<2> The Age-Old Threat of TEMPEST: How Vulnerable Are Computers to 80-Year-Old Spy Technique?
<3> A New Era of Espionage: Electromagnetic and Acoustic Leaks
The world of espionage has long been a cat-and-mouse game between spies and their targets, with each side constantly pushing the boundaries of what is possible. One technique that has been around for nearly 80 years is TEMPEST, a method of spying that involves intercepting electromagnetic and acoustic signals emitted by devices. This technique was once codenamed by the NSA, and it has raised concerns among lawmakers that it may still be a viable threat today.
<3> The History of TEMPEST
TEMPEST was first developed in the 1940s by the US military as a way to intercept communications from enemy devices. The technique involves using specialized equipment to detect and decode the electromagnetic signals emitted by devices such as computers, televisions, and radios. These signals can be used to reconstruct the information being displayed on the device, allowing spies to gather sensitive information without ever physically accessing the device.
<3> The NSA’s Involvement
The NSA has a long history of involvement with TEMPEST, and the agency has developed a
