It's powered by www.schoolseva.com

Tempest and echelon Seminar



The notion of spying is a very sensitive topic after the September 11 attack of Terrorists in New York. In the novel 1984, George Orwell foretold a future where individuals had no expectation of privacy because the state monopolized the technology of spying. Now the National security Agency Of USA developed a secret project to spy on people for keep tracing their messages to make technology enabled interception to find out the terrorist activities across the globe, named as Echelon. Leaving the technology ahead of the any traditional method of interception .
The secret project Developed by NSA (National Security Agency of USA) and its allies is tracing every single transmission even a single of keyboard. The allies of USA in this project are UK, Australia, New Zealand and Canada. Echelon is developed with the highest computing power of computers connected through the satellites all over the world. In this project the NSA left the wonderful method of Tempest and Carnivores behind.
Echelon is the technology for sniffing through the messages sent over a network or any transmission media, even it is wireless messages. Tempest is the technology for intercepting the electromagnetic waves over the air. It simply sniffs through the electromagnetic waves propagated from any devices, even it is from the monitor of a computer screen. Tempest can capture the signals through the walls of computer screens and keystrokes of key board even the computer is not connected to a network. Thus the traditional way of hacking has a little advantage in spying.
For the common people it is so hard to believe that their monitor can be reproduced from anywhere in one kilometer range without any transmission media in between the equipment and their computer. So we have to believe the technology enabled us to reproduce anything from a monitor of computer to the Hard Disks including the Memory (RAM) of a distant computer without any physical or visual contact. It is done with the Electromagnetic waves propagated from that device.
The main theory behind the Tempest(Transient Electromagnetic Pulse Emanation Standard.) is that any electronic or electrical devices emit Electromagnetic radiations of specific key when it is operated. For example the picture tube of computer monitor emits radiations when it is scanned up on vertical of horizontal range beyond the screen. It will not cause any harm to a human and it is very small. But it has a specific frequency range. You can reproduce that electromagnetic waves by tracing with the powerful equipments and the powerful filtering methods to correct the errors while transmission from the equipment. Actually this electromagnetic waves are not necessary for a human being because it not coming from a transmitter, but we have a receiver to trace the waves.
For the project named as Echelon the NSA is using supercomputers for sniffing through the packets and any messages send as the electromagnetic waves. They are using the advantage of Distributed computing for this. Firstly they will intercept the messages by the technology named as the Tempest and also with the Carnivore. Every packet is sniffed for spying for the USA’s NSA for security reasons.
Interception of communications is a method of spying commonly employed by intelligence services, For an intelligence agency they are make use of the spies for the secret services for government to provide the security of government and the people. So they can use any methods to ensure the security of people including spying, it is not guilt. It depends on the target we are aiming. To capture the terrorists before they can make any harm to people, we must keep the technology ahead. We, Engineers are behind that project of NSA and so we have to aware of that technology for enabling our INDIA also in this field. Because it is used mainly by the security agencies and spies all over the world even though there is a lack of equipments for this purpose. Equipments for Tempest spying is available in USA and is prohibited of exporting from there. Some smuggled equipments may be here. But we have to develop the systems for our Military and Intelligence Agencies for ensuring the best security for our people.
While Considering about the limitations of the surveillance system, The issues depends in particular, upon worldwide interception of satellite communications, although in areas characterised by a high volume of communications only a very small proportion of those communications are transmitted by satellite; whereas this means that the majority of communications cannot be intercepted by earth stations, but only by tapping cables and intercepting radio signals, something which -as the investigations carried out in connection with the report have shown - is possible only to a limited extent; whereas the numbers of personnel required for the final analysis of intercepted communications imposes further restrictions; whereas, therefore, the UKUSA states have access to only a very limited proportion of cable and radio communications and can analyze an even more limited proportion of those communications, and whereas, further, however extensive the resources and capabilities for the interception of communications may be, the extremely high volume of traffic makes exhaustive, detailed monitoring of all communications impossible in practice.


Download your Presentation Papers from the following Links.




 


 
Tempest and Echelon Report.ppt
Tempest and Echelon Report.doc
Tempest and Echelon Report.pdf
Tempest and Echelon Report.docx
Tempest and Echelon Report.ppt
Tempest and Echelon Report.pdf
Tempest and Echelon Report.pptx




Responses

0 Respones to "Tempest and echelon Seminar"

Post a Comment

 

Recent Posts

Popular Posts

Total Pageviews

Return to top of page Copyright © 2011 | Kuppam Engineering College Converted into Blogger Template by Mohan Murthy