World Library  
Flag as Inappropriate
Email this Article

Tempest (codename)

Article Id: WHEBN0000184781
Reproduction Date:

Title: Tempest (codename)  
Author: World Heritage Encyclopedia
Language: English
Subject: Van Eck phreaking, Signals intelligence, Surveillance, RuBee, Side channel attacks
Collection: Code Names, Cryptographic Attacks, Side Channel Attacks, Signals Intelligence, Surveillance, United States Government Secrecy
Publisher: World Heritage Encyclopedia

Tempest (codename)

TEMPEST is a National Security Agency specification and NATO certification[1][2] referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.[3] TEMPEST covers both methods to spy upon others and also how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).[4]

The NSA methods for spying upon computer emissions are classified, but some of the protection standards have been released by either the NSA or the Department of Defense.[5] Protecting equipment from spying is done with distance, shielding, filtering and masking.[6] The TEMPEST standards mandate elements such as equipment distance from walls, amount of shielding in buildings and equipment, and distance separating wires carrying classified vs. unclassified materials,[5] filters on cables, and even distance and shielding between wires/equipment and building pipes. Noise can also protect information by masking the actual data.[6]

While much of TEMPEST is about leaking electromagnetic emanations, it also encompasses sounds or mechanical vibrations.[5] For example, it is possible to log a user's keystrokes using the motion sensor inside smartphones.[7] Compromising emissions are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment.[8]


  • Shielding standards 1
  • Certification 2
  • RED/BLACK separation 3
  • Correlated emanations 4
  • Public research 5
  • In popular culture 6
  • See also 7
  • References 8
  • External links 9

Shielding standards

Many specifics of the TEMPEST standards are classified, but some elements are public. Current United States and NATO Tempest standards define three levels of protection requirements:[9]

  • NATO SDIP-27 Level A (formerly AMSG 720B) and USA NSTISSAM Level I
"Compromising Emanations Laboratory Test Standard"
This is the strictest standard for devices that will be operated in NATO Zone 0 environments, where it is assumed that an attacker has almost immediate access (e.g. neighbouring room, 1 m distance).
  • NATO SDIP-27 Level B (formerly AMSG 788A) and USA NSTISSAM Level II
"Laboratory Test Standard for Protected Facility Equipment"
This is a slightly relaxed standard for devices that are operated in NATO Zone 1 environments, where it is assumed that an attacker cannot get closer than about 20 m (or where building materials ensure an attenuation equivalent to the free-space attenuation of this distance).
  • NATO SDIP-27 Level C (formerly AMSG 784) and USA NSTISSAM Level III
"Laboratory Test Standard for Tactical Mobile Equipment/Systems"
An even more relaxed standard for devices operated in NATO Zone 2 environments, where attackers have to deal with about 100 m worth of free-space attenuation (or equivalent attenuation through building materials).

Additional standards include:

  • NATO SDIP-29 (formerly AMSG 719G)
"Installation of Electrical Equipment for the Processing of Classified Information"
This standard defines installation requirements, for example in respect to grounding and cable distances.
  • AMSG 799B
"NATO Zoning Procedures"
Defines an attenuation measurement procedure, according to which individual rooms within a security perimeter can be classified into Zone 0, Zone 1, Zone 2, or Zone 3, which then determines what shielding test standard is required for equipment that processes secret data in these rooms.

The NSA and Department of Defense have declassified some TEMPEST elements after Freedom of Information Act requests, but the documents black out many key values and descriptions. The declassified version of the TEMPEST test standard is heavily redacted, with emanation limits and test procedures blacked out. A redacted version of the introductory Tempest handbook NACSIM 5000 was publicly released in December 2000. Additionally, the current NATO standard SDIP-27 (before 2006 known as AMSG 720B, AMSG 788A, and AMSG 784) is still classified.

TEMPEST Shielding Requirements

Despite this, some declassified documents give information on the shielding required by TEMPEST standards. For example, Military Handbook 1195 includes the chart at the right, showing electromagnetic shielding requirements at different frequencies. A declassified NSA specification for shielded enclosures offers similar shielding values, requiring, "a minimum of 100 dB insertion loss from 1 KHz to 10 GHz."[10] Since much of the current requirements are still classified, there are no publicly available correlations between this 100 dB shielding requirement and the newer zone-based shielding standards.

In addition, many separation distance requirements and other elements are provided by the declassified NSA red-black installation guidance, NSTISSAM TEMPEST/2-95.[11]

The United States Air Force has published a few mandatory standards regarding Emission Security:

  • Instruction AFI 33-203 Vol 1, Emission Security (Soon to be AFSSI 7700)
  • Instruction AFI 33-203 Vol 3, EMSEC Countermeasures Reviews (Soon to be AFSSI 7702)
  • Instruction AFI 33-201 Vol 8, Protected Distributed Systems (Soon to be AFSSI 7703)


The information-security agencies of several NATO countries publish lists of accredited testing labs and of equipment that has passed these tests:

  • In Canada: Canadian Industrial TEMPEST Program[12]
  • In Germany: BSI German Zoned Products List[13]
  • In the UK: UK CESG Directory of Infosec Assured Products, Section 12[14]
  • In the U.S.: NSA Tempest Endorsement Program[15]

The United States Army also has a Tempest testing facility, as part of the U.S. Army Information Systems Engineering Command, at Fort Huachuca, Arizona. Similar lists and facilities exist in other NATO countries.

Tempest certification must apply to entire systems, not just to individual components, since connecting a single unshielded component (such as a cable) to an otherwise secure system could dramatically alter the system RF characteristics.

RED/BLACK separation

TEMPEST standards require "RED/BLACK separation", i.e., maintaining distance or installing shielding between circuits and equipment used to handle plaintext classified or sensitive information that is not encrypted (RED) and secured circuits and equipment (BLACK), the latter including those carrying encrypted signals. Manufacture of TEMPEST-approved equipment must be done under careful quality control to ensure that additional units are built exactly the same as the units that were tested. Changing even a single wire can invalidate the tests.

Correlated emanations

One aspect of Tempest testing that distinguishes it from limits on spurious emissions (e.g., FCC Part 15) is a requirement of absolute minimal correlation between radiated energy or detectable emissions and any plaintext data that are being processed.

Public research

In 1985, Wim van Eck published the first unclassified technical analysis of the security risks of emanations from computer monitors. This paper caused some consternation in the security community, which had previously believed that such monitoring was a highly sophisticated attack available only to governments; van Eck successfully eavesdropped on a real system, at a range of hundreds of metres, using just $15 worth of equipment plus a television set.

In consequence of this research such emanations are sometimes called "van Eck radiation", and the eavesdropping technique van Eck phreaking, although government researchers were already aware of the danger, as Bell Labs noted this vulnerability to secure teleprinter communications during World War II and was able to produce 75% of the plaintext being processed in a secure facility from a distance of 80 feet.[16] Additionally the NSA published Tempest Fundamentals, NSA-82-89, NACSIM 5000, National Security Agency (Classified) on February 1, 1982. In addition, the van Eck technique was successfully demonstrated to non-TEMPEST personnel in Korea during the Korean War in the 1950s.

Markus Kuhn has discovered several low-cost techniques for reducing the chances that emanations from computer displays can be monitored remotely.[17] With CRT displays and analog video cables, filtering out high-frequency components from fonts before rendering them on a computer screen will attenuate the energy at which text characters are broadcast. With modern flat panel displays, the high-speed digital serial interface (DVI) cables from the graphics controller are a main source of compromising emanations. Adding random noise to the less significant bits of pixel values may render the emanations from flat-panel displays unintelligible to eavesdroppers but is not a secure method. Since DVI uses a certain bit code scheme for trying to transport an evenly balanced signal of 0 and 1 bits there may not be much difference between two pixel colours that differ very much in their colour or intensity. It may also be that the generated emanations may differ totally even if only the last bit of a pixel's colour is changed. The signal received by the eavesdropper does also depend on the frequency where the emanations are detected. The signal can be received on many frequencies at once and each frequency's signal differs in contrast and brightness related to a certain colour on the screen. Usually, the technique of smothering the RED signal with noise is not effective unless the power of the noise is sufficient to drive the eavesdropper's receiver into saturation and thus overwhelming the receiver input.

LED indicators on computer equipment can be a source of compromising optical emanations.[18] One such technique involves the monitoring of the lights on a dial-up modem. Almost all modems flash an LED to show activity, and it is common for the flashes to be directly taken from the data line. As such, a fast optical system can easily see the changes in the flickers from the data being transmitted down the wire.

Further, recent research[19] has shown it is possible to detect the radiation corresponding to a keypress event from not only wireless (radio) keyboards, but also from traditional wired keyboards, and even from laptop keyboards.

In 2014, researchers introduced ″AirHopper″, a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency signals.[20][21]

In 2015, "BitWhisper", a Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations was introduced. "BitWhisper" supports bidirectional communication and requires no additional dedicated peripheral hardware.[22][23]

Later in 2015, researchers introduced GSMem, a method for exfiltrating data from air-gapped computers over cellular frequencies. The transmission - generated by a standard internal bus - renders the computer into a small cellular transmitter antenna.[24][25]

In popular culture

  • In the television series Numb3rs, season 1 episode "Sacrifice", a wire connected to a high gain antenna was used to "read" from a computer monitor.
  • In the television series Spooks, season 4 episode "The Sting", a failed attempt to read information from a computer that has no network link is described.
  • In the novel Cryptonomicon by Neal Stephenson, characters use Van Eck phreaking to likewise read information from a computer monitor in a neighboring room.
  • In the television series Agents of S.H.I.E.L.D., season 1 episode "Ragtag", an office is scanned for digital signatures in the UHF spectrum.
  • In the video game Tom Clancy's Splinter Cell: Chaos Theory, part of the final mission involves spying on a meeting in a Tempest hardened war room. Throughout the entire Splinter Cell series, a laser microphone is used as well.

See also


  1. ^ Product Delivery Order Requirements Package Checklist (PDF), US Air Force 
  2. ^ TEMPEST Equipment Selection Process, NATO Information Assurance, 1981 
  3. ^ "How Old IsTEMPEST?". Retrieved 2015-05-31. 
  4. ^ [5] Archived December 23, 2013 at the Wayback Machine
  5. ^ a b c An Introduction to TEMPEST,, retrieved 2015-05-31 
  6. ^ a b N.S.A., TEMPEST: A Signal Problem (PDF), retrieved 2014-01-28 
  7. ^ Marquardt, P.; Verma, A.; Carter, H.; Traynor, P. (2011). "(sp)i Phone". Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. p. 551.  
  8. ^ "NACSIM 5000 Tempest Fundamentals". Retrieved 2015-05-31. 
  9. ^ "SST: TEMPEST Standards SDIP 27 Level A, Level B & AMSG 784, 720B, 788A". Retrieved 2015-05-31. 
  10. ^ Specification nsa no. 94-106 national security agency specification for shielded enclosures,, retrieved 2014-01-28 
  11. ^ N.S.A., NSTISSAM TEMPEST/2-95 RED/BLACK INSTALLATION,, retrieved 2014-01-28 
  12. ^ [6] Archived January 16, 2010 at the Wayback Machine
  13. ^ [7] Archived July 16, 2011 at the Wayback Machine
  14. ^ [8] Archived May 19, 2011 at the Wayback Machine
  15. ^ "TEMPEST Certification Program - NSA/CSS". Retrieved 2015-05-31. 
  16. ^ "A History of U.S. Communications Security (Volumes I and II)"; David G. Boak Lectures" (PDF). National Security Agency. 1973. p. 90. 
  17. ^  
  18. ^ J. Loughry and D. A. Umphress. Information Leakage from Optical Emanations (.pdf file), ACM Transactions on Information and System Security, Vol. 5, No. 3, August 2002, pp. 262-289
  19. ^ Vuagnoux, Martin; Pasini, Sylvain. "Compromising radiation emanations of wired keyboards". 
  20. ^ Guri, Mordechai; Kedma, Gabi; Kachlon, Assaf; Elovici, Yuval (November 2014). "AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies". arXiv (C) IEEE. 
  21. ^ Guri, Mordechai; Kedma, Gabi; Kachlon, Assaf; Elovici, Yuval (November 2014). "How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper". BGU Cyber Security Labs. 
  22. ^ Guri, Mordechai; Monitz, Matan; Mirski, Yisroel; Elovici, Yuval (April 2015). "BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations". arXiv (C) IEEE. 
  23. ^ Guri, Mordechai; Monitz, Matan; Mirski, Yisroel; Elovici, Yuval (March 2015). "BitWhisper: The Heat is on the Air-Gap". BGU Cyber Security Labs. 
  24. ^ Guri, Mordechai; Kachlon, Assaf; Hasson, Ofer; Kedma, Gabi; Mirsky, Yisroel; Elovici, Yuval (August 2015). "GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies". 24th USENIX Security Symposium (USENIX Security 15). 
  25. ^ Guri, Mordechai; Kachlon, Assaf; Hasson, Ofer; Kedma, Gabi; Mirsky, Yisroel; Monitz, Matan; Elovici, Yuval (July 2015). "GSMem Breaking The Air-Gap". Cyber Security Labs @ Ben Gurion University. 

External links

  • NSA Tempest endorsement program
  • The Complete, Unofficial Tempest Information Page (Original defunct. This is a mirror)
  • The Origin of TEMPEST on Cipher Machines and Cryptology
  • Kaiser RAS-515A Raster Analysis System
  • Tempest 101 by James M. Atkinson
  • Electromagnetic Eavesdropping Risks of Flat-Panel Displays (.pdf file)
  • Compromising emanations: eavesdropping risks of computer displays
  • Tempest for Eliza—a program that uses your computer monitor to send out AM radio signals. You can then hear computer generated music in your radio. You can also transmit MP3s using it.
  • TEMPEST and QinetiQ: electronic eavesdropping counter-measures
  • Tempest information, professional testing environment, and equipment modifications, done by GBS
  • TEMPEST systems and measurements, done by Eurotempest
  • Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations (.pdf file)
  • Publicly released version of NACSIM 5000
  • Tempest—Tempest - EMSEC Prevention of electronic eavesdropping, design engineering, manufacturing, HERF, EMP, and EMI-EMC Testing services, Shielding effectiveness testing.
  • NIST 800-59—NIST 800-59 - Guideline for Identifying an Information System as a National Security System. (.pdf file)
  • Information Leakage from Optical Emanations—journal article in ACM Transactions on Information and System Security, Vol. 5, No. 3, pp. 262–289 (2002).
  • A History of U.S. Communications Security (Volumes I and II); David G. Boak Lectures, National Security Agency, 1973 (partially redacted)
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.