What is TEMPEST?

835 Words2 Pages

According to Whitman and Mattord, TEMPEST is a program developed by the US government to reduce the risk of electromagnetic radiation (EMR) monitoring. (Whitman & Mattord, 2009) Some believe that TEMPEST was actually a code word created by the US government in the 1960’s but was later defined as Transient Electromagnetic Pulse Emanation Surveillance Technology or Telecommunications Electronic Material Protected from Emanating Spurious Transmissions. (Whitman & Mattord, 2009) In general, TEMPEST involves the following types of procedures: ensuring that computers are placed far as possible from outside perimeters, installing special shielding inside the CPU, and implementing a whole host of other restrictions including maintaining distance from plumbing and other infrastructure components that carry radio waves. (Whitman & Mattord, 2009).

The standards and measurements used under TEMPEST are in document published by National Security Telecommunications and Information Systems Security. (TEMPEST/1-92, 2008) National Communications Security Committee Directive 4 sets U.S. TEMPEST standards. The requirements are set out in document NACSIM 5100A, which is classified. TEMPEST certification for private sector usage is extremely expensive and, as a result, it has led to a newer standard, called ZONE, which is more cost effective, though somewhat less secure. Approved TEMPEST-shielded devices are classed into 3 categories. Type 1 is extremely secure and available only to the U.S. government and approved contractors, who must undergo strict vetting. Type 2 is somewhat less secure, but still requires government approval to use. Type 3 is for general commercial use. There are three levels of protection required within the document. The f...

... middle of paper ...

....nsa.gov/about/faqs/about_nsa.shtml

SANS Institute Information Reading Room. (2011, April 17). Retrieved April 17, 2011, from Sans: http://www.sans.org/reading_room/whitepapers/privacy/introduction-tempest_981

McConnell, J. M. (1995, December 12). CRYPTOME. Retrieved April 17, 2011, from NSTISSAM TEMPEST /2-95: http://cryptome.org/tempest-2-95.htm

McConnell, J. M. (2008, September 9). Compromising Emanations Laboratory Test Requirements Electromagnetics. Retrieved April 17, 2011, from NSTISSAM TEMPEST/1-92: http://cryptome.org/nt1-92-6-12.htm

Office, T. N. (2009, January 15). Information Affairs Business and Research. Retrieved April 17, 2011, from National Security Agency Central Security Service: http://www.nsa.gov/applications/ia/tempest/index.cfm

Whitman, M. E., & Mattord, H. J. (2009). Principles of Information Security 3rd Ed. Boston: Course Technology.

Open Document