Skip to main content
  • 92 Accesses

The term TEMPEST was initially a US military codeword for a secret research project that originated in the late 1950s and studied compromising emanations. Later, it became the name of the resulting family of (still classified) US and NATO protection standards and test procedures for equipment and facilities that are specially shielded against the unwanted broadcast of sensitive information via spurious electromagnetic, acoustic and other emissions from information processing equipment. The term is sometimes also used as a synonym for compromising emanations and related protective measures in general.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Russel, D. and G.T. Gangemi (1991). Computer Security Basics. O'Reilly & Associates, Sebastopol, CA, Chapter 10: TEMPEST. ISBN 0-937175-71-4.

    Google Scholar 

  2. McNamara, Joel (1996–2002). “The complete, unofficial TEMPEST information page.” Internet Web page, http://www.eskimo.com/~joelm/tempest.html

  3. NACSIM 5000. (1982). “TEMPEST fundamentals.” National Security Agency, Fort George G. Meade, MD, Partially declassified transcript: http://cryptome.org/nacsim-5000.htm

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Kuhn, M. (2005). Tempest. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_427

Download citation

Publish with us

Policies and ethics