The impact of ‘Tempest’ on Anglo-American communications security and intelligence, 1943–1970
@article{Easter2020TheIO, title={The impact of ‘Tempest’ on Anglo-American communications security and intelligence, 1943–1970}, author={David Easter}, journal={Intelligence and National Security}, year={2020}, volume={36}, pages={1 - 16} }
ABSTRACT This article examines the impact of the discovery by Britain and the United States in the late 1940s/early 1950s that cipher machines produced compromising emissions, a phenomenon which became known as Tempest. The British and Americans were forced to develop security measures to protect their encrypted communications but the Soviet Union was still able to exploit Tempest emissions from cipher machines in Western embassies in Moscow and read their diplomatic traffic. At the same time…
One Citation
References
SHOWING 1-10 OF 86 REFERENCES
Protecting secrets: British diplomatic cipher machines in the early Cold War, 1945–1970
- HistoryIntelligence and National Security
- 2018
ABSTRACT This article examines how effectively Britain secured its diplomatic communications against hostile decryption during the early Cold War. It shows that between 1945 and 1970 the Foreign…
TEMPEST and the Bank of England
- HistoryIntelligence and National Security
- 2018
ABSTRACT Since the major British banks first purchased computers in the 1960s, they have been concerned with the security challenges that these machines presented. One of the most potent risks was…
Soviet Bloc and Western Bugging of Opponents’ Diplomatic Premises During the Early Cold War
- History
- 2016
This article examines Soviet Bloc and Western bugging of their opponents’ diplomatic premises in the early Cold War, from 1945 to the late 1960s. It explains the process of audio surveillance,…
Whitehall wiring: The Communications-Electronics Security Group and the struggle for secure speech
- Computer Science
- 2013
The development and growth of Britain's communications security establishment as an unknown fourth British secret service during the 1950s and 1960s was the antecedent of the Communications-Electronics Security Group (CESG), the UK's current National Technical Authority.
Electronic Emissions Security: Danger in the Air
- Computer ScienceInf. Syst. Manag.
- 2007
Most organizations have measures to protect their network infrastructure from intruders, but there is another type of wireless attack on organizational resources that also poses a significant vulnerability, electromagnetic radiation from unprotected systems and networks.
Division D: Operation Rubicon and the CIA’s secret SIGINT empire
- Computer Science
- 2020
Exploring CIA’s historic interest in communications intelligence, it uncovers ways they controlled a significant proportion of the world's communications systems well into the twenty-first century.
The Mitrokhin Archive: the KGB in Europe and the West
- History
- 2000
The Mitrokhin archive from Lenin's Cheka to Stalin's OGPU the great illegals the magnificent five terror war the grand alliance victory from war to Cold War the main adversary - part 1, North…
Battleground Berlin: CIA vs. KGB in the Cold War
- History
- 1997
This book is the definitive insiders' account of the espionage warfare in Berlin from 1945 to the construction of the Berlin Wall in 1961. In an unprecedented collaboration, CIA and KGB intelligence…
Security Engineering: a Guide to Building Dependable Distributed Systems Banking and Bookkeeping
- Computer Science
Banking systems include the back-end bookkeeping systems that record customers' account details and transaction processing systems such as cash machine networks and high-value interbank money transfer systems that feed them with data.
Tower of Secrets: A Real Life Spy Thriller
- Physics
- 1993
Travel to the inner sanctum of the KGB for the dramatic story of a top-level KGB agent's daring escape, with his wife and young child, from the Soviet Union.