Dear Guest, Please Register to Download Free Seminar Reports and PPT of each topic. The Download link will be visible only after the registration.Please search the topic before posting.

Please click the Facebook Like Button if you are satisfied

 Subscribe To Get Latest Seminar Reports and PPT

Receive all seminar updates via Facebook. Just Click the Like Button Below


Tempest and Echelon

Huge Collection of Computer Science Seminar Topics, Reports and PPT.

Tempest and Echelon

Postby arpi08 » Thu Jan 12, 2012 11:31 am

Hello sir,
I liked the topics:
1) Tempest and Echelon
2) 3D television

Could you please post the reports for both these topics.
Thank You.
Active User
Posts: 3
Joined: Wed Jan 11, 2012 9:46 am

Re: Seminar Report Request.

Postby Prasanth » Thu Jan 12, 2012 5:45 pm

The notion of spying is a very sensitive topic after the September 11 attack of Terrorists in New York. In the novel 1984, George Orwell foretold a future where individuals had no expectation of privacy because the state monopolized the technology of spying. Now the National security Agency Of USA developed a secret project to spy on people for keep tracing their messages to make technology enabled interception to find out the terrorist activities across the globe, named as Echelon. Leaving the technology ahead of the any traditional method of interception.

The secret project Developed by NSA (National Security Agency of USA) and its allies is tracing every single transmission even a single of keyboard. The allies of USA in this project are UK, Australia, New Zealand and Canada. Echelon is developed with the highest computing power of computers connected through the satellites all over the world. In this project the NSA left the wonderful method of Tempest and Carnivores behind.

Echelon is the technology for sniffing through the messages sent over a network or any transmission media, even it is wireless messages. Tempest is the technology for intercepting the electromagnetic waves over the air. It simply sniffs through the electromagnetic waves propagated from any devices, even it is from the monitor of a computer screen. Tempest can capture the signals through the walls of computer screens and keystrokes of key board even the computer is not connected to a network. Thus the traditional way of hacking has a little advantage in spying.

The main theory behind the Tempest (Transient Electromagnetic Pulse Emanation Standard.) is that any electronic or electrical devices emit Electromagnetic radiations of specific key when it is operated. For example the picture tube of computer monitor emits radiations when it is scanned up on vertical of horizontal range beyond the screen. It will not cause any harm to a human and it is very small. But it has a specific frequency range. You can reproduce that electromagnetic waves by tracing with the powerful equipments and the powerful filtering methods to correct the errors while transmission from the equipment. Actually this electromagnetic waves are not necessary for a human being because it not coming from a transmitter, but we have a receiver to trace the waves.

For the project named as Echelon the NSA is using supercomputers for sniffing through the packets and any messages send as the electromagnetic waves. They are using the advantage of Distributed computing for this. Firstly they will intercept the messages by the technology named as the Tempest and also with the Carnivore. Every packet is sniffed for spying for the USA’s NSA for security reasons.
You do not have the required permissions to download the files attached to this post. You must LOGIN or REGISTER to download these files.
User avatar
Site Admin
Posts: 488
Joined: Sat May 28, 2011 6:29 pm

Re: Tempest and Echelon

Postby arpi08 » Fri Jan 13, 2012 12:09 pm

Thank you so much for getting back so quickly... :D
Appreciate it a lot..
Active User
Posts: 3
Joined: Wed Jan 11, 2012 9:46 am

Re: Tempest and Echelon

Postby sunnychadha » Mon Jan 16, 2012 1:00 pm

SIr could you please forward me the base paper and ppt on this topic.My mail id
Posts: 1
Joined: Mon Jan 16, 2012 5:33 am

Return to Computer Science Seminar Topics