The impact of ‘Tempest’ on Anglo-American communications security and intelligence, 1943–1970

  title={The impact of ‘Tempest’ on Anglo-American communications security and intelligence, 1943–1970},
  author={David Easter},
  journal={Intelligence and National Security},
  pages={1 - 16}
  • D. Easter
  • Published 26 July 2020
  • Computer Science
  • Intelligence and National Security
ABSTRACT This article examines the impact of the discovery by Britain and the United States in the late 1940s/early 1950s that cipher machines produced compromising emissions, a phenomenon which became known as Tempest. The British and Americans were forced to develop security measures to protect their encrypted communications but the Soviet Union was still able to exploit Tempest emissions from cipher machines in Western embassies in Moscow and read their diplomatic traffic. At the same time… 
1 Citations
  • Security Engineering
  • 2020


Protecting secrets: British diplomatic cipher machines in the early Cold War, 1945–1970
  • D. Easter
  • History
    Intelligence and National Security
  • 2018
ABSTRACT This article examines how effectively Britain secured its diplomatic communications against hostile decryption during the early Cold War. It shows that between 1945 and 1970 the Foreign
TEMPEST and the Bank of England
ABSTRACT Since the major British banks first purchased computers in the 1960s, they have been concerned with the security challenges that these machines presented. One of the most potent risks was
Soviet Bloc and Western Bugging of Opponents’ Diplomatic Premises During the Early Cold War
This article examines Soviet Bloc and Western bugging of their opponents’ diplomatic premises in the early Cold War, from 1945 to the late 1960s. It explains the process of audio surveillance,
Whitehall wiring: The Communications-Electronics Security Group and the struggle for secure speech
The development and growth of Britain's communications security establishment as an unknown fourth British secret service during the 1950s and 1960s was the antecedent of the Communications-Electronics Security Group (CESG), the UK's current National Technical Authority.
Electronic Emissions Security: Danger in the Air
Most organizations have measures to protect their network infrastructure from intruders, but there is another type of wireless attack on organizational resources that also poses a significant vulnerability, electromagnetic radiation from unprotected systems and networks.
Division D: Operation Rubicon and the CIA’s secret SIGINT empire
Exploring CIA’s historic interest in communications intelligence, it uncovers ways they controlled a significant proportion of the world's communications systems well into the twenty-first century.
The Mitrokhin Archive: the KGB in Europe and the West
The Mitrokhin archive from Lenin's Cheka to Stalin's OGPU the great illegals the magnificent five terror war the grand alliance victory from war to Cold War the main adversary - part 1, North
Battleground Berlin: CIA vs. KGB in the Cold War
This book is the definitive insiders' account of the espionage warfare in Berlin from 1945 to the construction of the Berlin Wall in 1961. In an unprecedented collaboration, CIA and KGB intelligence
Security Engineering: a Guide to Building Dependable Distributed Systems Banking and Bookkeeping
Banking systems include the back-end bookkeeping systems that record customers' account details and transaction processing systems such as cash machine networks and high-value interbank money transfer systems that feed them with data.
Tower of Secrets: A Real Life Spy Thriller
Travel to the inner sanctum of the KGB for the dramatic story of a top-level KGB agent's daring escape, with his wife and young child, from the Soviet Union.