Sie sind auf Seite 1von 23

m

ë 

 mm


Echelon

Ô Developed by National Security Agency of USA.

Ô A secret project to spy on people by tracing their


messages.

Ô To find out the terrorist activities across the globe.

Ô The allies of USA in this project- UK, Australia, New Zealand


and Canada.

Ô Developed with the highest computing power connected


through the satellites all over the world.

Ô Sniffing of messages over a network or any transmission


media, even wireless.
þ þ 


Ô Stands for ´Transient Electro-Magnetic Pulse Emanation


Standardµ.

Ô Main theory - Any electronic or electrical device


emits electromagnetic radiations of specific key
when it is operated.

Ô Intercept electromagnetic waves over the air.

Ô It even sniffs signals emanating from computer


screens(range of few Kilometers).

Ô Can detect keystrokes without network connection.


` 0efers to the study of compromising emanation.

` Compromising Emanations(CE) are defined as


unintentional intelligence-bearing signals.

` CE consist of electrical or acoustical energy


unintentionally emitted by a source

` THE energy may relate to the original message ,


which leads to the recovery of plain text.

` Can propagate through space and near by


conductors.
Sources of TEMPEST
Ô Functional Sources:

Ô Incidental Sources:.

ð  
ð
 

£ Electromagnetic 0adiation

£ Line Conduction

£ Fortuitous Conduction

£ Acoustics
£ Uses the electromagnetic waves
propagated from the electronic devices
intentionally or unintentionally.

£ It traces all electromagnetic radiation


from the victim·s monitor, keyboard, even
pc memory and hard disk, and then it
reproduces the signals.

£ Enablesthe intruder to hack without any


connection to the victim·s computer.
` ë       


ÿ  
  

  
  


ÿ         


      
D ë    

£ 6 
          
  

£    
     
      
   
  

£  
  ë

£ ˜66˜          




£ ˜66˜  

£ ˜66˜  


˜  ˜  
 
` An equipment or system tested is called equipment
under test (EUT).

` An EUT can be visualized as an input/output box


which receives an input signal and produces an
output signal. The figure below shows this.

Fig 2
£ ]ecause of design weaknesses, some unintentional
signals may be generated in an EUT and emitted
through space.

£ Such unintentional signals are the object of


detection and measurement during TEMPEST tests.

£ Test types are of three, they are

1. Electric radiation test


2. Magnetic radiation test
3. Conduction test
£ TEMPEST fonts are used for protecting the
computers form the eavesdropper.

£ The software will filter that text and show


that font as the most convenient way

£ The filtered text looks rather blurred and


unpleasant in the magnified representation.

£ The loss in text quality is almost unnoticeable


for the user at the computer screen
D˜    
 
   


D˜     


  
  

D      


     


D˜ 
    


˜
 

  


÷˜ ˜  
 
  
˜ ˜ 

÷˜      



   
       

÷˜ ˜       


[Satellite photography

[Electromagnetic signals(SIGINT) of any


kind are intercepted and analysed

[0adar stations, may provide valuable


information about the organisation of
enemy air defences

[Monitoring other states, spy satellites is


also useful
G

£ =   planted microphones (bugs)


or laser equipment which picks up vibrations
in window panes.

£ ë  emit radiation.

£ ˜
    
 can
be intercepted if the eavesdropper taps into
a cable leaving the relevant building.

£  
  can be intercepted if the
interception station is situated in the same
radio cell.
£ AWACS aircraft are used for the purpose of
locating other aircraft over long distances.

£ The slow-flying EP-3 spy plane used by the US


Navy has the capability to intercept
microwave and short-wave transmissions.

£ Submarines are used to intercept military


radio transmissions.
Î The satellites move in a complex elliptical
orbit, to cover a larger area of the earth in
one day.

Î The signals received are transmitted to the


receiving station by means of a strongly-
focused, 24GHz downlink.
£ Use of Directories and Keywords.

£ Using the modern techniques for searching


by use of the sophisticated speech
recognition software and OC0 software.

£ An echelon system can intercept about


billions of messages every hour.
[ K!"#$%& '  "
(
)
         

[ %*+˜*#, $* & ˜ 
   
 

[    
   



£ The Echelon system will not provide any


privacy for our own people in home and
abroad.

£ Every military secret is public to NSA and it·s


allies, even though if we are hiding that from
their eyes.

£ We have to ensure that these systems are


protected from intrusion and if it occurs the
result will be hazardous.
£ Tempest is the technology for spying from electronic
equipments with out any physical contact.

£ Echelon is the vast network formed by NSA and its


allies all over the world to intercept the messages
sent through any transmission media.

£ Nothing can be hidden from the these systems.

£ Unfortunately our India does not have a Tempest


equipment developed and we are not a part of
Echelon network developed by NSA

£ We have to develop one such for empowering our


intelligence agencies and military agencies.
Thank you

Das könnte Ihnen auch gefallen