computer services venturacomputer services venturacomputer services venturacomputer services ventura
  • HOME
  • TESTIMONIALS
  • ABOUT
  • PORTFOLIO
    • Logos
    • Web and Social Media
    • Print Media
    • Business Media
    • Ads
    • Photography
    • Video
    • Tech Work
  • SERVICES
    • Creative Services
    • Smart Home
    • Technology Services
  • BLOG
  • CONTACT
  • Privacy Policy
  • Terms and Conditions
RFID Tracked Trash
March 7, 2019
Retail Theft : Shoplifting
March 18, 2019

TEMPEST

Did you know that there is a way to hack into any computer without even touching it? Using only commercially available equipment that can detect and interpret the radiation emitted by your computer, say from a simple CRT monitor, someone can spy on you from quite a distance. Technologies of this type have been termed TEMPEST which refers to equipment that can read the electromagnetic emanations from computing devices in order to extract data from them.

The term TEMPEST (not an acronym) was coined somewhere around the 1970s as a codename for an NSA operation to secure electronic communications equipment from potential eavesdroppers and for their ability to intercept and interpret electronic signals from other sources. Compromising emanations consist of electrical, mechanical and acoustical (either intentionally or not) by any number of sources; interception ranges vary depending on the source of the information.

So many devices can be used in this manner. For example, normal computer keyboards make slightly different noises when each key is pressed. These differences are generally unidentifiable but with the right equipment it is possible to log key strokes audibly to steal the information being typed. Even the high-frequency noises that your computer’s CPU makes includes information about the instructions you have just executed.

It’s just amazing what someone can use to steal important information now-a-days!

~TeCHS

TeCHS

www.ezDigitalLife.com

Your Digital Life Simplified!

Share
0

Related posts

January 3, 2021

10 Quick Cybersecurity Tips to Start the New Year


Read more
December 4, 2020

The Top 12 Holiday Scams to Avoid This Season


Read more
2F Authentication
August 11, 2020

What is Multifactor Authentication and why do you need to use it?


Read more

(800) 669-2022

Need a hand with your tech?

Give us a call!

GET OUR NEWSLETTER!

Want awesome tech tips & tricks sent directly to your inbox? Get our newsletter!

* indicates required





RECENT ARTICLES

  • 10 Quick Cybersecurity Tips to Start the New Year
  • The Top 12 Holiday Scams to Avoid This Season
  • Shop our Handmade Items
  • What is Multifactor Authentication and why do you need to use it?
  • How to Create a Secure Password
© 2021 TeCHS. All Rights Reserved.