Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

THE EXPLOITATION OF COMPROMISING EMANATIONS

EPFL/LASEC ANNIVERSARY

UNDERSTAND HOW COMPROMISING EMANATIONS CAN BE EXPLOITED IN PRACTICE

UNDERSTAND HOW COMPROMISING EMANATIONS CAN BE EXPLOITED IN PRACTICE

COMPROMISING EMANATIONS
Compromising emanations are defined as unintentional emanations which, if intercepted and analyzed, may disclose sensitive information

TEMPEST
codename referring to investigations and studies of unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment

CHRONOLOGICAL PRESENTATION OF COMPROMISING EMANATIONS

more than 40 microphones were discovered in the U.S. embassy in Moscow. Most people were concerned about all the conversations that may have been overheard and the resultant compromise of their diplomatic plans and intelligence activities associated with the embassy. But another eavesdropping device was more dangerous for the NSA: a large metal grid was carefully buried in the cement of the ceiling over the Department of State communication area. A grid with a wire leading outside, acting as an antenna.

You might also like