HOME

TheInfoList



OR:

TEMPEST is a codename, not an acronym under the U.S.
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
specification and a
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of
communications security Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. In the North Atlantic Treaty Organization ...
(COMSEC). The reception methods fall under the umbrella of radiofrequency MASINT. The NSA methods for spying on computer emissions are classified, but some of the protection standards have been released by either the NSA or the Department of Defense. Protecting equipment from spying is done with distance, shielding, filtering, and masking. The TEMPEST standards mandate elements such as equipment distance from walls, amount of shielding in buildings and equipment, and distance separating wires carrying classified vs. unclassified materials, filters on cables, and even distance and shielding between wires or equipment and building pipes. Noise can also protect information by masking the actual data. While much of TEMPEST is about leaking electromagnetic emanations, it also encompasses sounds and mechanical vibrations. For example, it is possible to log a user's keystrokes using the motion sensor inside
smartphone A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
s. Compromising emissions are defined as unintentional
intelligence Intelligence has been defined in many ways: the capacity for abstraction, logic, understanding, self-awareness, learning, emotional knowledge, reasoning, planning, creativity, critical thinking, and problem-solving. It can be described as t ...
-bearing signals which, if intercepted and analyzed (
side-channel attack In computer security, a side-channel attack is a type of security exploit that leverages information inadvertently leaked by a system—such as timing, power consumption, or electromagnetic or acoustic emissions—to gain unauthorized access to ...
), may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment.


History

During World War II, The
Bell System The Bell System was a system of telecommunication companies, led by the Bell Telephone Company and later by the AT&T Corporation, American Telephone and Telegraph Company (AT&T), that dominated the telephone services industry in North America fo ...
supplied the U.S. military with the 131-B2 mixer device that encrypted teleprinter signals by XOR’ing them with key material from one-time tapes (the SIGTOT system) or, earlier, a rotor-based key generator called SIGCUM. It used electromechanical relays in its operation. Later, Bell informed the Signal Corps that they were able to detect electromagnetic spikes at a distance from the mixer and recover the plain text. Meeting skepticism over whether the phenomenon they discovered in the laboratory could really be dangerous, they demonstrated their ability to recover plain text from a Signal Corps’ crypto center on Varick Street in Lower Manhattan. Now alarmed, the Signal Corps asked Bell to investigate further. Bell identified three problem areas: radiated signals, signals conducted on wires extending from the facility, and magnetic fields. As possible solutions, they suggested shielding, filtering and masking. Bell developed a modified mixer, the 131-A1 with shielding and filtering, but it proved difficult to maintain and too expensive to deploy. Instead, relevant commanders were warned of the problem and advised to control a -diameter zone around their communications center to prevent covert interception, and things were left at that. Then in 1951, the CIA rediscovered the problem with the 131-B2 mixer and found they could recover plain text off the line carrying the encrypted signal from a quarter mile away. Filters for signal and power lines were developed, and the recommended control-perimeter radius was extended to , based more on what commanders could be expected to accomplish than any technical criteria. A long process of evaluating systems and developing possible solutions followed. Other compromising effects were discovered, such as fluctuations in the power line as rotors stepped. The question of exploiting the noise of electromechanical encryption systems had been raised in the late 1940s but was re-evaluated now as a possible threat. Acoustical emanations could reveal plain text, but only if the pick-up device was close to the source. Nevertheless, even mediocre microphones would do. Soundproofing the room made the problem worse by removing reflections and providing a cleaner signal to the recorder. In 1956, the
Naval Research Laboratory The United States Naval Research Laboratory (NRL) is the corporate research laboratory for the United States Navy and the United States Marine Corps. Located in Washington, DC, it was founded in 1923 and conducts basic scientific research, appl ...
developed a better mixer that operated at much lower voltages and currents and therefore radiated far less. It was incorporated in newer NSA encryption systems. However, many users needed the higher signal levels to drive teleprinters at greater distances or where multiple teleprinters were connected, so the newer encryption devices included the option to switch the signal back up to the higher strength. The NSA began developing techniques and specifications for isolating sensitive-communications pathways through filtering, shielding, grounding, and physical separation: of those lines that carried sensitive plain text—from those intended to carry only non-sensitive data, the latter often extending outside of the secure environment. This separation effort became known as the Red/Black Concept. A 1958 joint policy called NAG-1 set radiation standards for equipment and installations based on a limit of control. It also specified the classification levels of various aspects of the TEMPEST problem. The policy was adopted by Canada and the UK the next year. Six organizations—the Navy, Army, Air Force, NSA, CIA, and the State Department—were to provide the bulk of the effort for its implementation. Difficulties quickly emerged. Computerization was becoming important to processing intelligence data, and computers and their peripherals had to be evaluated, wherein many of them evidenced vulnerabilities. The Friden Flexowriter, a popular I/O typewriter at the time, proved to be among the strongest emitters, readable at distances up to in field tests. The U.S. Communications Security Board (USCSB) produced a Flexowriter Policy that banned its use overseas for classified information and limited its use within the U.S. to the Confidential level, and then only within a security zone, but users found the policy onerous and impractical. Later, the NSA found similar problems with the introduction of cathode-ray-tube displays (
CRT CRT or Crt most commonly refers to: * Cathode-ray tube, a display * Critical race theory, an academic framework of analysis CRT may also refer to: Law * Charitable remainder trust, United States * Civil Resolution Tribunal, Canada * Columbia ...
s), which were also powerful radiators. There was a multiyear process of moving from policy recommendations to more strictly enforced TEMPEST rules. The resulting Directive 5200.19, coordinated with 22 separate agencies, was signed by Secretary of Defense
Robert McNamara Robert Strange McNamara (; June 9, 1916 – July 6, 2009) was an American businessman and government official who served as the eighth United States secretary of defense from 1961 to 1968 under presidents John F. Kennedy and Lyndon B. Johnson ...
in December 1964, but still took months to fully implement. The NSA's formal implementation took effect in June 1966. Meanwhile, the problem of acoustic emanations became more critical with the discovery of some 900 microphones in U.S. installations overseas, most behind the
Iron Curtain The Iron Curtain was the political and physical boundary dividing Europe into two separate areas from the end of World War II in 1945 until the end of the Cold War in 1991. On the east side of the Iron Curtain were countries connected to the So ...
. The response was to build room-within-a-room enclosures, some transparent, nicknamed "fish bowls". Other units were fully shielded to contain electronic emanations, but were unpopular with the personnel who were supposed to work inside; they called the enclosures "meat lockers", and sometimes just left their doors open. Nonetheless, they were installed in critical locations, such as the embassy in Moscow, where two were installed: one for State Department use and one for military attachés. A unit installed at the NSA for its key-generation equipment cost $134,000. TEMPEST standards continued to evolve in the 1970s and later, with newer testing methods and more nuanced guidelines that took account of the risks in specific locations and situations.A History of U.S. Communications Security; the David G. Boak Lectures
National Security Agency (NSA), Volumes I, 1973, Volumes II 1981, partially released 2008, additional portions declassified October 14, 2015
During the 80s, security needs were often met with resistance. According to NSA's David G. Boak, "Some of what we still hear today in our own circles, when rigorous technical standards are whittled down in the interest of money and time, are frighteningly reminiscent of the arrogant Third Reich with their Enigma cryptomachine."


Shielding standards

Many specifics of the TEMPEST standards are classified, but some elements are public. Current United States and
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
Tempest standards define three levels of protection requirements: *NATO SDIP-27 Level A (formerly AMSG 720B) and USA NSTISSAM Level I :''"Compromising Emanations Laboratory Test Standard"'' :This is the strictest standard for devices that will be operated in ''NATO Zone 0'' environments, where it is assumed that an attacker has almost immediate access (e.g. neighbouring room, 1 metre; 3' distance). *NATO SDIP-27 Level B (formerly AMSG 788A) and USA NSTISSAM Level II :''"Laboratory Test Standard for Protected Facility Equipment"'' :This is a slightly relaxed standard for devices that are operated in ''NATO Zone 1'' environments, where it is assumed that an attacker cannot get closer than about (or where building materials ensure an attenuation equivalent to the free-space attenuation of this distance). *NATO SDIP-27 Level C (formerly AMSG 784) and USA NSTISSAM Level III :''"Laboratory Test Standard for Tactical Mobile Equipment/Systems"'' :An even more relaxed standard for devices operated in ''NATO Zone 2'' environments, where attackers have to deal with the equivalent of of free-space attenuation (or equivalent attenuation through building materials). Additional standards include: *NATO SDIP-29 (formerly AMSG 719G) :''"Installation of Electrical Equipment for the Processing of Classified Information"'' :This standard defines installation requirements, for example in respect to grounding and cable distances. *AMSG 799B :''"NATO Zoning Procedures"'' :Defines an attenuation measurement procedure, according to which individual rooms within a security perimeter can be classified into Zone 0, Zone 1, Zone 2, or Zone 3, which then determines what shielding test standard is required for equipment that processes secret data in these rooms. The NSA and Department of Defense have declassified some TEMPEST elements after Freedom of Information Act requests, but the documents black out many key values and descriptions. The declassified version of the TEMPEST test standard is heavily redacted, with emanation limits and test procedures blacked out. A redacted version of the introductory Tempest handbook NACSIM 5000 was publicly released in December 2000. Additionally, the current
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
standard SDIP-27 (before 2006 known as AMSG 720B, AMSG 788A, and AMSG 784) is still classified. Despite this, some declassified documents give information on the shielding required by TEMPEST standards. For example, Military Handbook 1195 includes the chart at the right, showing electromagnetic shielding requirements at different frequencies. A declassified NSA specification for shielded enclosures offers similar shielding values, requiring, "a minimum of 100 dB insertion loss from 1 kHz to 10 GHz." Since much of the current requirements are still classified, there are no publicly available correlations between this 100 dB shielding requirement and the newer zone-based shielding standards. In addition, many separation distance requirements and other elements are provided by the declassified NSA red-black installation guidance, NSTISSAM TEMPEST/2-95.


Certification

The information-security agencies of several NATO countries publish lists of accredited testing labs and of equipment that has passed these tests: *In Canada: Canadian Industrial TEMPEST Program *In Germany: BSI German Zoned Products List *In the UK: UK CESG Directory of Infosec Assured Products, Section 12 *In the U.S.: NSA TEMPEST Certification Program The
United States Army The United States Army (USA) is the primary Land warfare, land service branch of the United States Department of Defense. It is designated as the Army of the United States in the United States Constitution.Article II, section 2, clause 1 of th ...
also has a TEMPEST testing facility, as part of the U.S. Army Electronic Proving Ground, at Fort Huachuca,
Arizona Arizona is a U.S. state, state in the Southwestern United States, Southwestern region of the United States, sharing the Four Corners region of the western United States with Colorado, New Mexico, and Utah. It also borders Nevada to the nort ...
. Similar lists and facilities exist in other NATO countries. TEMPEST certification must apply to entire systems, not just to individual
components Component may refer to: In engineering, science, and technology Generic systems *System components, an entity with discrete structure, such as an assembly or software module, within a system considered at a particular level of analysis * Lumped e ...
, since connecting a single unshielded component (such as a cable or device) to an otherwise secure system could dramatically alter the system RF characteristics.


RED/BLACK separation

TEMPEST standards require " RED/BLACK separation", i.e., maintaining distance or installing shielding between circuits and equipment used to handle
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
classified or sensitive information that is not encrypted (RED) and secured circuits and equipment (BLACK), the latter including those carrying encrypted signals. Manufacture of TEMPEST-approved equipment must be done under careful quality control to ensure that additional units are built exactly the same as the units that were tested. Changing even a single wire can invalidate the tests.


Correlated emanations

One aspect of TEMPEST testing that distinguishes it from limits on
spurious emission In radio communication, a spurious emission is any component of a radiated radio frequency signal, the complete suppression of which, would not impair the integrity of the modulation type, or the information being transmitted. A radiated signal ...
s (''e.g.'', FCC Part 15) is a requirement of absolute minimal correlation between radiated energy or detectable emissions and any plaintext data that are being processed.


Public research

In 1985, Wim van Eck published the first unclassified technical analysis of the security risks of emanations from
computer monitor A computer monitor is an output device that displays information in pictorial or textual form. A discrete monitor comprises a electronic visual display, visual display, support electronics, power supply, Housing (engineering), housing, electri ...
s. This paper caused some consternation in the security community, which had previously believed that such monitoring was a highly sophisticated attack available only to
governments A government is the system or group of people governing an organized community, generally a state. In the case of its broad associative definition, government normally consists of legislature, executive, and judiciary. Government is a m ...
; Van Eck successfully eavesdropped on a real system, at a range of hundreds of
metre The metre (or meter in US spelling; symbol: m) is the base unit of length in the International System of Units (SI). Since 2019, the metre has been defined as the length of the path travelled by light in vacuum during a time interval of of ...
s, using just $15 worth of equipment plus a
television Television (TV) is a telecommunication medium for transmitting moving images and sound. Additionally, the term can refer to a physical television set rather than the medium of transmission. Television is a mass medium for advertising, ...
set. As a consequence of this research, such emanations are sometimes called "Van Eck radiation", and the eavesdropping technique Van Eck phreaking, although government researchers were already aware of the danger, as
Bell Labs Nokia Bell Labs, commonly referred to as ''Bell Labs'', is an American industrial research and development company owned by Finnish technology company Nokia. With headquarters located in Murray Hill, New Jersey, Murray Hill, New Jersey, the compa ...
noted this vulnerability to secure
teleprinter A teleprinter (teletypewriter, teletype or TTY) is an electromechanical device that can be used to send and receive typed messages through various communications channels, in both point-to-point (telecommunications), point-to-point and point- ...
communications during
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
and was able to produce 75% of the plaintext being processed in a secure facility from a distance of Additionally the NSA published ''Tempest Fundamentals, NSA-82-89, NACSIM 5000, National Security Agency'' (Classified) on February 1, 1982. In addition, the Van Eck technique was successfully demonstrated to non-TEMPEST personnel in
Korea Korea is a peninsular region in East Asia consisting of the Korean Peninsula, Jeju Island, and smaller islands. Since the end of World War II in 1945, it has been politically Division of Korea, divided at or near the 38th parallel north, 3 ...
during the
Korean War The Korean War (25 June 1950 – 27 July 1953) was an armed conflict on the Korean Peninsula fought between North Korea (Democratic People's Republic of Korea; DPRK) and South Korea (Republic of Korea; ROK) and their allies. North Korea was s ...
in the 1950s. Markus Kuhn has discovered several low-cost techniques for reducing the chances that emanations from computer displays can be monitored remotely. With CRT displays and analog video cables, filtering out
high-frequency High frequency (HF) is the International Telecommunication Union, ITU designation for the radio band, band of radio waves with frequency between 3 and 30 megahertz (MHz). It is also known as the decameter band or decameter wave as its wavelengt ...
components from fonts before rendering them on a computer screen will attenuate the energy at which text characters are broadcast. With modern
flat panel display A flat-panel display (FPD) is an electronic display used to display visual content such as text or images. It is present in consumer, medical, transportation, and industrial equipment. Flat-panel displays are thin, lightweight, provide better ...
s, the high-speed digital serial interface ( DVI) cables from the
graphics controller A graphics card (also called a video card, display card, graphics accelerator, graphics adapter, VGA card/VGA, video adapter, display adapter, or colloquially GPU) is a computer expansion card that generates a feed of graphics output to a displa ...
are a main source of compromising emanations. Adding random
noise Noise is sound, chiefly unwanted, unintentional, or harmful sound considered unpleasant, loud, or disruptive to mental or hearing faculties. From a physics standpoint, there is no distinction between noise and desired sound, as both are vibrat ...
to the
least significant bit In computing, bit numbering is the convention used to identify the bit positions in a binary number. Bit significance and indexing In computing, the least significant bit (LSb) is the bit position in a binary integer representing the lowes ...
s of pixel values may render the emanations from flat-panel displays unintelligible to eavesdroppers but is not a secure method. Since DVI uses a certain bit code scheme that tries to transport a balanced signal of 0 bits and 1 bits, there may not be much difference between two pixel colors that differ very much in their color or intensity. The emanations can differ drastically even if only the last bit of a pixel's color is changed. The signal received by the eavesdropper also depends on the frequency where the emanations are detected. The signal can be received on many frequencies at once and each frequency's signal differs in contrast and
brightness Brightness is an attribute of visual perception in which a source appears to be radiating/reflecting light. In other words, brightness is the perception dictated by the luminance of a visual target. The perception is not linear to luminance, and ...
related to a certain color on the screen. Usually, the technique of smothering the RED signal with noise is not effective unless the power of the noise is sufficient to drive the eavesdropper's receiver into saturation thus overwhelming the receiver input.
LED A light-emitting diode (LED) is a semiconductor device that emits light when current flows through it. Electrons in the semiconductor recombine with electron holes, releasing energy in the form of photons. The color of the light (corresp ...
indicators on computer equipment can be a source of compromising optical emanations. One such technique involves the monitoring of the lights on a
dial-up modem The Democratic Movement (, ; MoDem ) is a centre to centre-right political party in France, whose main ideological trends are liberalism and Christian democracy, and that is characterised by a strong pro-Europeanist stance. MoDem was establis ...
. Almost all modems flash an LED to show activity, and it is common for the flashes to be directly taken from the data line. As such, a fast optical system can easily see the changes in the flickers from the data being transmitted down the wire. Recent research has shown it is possible to detect the radiation corresponding to a keypress event from not only
wireless Wireless communication (or just wireless, when the context allows) is the transfer of information (''telecommunication'') between two or more points without the use of an electrical conductor, optical fiber or other continuous guided transm ...
(radio) keyboards, but also from traditional wired keyboards he PS/2 keyboard, for example, contains a microprocessor which will radiate some amount of radio frequency energy when responding to keypresses and even from laptop keyboards. From the 1970s onward, Soviet bugging of US Embassy
IBM Selectric The IBM Selectric (a portmanteau of "selective" and "electric") was a highly successful line of electric typewriters introduced by IBM on 31 July 1961. Instead of the "basket" of individual typebars that swung up to strike the ribbon and page ...
typewriters allowed the keypress-derived mechanical motion of bails, with attached magnets, to be detected by implanted magnetometers, and converted via hidden electronics to a digital radio frequency signal. Each eight character transmission provided Soviet access to sensitive documents, as they were being typed, at US facilities in Moscow and Leningrad. In 2014, researchers introduced "AirHopper", a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency signals. In 2015, "BitWhisper", a Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations was introduced. "BitWhisper" supports bidirectional communication and requires no additional dedicated peripheral hardware. Later in 2015, researchers introduced GSMem, a method for exfiltrating data from air-gapped computers over cellular frequencies. The transmission - generated by a standard internal bus - renders the computer into a small cellular transmitter antenna. In February 2018, research was published describing how low frequency magnetic fields can be used to escape sensitive data from Faraday-caged, air-gapped computers with malware code-named ’ODINI’ that can control the low frequency magnetic fields emitted from infected computers by regulating the load of CPU cores. In 2018, a class of
side-channel attack In computer security, a side-channel attack is a type of security exploit that leverages information inadvertently leaked by a system—such as timing, power consumption, or electromagnetic or acoustic emissions—to gain unauthorized access to ...
was introduced at ACM and Black Hat by Eurecom's researchers: "Screaming Channels". This kind of attack targets mixed-signal chips — containing an analog and
digital Digital usually refers to something using discrete digits, often binary digits. Businesses *Digital bank, a form of financial institution *Digital Equipment Corporation (DEC) or Digital, a computer company *Digital Research (DR or DRI), a software ...
circuit on the same silicon die — with a
radio transmitter In electronics and telecommunications, a radio transmitter or just transmitter (often abbreviated as XMTR or TX in technical documents) is an electronic device which produces radio waves with an antenna with the purpose of signal transmissio ...
. The results of this architecture, often found in connected objects, is that the digital part of the chip will leak some metadata on its computations into the analog part, which leads to metadata's leak being encoded in the
noise Noise is sound, chiefly unwanted, unintentional, or harmful sound considered unpleasant, loud, or disruptive to mental or hearing faculties. From a physics standpoint, there is no distinction between noise and desired sound, as both are vibrat ...
of the radio transmission. Thanks to signal-processing techniques, researchers were able to extract cryptographic keys used during the communication and
decrypt In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plai ...
the content. This attack class is supposed, by the authors, to be known already for many years by governmental intelligence agencies.


In popular culture

*In the television series ''
Numb3rs ''Numbers'' (stylized as ''NUMB3RS'') is an American crime drama television series that originally aired on CBS from January 23, 2005, to March 12, 2010, with a total of six seasons consisting of 118 episodes. The series was created by Nico ...
'', season 1 episode "Sacrifice", a wire connected to a high gain antenna was used to "read" from a computer monitor. *In the television series '' Spooks'', season 4 episode "The Sting", a failed attempt to read information from a computer that has no network link is described. *In the novel ''
Cryptonomicon ''Cryptonomicon'' is a 1999 novel by American author Neal Stephenson, set in two different time periods. One group of characters are World War II–era Allied codebreakers and tactical-deception operatives affiliated with the British Govern ...
'' by
Neal Stephenson Neal Town Stephenson (born October 31, 1959) is an American writer known for his works of speculative fiction. His novels have been categorized as science fiction, historical fiction, cyberpunk, and baroque. Stephenson's work explores mathemati ...
, characters use Van Eck phreaking to likewise read information from a computer monitor in a neighboring room. *In the television series '' Agents of S.H.I.E.L.D.'', season 1 episode " Ragtag", an office is scanned for digital signatures in the UHF spectrum. *In the video game '' Tom Clancy's Splinter Cell: Chaos Theory'', part of the final mission involves spying on a meeting in a TEMPEST-hardened war room. Throughout the entire ''Splinter Cell'' series, a
laser microphone A laser microphone is a surveillance device that uses a laser beam to detect sound vibrations in a distant object. It can be used to eavesdrop with minimal chance of exposure. The object is typically inside a room where a conversation is taking pl ...
is used as well. * In the video game '' Rainbow Six: Siege'', the operator Mute has experience in TEMPEST specifications. He designed a Signal Disrupter initially to ensure that hidden microphones in sensitive meetings would not transmit, and adapted them for combat, capable of disrupting remotely activated devices like breaching charges. * In the novel series The Laundry Files by
Charles Stross Charles David George "Charlie" Stross (born 18 October 1964) is a British writer of science fiction and fantasy. Stross specialises in hard science fiction and space opera. Between 1994 and 2004, he was also an active writer for the magazine ' ...
, the character James Angleton (high-ranking officer of an ultra-secret intelligence agency) always uses low tech devices such as a
typewriter A typewriter is a Machine, mechanical or electromechanical machine for typing characters. Typically, a typewriter has an array of Button (control), keys, and each one causes a different single character to be produced on paper by striking an i ...
or a
Memex A memex (from "memory expansion") is a hypothetical electromechanical device for interacting with microform documents and described in Vannevar Bush's 1945 article " As We May Think". Bush envisioned the memex as a device in which individuals w ...
to defend against TEMPEST (despite the building being TEMPEST-shielded).


See also

*
Air gap (networking) An air gap, air wall, air gapping or disconnected network is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an ...
- air gaps can be breached by TEMPEST-like techniques *
Computer and network surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
*
Computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
* MIL-STD-461


References


Sources

* * * * * * * * * * {{DEFAULTSORT:Tempest Code names Cryptographic attacks Side-channel attacks Signals intelligence Surveillance United States government secrecy