The notion of spying is a very sensitive topic after
the September 11 attack of Terrorists in New York. In the novel 1984,
George Orwell foretold a future where individuals had no expectation of
privacy because the state monopolized the technology of spying. Now the
National security Agency Of USA developed a secret project to spy on
people for keep tracing their messages to make technology enabled
interception to find out the terrorist activities across the globe,
named as Echelon. Leaving the technology ahead of the any traditional
method of interception .
Download your Presentation Papers from the following Links.
Labels:
Seminar Topics,
Seminar Topics 2012
The secret project Developed by NSA
(National Security Agency of USA) and its allies is tracing every single
transmission even a single of keyboard. The allies of USA in this
project are UK, Australia, New Zealand and Canada. Echelon is developed
with the highest computing power of computers connected through the
satellites all over the world. In this project the NSA left the
wonderful method of Tempest and Carnivores behind.
Echelon is the technology for
sniffing through the messages sent over a network or any transmission
media, even it is wireless messages. Tempest is the technology for
intercepting the electromagnetic waves over the air. It simply sniffs
through the electromagnetic waves propagated from any devices, even it
is from the monitor of a computer screen. Tempest can capture the
signals through the walls of computer screens and keystrokes of key
board even the computer is not connected to a network. Thus the
traditional way of hacking has a little advantage in spying.
For the common people it is so hard
to believe that their monitor can be reproduced from anywhere in one
kilometer range without any transmission media in between the equipment
and their computer. So we have to believe the technology enabled us to
reproduce anything from a monitor of computer to the Hard Disks
including the Memory (RAM) of a distant computer without any physical or
visual contact. It is done with the Electromagnetic waves propagated
from that device.
The main theory behind the
Tempest(Transient Electromagnetic Pulse Emanation Standard.) is that any
electronic or electrical devices emit Electromagnetic radiations of
specific key when it is operated. For example the picture tube of
computer monitor emits radiations when it is scanned up on vertical of
horizontal range beyond the screen. It will not cause any harm to a
human and it is very small. But it has a specific frequency range. You
can reproduce that electromagnetic waves by tracing with the powerful
equipments and the powerful filtering methods to correct the errors
while transmission from the equipment. Actually this electromagnetic
waves are not necessary for a human being because it not coming from a
transmitter, but we have a receiver to trace the waves.
For the project named as Echelon the
NSA is using supercomputers for sniffing through the packets and any
messages send as the electromagnetic waves. They are using the advantage
of Distributed computing for this. Firstly they will intercept the
messages by the technology named as the Tempest and also with the
Carnivore. Every packet is sniffed for spying for the USA’s NSA for
security reasons.
Interception of communications is a
method of spying commonly employed by intelligence services, For an
intelligence agency they are make use of the spies for the secret
services for government to provide the security of government and the
people. So they can use any methods to ensure the security of people
including spying, it is not guilt. It depends on the target we are
aiming. To capture the terrorists before they can make any harm to
people, we must keep the technology ahead. We, Engineers are behind that
project of NSA and so we have to aware of that technology for enabling
our INDIA also in this field. Because it is used mainly by the security
agencies and spies all over the world even though there is a lack of
equipments for this purpose. Equipments for Tempest spying is available
in USA and is prohibited of exporting from there. Some smuggled
equipments may be here. But we have to develop the systems for our
Military and Intelligence Agencies for ensuring the best security for
our people.
While Considering about the
limitations of the surveillance system, The issues depends in
particular, upon worldwide interception of satellite communications,
although in areas characterised by a high volume of communications only a
very small proportion of those communications are transmitted by
satellite; whereas this means that the majority of communications cannot
be intercepted by earth stations, but only by tapping cables and
intercepting radio signals, something which -as the investigations
carried out in connection with the report have shown - is possible only
to a limited extent; whereas the numbers of personnel required for the
final analysis of intercepted communications imposes further
restrictions; whereas, therefore, the UKUSA states have access to only a
very limited proportion of cable and radio communications and can
analyze an even more limited proportion of those communications, and
whereas, further, however extensive the resources and capabilities for
the interception of communications may be, the extremely high volume of
traffic makes exhaustive, detailed monitoring of all communications
impossible in practice.
Download your Presentation Papers from the following Links.
Responses
0 Respones to "Tempest and echelon Seminar"
Post a Comment