The term TEMPEST was initially a US military codeword for a secret research project that originated in the late 1950s and studied compromising emanations. Later, it became the name of the resulting family of (still classified) US and NATO protection standards and test procedures for equipment and facilities that are specially shielded against the unwanted broadcast of sensitive information via spurious electromagnetic, acoustic and other emissions from information processing equipment. The term is sometimes also used as a synonym for compromising emanations and related protective measures in general.
- Russel, D. and G.T. Gangemi (1991). Computer Security Basics. O'Reilly & Associates, Sebastopol, CA, Chapter 10: TEMPEST. ISBN 0-937175-71-4.Google Scholar
- McNamara, Joel (1996–2002). “The complete, unofficial TEMPEST information page.” Internet Web page, http://www.eskimo.com/~joelm/tempest.html
- NACSIM 5000. (1982). “TEMPEST fundamentals.” National Security Agency, Fort George G. Meade, MD, Partially declassified transcript: http://cryptome.org/nacsim-5000.htm