notion of spying is a very sensitive topic after the September 11 attack of Terrorists
in New York. In the novel 1984, George Orwell foretold a future where individuals
had no expectation of privacy because the state monopolized the technology of
spying. Now the National security Agency Of USA developed a secret project to
spy on people for keep tracing their messages to make technology enabled interception
to find out the terrorist activities across the globe, named as Echelon. Leaving
the technology ahead of the any traditional method of interception .
The secret project Developed by NSA (National Security Agency of USA) and its
allies is tracing every single transmission even a single of keyboard. The allies
of USA in this project are UK, Australia, New Zealand and Canada. Echelon is developed
with the highest computing power of computers connected through the satellites
all over the world. In this project the NSA left the wonderful method of Tempest
and Carnivores behind.
Echelon is the technology
for sniffing through the messages sent over a network or any transmission media,
even it is wireless messages. Tempest is the technology for intercepting the electromagnetic
waves over the air. It simply sniffs through the electromagnetic waves propagated
from any devices, even it is from the monitor of a computer screen. Tempest can
capture the signals through the walls of computer screens and keystrokes of key
board even the computer is not connected to a network. Thus the traditional way
of hacking has a little advantage in spying.
For the common people it is
so hard to believe that their monitor can be reproduced from anywhere in one kilometer
range without any transmission media in between the equipment and their computer.
So we have to believe the technology enabled us to reproduce anything from a monitor
of computer to the Hard Disks including the Memory (RAM) of a distant computer
without any physical or visual contact. It is done with the Electromagnetic waves
propagated from that device.
The main theory
behind the Tempest(Transient Electromagnetic Pulse Emanation Standard.) is that
any electronic or electrical devices emit Electromagnetic radiations of specific
key when it is operated. For example the picture tube of computer monitor emits
radiations when it is scanned up on vertical of horizontal range beyond the screen.
It will not cause any harm to a human and it is very small. But it has a specific
frequency range. You can reproduce that electromagnetic waves by tracing with
the powerful equipments and the powerful filtering methods to correct the errors
while transmission from the equipment. Actually this electromagnetic waves are
not necessary for a human being because it not coming from a transmitter, but
we have a receiver to trace the waves.
the project named as Echelon the NSA is using supercomputers for sniffing through
the packets and any messages send as the electromagnetic waves. They are using
the advantage of Distributed computing for this. Firstly they will intercept the
messages by the technology named as the Tempest and also with the Carnivore. Every
packet is sniffed for spying for the USA's NSA for security reasons.
You may also like this : Smart Quill, Spam Assassin, Stereoscopic Imaging, Zigbee, Ultra-Wideband, Home Networking, Internet Protocol Television , Bacterio-Rhodopsin Memory, Blade Servers, Digital Cinema, Holographic Versatile Disc, Itanium Processor , Local Multipoint Distribution Service , Network Attached Storage, Night Vision Technology, Opera (web browser), Parasitic Computing, Performance Testing, Java Ring , RD RAM , GSM Security And Encryption , Fast Convergence Algorithms for Active Noise Controlin Vehicles , 3G vs WiFi , Data Security in Local Network using Distributed Firewalls, Computerized Paper Evaluation using Neural Network, Bluetooth Based Smart Sensor Networks , Laser Communications, Multiple Domain Orientation , Industrial Applications using Neural Networks , Implementation Of Zoom FFT , Image Processing , Virtual keyboard , Transient Stability Assessment using Neural Networks , Tracking and Positioning of Mobiles in Telecommunication, Timing Attacks on Implementations , Prototype System Design for Telemedicine , Optical Networking and Dense Wavelength Division Multiplexing , Optical Burst Switching, Image Processing & Compression , Cyberterrorism , Ipv6 - The Next Generation Protocol , Driving Optical Network Evolution , Cellular Neural Network , Radio Network Controller , Digital Audio Broadcasting , Significance of real-time transport Protocol in VOIP , Space Mouse , Resilient Packet Ring Technology , Wireless Networked Digital Devices, Design of 2-D Filters using a Parallel Processor Architecture, Computer Seminars Reports and PPT