Saturday, April 16, 2011

TEMPEST and ECHELON

Whenever we open the newspapers or switch on the television we can view the gory incidents of violence which has shaken up the world. Terrorism is the master word of today and we are threatened by bomb blasts, hijackings bloodshed and what not !

TEMPEST and ECHELON are the methods of spying in a sophisticated manner. Both were developed by the National Security Agency (NSA) for monitoring the people. These technologies were originally developed for pure espionage, but hackers use them now for spying into other people’s activities.

Tempest is the technology, which can reproduce what you are seeing in your monitor, what you are typing in your keyboard from a couple of kilometers away. It traces all electromagnetic radiation from the victim’s monitor, keyboard, even pc memory and hard disk, then it reproduces the signals.

Echelon is the spying on a large network by sniffing through the words. It can intercept as many as 2 million communications per hour through phone calls, faxes, e-mails, downloads, microwave, cellular, satellite communication etc.

This seminar describes about the various methods employed in spying with the help of Tempest and Echelon and that is why I decided to select this topic for my presentation.

No comments:

Post a Comment