Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Tempest (codename)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Espionage using electromagnetic leakage}} {{More footnotes needed|date=April 2024}} '''TEMPEST''' is a codename, not an acronym under the U.S. [[National Security Agency]] specification and a [[NATO]] certification<ref name="USAF140107011">{{Citation |url= http://www.netcents.af.mil/shared/media/document/AFD-140107-011.pdf |archive-url= https://web.archive.org/web/20141229080627/http://netcents.af.mil/shared/media/document/AFD-140107-011.pdf |archive-date= 2014-12-29 |title= Product Delivery Order Requirements Package Checklist |publisher= US Air Force |url-status= dead }}</ref><ref name="NIA1981">{{Citation |url= http://www.ia.nato.int/niapc/tempest/certification-scheme |title= TEMPEST Equipment Selection Process |publisher= NATO Information Assurance |year= 1981 |access-date= 2014-09-16 |archive-date= 2019-02-02 |archive-url= https://web.archive.org/web/20190202095358/http://www.ia.nato.int/niapc/tempest/certification-scheme |url-status= dead }}</ref> referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.<ref>{{cite web |url=http://cryptome.org/tempest-old.htm|title=How Old IsTEMPEST?|publisher= Cryptome.org |access-date=2015-05-31}}</ref><ref>{{Cite journal|last=Easter|first=David|date=2020-07-26|title=The impact of 'Tempest' on Anglo-American communications security and intelligence, 1943β1970|url=https://doi.org/10.1080/02684527.2020.1798604|journal=Intelligence and National Security|volume=36|pages=1β16|doi=10.1080/02684527.2020.1798604|s2cid=225445718|issn=0268-4527|url-access=subscription}}</ref> TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of [[communications security]] (COMSEC).<ref>{{cite web|url = http://cryptome.org/dodi/2013/afssi-7700.pdf |url-status = dead |archive-url=https://web.archive.org/web/20131223081405/http://cryptome.org/dodi/2013/afssi-7700.pdf |archive-date=December 23, 2013|title =Emission Security|date = 14 April 2009|publisher = US Air Force }}</ref> The reception methods fall under the umbrella of [[radiofrequency MASINT]]. The NSA methods for spying on computer emissions are classified, but some of the protection standards have been released by either the NSA or the Department of Defense.<ref name=tempest_intro>{{Citation |title= An Introduction to TEMPEST |url= https://www.sans.org/reading-room/whitepapers/privacy/introduction-tempest-981 |publisher= Sans.org |first= Cassi |last= Goodman |date= April 18, 2001 }}</ref> Protecting equipment from spying is done with distance, shielding, filtering, and masking.<ref name="tempest-history-nsa">{{Citation |title= TEMPEST: A Signal Problem |url= https://www.nsa.gov/public_info/_files/cryptologic_spectrum/tempest.pdf |author= N.S.A. |access-date= 2014-01-28 |url-status= dead |archive-url= https://web.archive.org/web/20130918021523/http://www.nsa.gov/public_info/_files/cryptologic_spectrum/tempest.pdf |archive-date= 2013-09-18 }}</ref> The TEMPEST standards mandate elements such as equipment distance from walls, amount of shielding in buildings and equipment, and distance separating wires carrying classified vs. unclassified materials,<ref name=tempest_intro/> filters on cables, and even distance and shielding between wires or equipment and building pipes. Noise can also protect information by masking the actual data.<ref name="tempest-history-nsa"/> [[File:TTY mixer 131B2 TM-11-2222 Fig 3.jpg|thumb|Bell 131B2 mixer, used to [[exclusive or|XOR]] teleprinter signals with one time tapes, was the first device from which classified plain text was extracted using radiated signals.]] While much of TEMPEST is about [[Van Eck phreaking|leaking electromagnetic emanations]], it also encompasses sounds and mechanical vibrations.<ref name=tempest_intro/> For example, it is possible to log a user's keystrokes using the [[Accelerometer|motion sensor]] inside [[smartphone]]s.{{sfn|Marquardt|Verma|Carter|Traynor|2011|pp=551β562}} Compromising emissions are defined as unintentional [[information|intelligence]]-bearing signals which, if intercepted and analyzed ([[side-channel attack]]), may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment.<ref>{{cite web |url=http://cryptome.org/jya/nacsim-5000/nacsim-5000.htm |title=NACSIM 5000 Tempest Fundamentals |publisher=Cryptome.org |access-date=2015-05-31}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)