Tempest: “Hacking and Spying Without Being on a Network”

Topics: Electromagnetic radiation, Frequency, Electromagnetic spectrum Pages: 10 (3541 words) Published: October 2, 2012
B.E. Information Technology
P.D.V.V.P.COE Ahmednagar

ABSTRACT- It is hard to believe for a common people that there monitor can be reproduced from anywhere in one kilometer range without any transmission media in between the equipment and their computer. Electronic equipment can emit unintentional signals that allow eavesdroppers to reconstruct processed data at a distance. So we have to believe that the technology enabled us to reproduce anything from monitor of computer to the hard disks and the memory (RAM) of a distant computer without any physical or visual contact it is done with the electromagnetic waves propagated from that device. The main theory behind the Tempest (Transient electromagnetic pulse emanation standard.) is that any electronic or electrical device emits electromagnetic radiations when it is scanned up on vertical on horizontal range beyond the screen. It will not cause any harm to a human and it is very small. But it has specific frequency range. You can reproduce those electromagnetic waves by tracing with the powerful equipment and the powerful filtering methods to correct the errors while transmission from the equipment. Electromagnetic eavesdropping of computer displays is not restricted to cathode-ray tubes. Modern flat-panel displays can be at least as vulnerable. They are equally driven by repetitive video signals in frequency ranges where even shielded cables leak detectable radio waves into the environment nearby eavesdroppers can pick up such compromising emanations with directional antennas and wideband receivers. In this paper I have put in my own experimental setup with specific equipments’ and which types the electromagnetic waves we have to handle. How to prepare the tempest system with simple home brew equipment’s which is of low budget and also ways how to get protected from it.

The first studies concerning the phenomenon of compromising electromagnetic waves occurred in the 1950s. Through spying on encrypted Russian message transmissions, the NSA discovered weak parasitic rattling’s in the carrying tone, which were emanated by the electricity of the encoding machine. By building an appropriate device, it was possible to rebuild the plain text without having to decrypt the transmissions. This phenomenon successively takes the names NAG1A, then FS222 in the 1960s, NACSIM5100 in the 70s and finally TEMPEST (an acronym for Transient Electromagnetic Pulse Emanation Standard, although such a name is also said to be untrue), beginning in the 1980s. In 1985 a Dutch scientist, Wim van Eck, published a report on the experiences that he had since January 1983 in this field. The report shows that such a system is creatable with little means – however, it gives very little detail Very little information is available on this system; the majority of the documents contain nothing but superficial information without giving any details of a practical kind A. So What Is It?

The principle of TEMPEST and its derivatives is to reconstruct original data from ghost information. A ghost is a trace left by an object in its environment. There are three kinds of ghosts in the computer domain which could help us retrieve data: electro magnetic, optical and acoustic. One of the most interesting emissions in a computer comes from the display device, because its inner activity clearly deals with important information. Moreover, this device emits strong electromagnetic waves that are relatively easy to capture and treat.

Figure1. Red, green and blue mix Together to synthesise any colour

Figure 2. A grid of pixels form a picture – the sharpness of the picture depends on the pixel's density All colours can be broken down into three fundamental colours: red, green and blue...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Being Good without Qualifications Essay
  • Hacking Essay
  • Hacking Essay
  • Essay on Hacking
  • The Tempest Essay
  • Tempest Essay
  • Tempest Essay
  • The Tempest Essay

Become a StudyMode Member

Sign Up - It's Free