csce727-lect8-new

csce727-lect8-new - Seizing the Signals Seizing Reading...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Seizing the Signals Seizing the Signals
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 727 - Farkas 2 Reading List Reading List This class Introduction to TEMPEST, The Complete and unofficial TEMPEST Information Place http://www.eskimo.com/~joelm/tempestintro.html NSA, TEMPEST endorsement program, http://www.nsa.gov/ia/industry/tempest.cfm Denning: Chapters 8, 9, 10 Top Ten Cyber Security Menaces for 2008, http://www.sans.org/press/top10menaces08.php Federal Computer Intrusion Laws, http://www.usdoj.gov/criminal/cybercrime/cclaws.html
Background image of page 2
Signal Intelligence Signal Intelligence Deriving intelligence from intercepted electromagnetic waves Types of intelligence: Communication intelligence (COMINT) Electronic intelligence (ELINT) Imagery intelligence (IMINT) CSCE 727 - Farkas 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
ELECTRONIC VISUAL SURVEILLANCE ELECTRONIC VISUAL SURVEILLANCE AND THE REASONABLE AND THE REASONABLE EXPECTATION OF PRIVACY EXPECTATION OF PRIVACY By Max Guirguis, Journal of Technology L a w & Policy, 2004, http://grove.ufl.edu/~techlaw/vol9/issue2/guirguis.html Positive results: reduced crime, efficient work place, etc. Negative results: potential misuse of recording, incorrect results, constitutional rights Surveillance of public vs. private (or reasonably expected to be private) places CSCE 727 - Farkas 4
Background image of page 4
CSCE 727 - Farkas 5 TEMPEST TEMPEST U.S. government code : classified set of standards for limiting electric and magnetic radiation emanations from electronic equipments. Investigations and studies of compromising emanations.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 727 - Farkas 6 Compromising Emanations Compromising Emanations Unintentional intelligence-bearing signals that if intercepted and analyzed can disclose classified information. Intercepted when transmitted, handled, or processed Tempest equipment: remotely mirror what is being done on a remote device, e.g., video monitor, cable wire, processing unit, etc.
Background image of page 6
CSCE 727 - Farkas 7 Unintentional Emanations Unintentional Emanations Normal operation of system Deliberate or accidental exposure to unusual environment Software induced Security Considerations: Traditional Unauthorized access to the system – requires knowledge about the system, applications, configuration, can be detected, limited time frame, etc. Upcoming Exploitation of compromising signals
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 727 - Farkas 8 TEMPEST History TEMPEST History U.S. government concern about capture and reconstruction of emanations from high-security devices used to process, transmit, store sensitive data 1950s: Introduce standards to limit “leakage” – NAG1A 1960s: revise NAG1A to FS222 and FS222A 1970s: revise standards – National Communications Security Information memorandum 5100 (NACSIM) 1974: revise NACSIM 5100 1981: National Communications Security Committee Directive 4. – MACSIM 5100A (classified) 1984: National Communications Security Instructions – NACSI 5400 (secret) 1984: National Security Directive 145. by NSA
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 80

csce727-lect8-new - Seizing the Signals Seizing Reading...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online