly.com

Dictionary managerResponsible for:-

Adding, deleting or changing keyword search criteria Each station has a code

Eg:- COWBOY for Yakima facility

Page 25: Tempest and Echelon - 123seminarsonly.com

PROBLEMS OF ECHELON

Privacy of people at home and abroad Military secrets Helps terrorists

Page 26: Tempest and Echelon - 123seminarsonly.com

CONCLUSION

Tempest is the technology for spying from electronic equipments with out any physical contact.

Echelon is the vast network formed by NSA and its allies all over the world to intercept the messages sent through any transmission media

Nothing can be hidden from the these systems Unfortunately our India does not have a Tempest

equipment developed yet.

Page 27: Tempest and Echelon - 123seminarsonly.com
Page 28: Tempest and Echelon - 123seminarsonly.com