Tempest (codename) (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Tempest (codename)" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
1st place
1st place
5th place
5th place
low place
low place
11th place
8th place
69th place
59th place
7,043rd place
4,687th place
7,676th place
4,184th place
439th place
283rd place
940th place
907th place
low place
low place
low place
low place
low place
low place
low place
low place
2,092nd place
5,505th place
low place
low place
low place
low place
670th place
480th place
low place
low place
1,185th place
840th place
low place
low place
5,990th place
3,752nd place
9th place
13th place
18th place
17th place
low place
low place
3rd place
3rd place
786th place
558th place

acm.org (Global: 1,185th place; English: 840th place)

portal.acm.org

af.mil (Global: 439th place; English: 283rd place)

netcents.af.mil

  • Product Delivery Order Requirements Package Checklist (PDF), US Air Force, archived from the original (PDF) on 2014-12-29

applied-math.org (Global: low place; English: low place)

arxiv.org (Global: 69th place; English: 59th place)

books.google.com (Global: 3rd place; English: 3rd place)

bund.de (Global: 2,092nd place; English: 5,505th place)

bsi.bund.de

cam.ac.uk (Global: 670th place; English: 480th place)

cl.cam.ac.uk

cesg.gov.uk (Global: low place; English: low place)

cryptome.info (Global: low place; English: low place)

cryptome.org (Global: low place; English: low place)

cse-cst.gc.ca (Global: low place; English: low place)

doi.org (Global: 2nd place; English: 2nd place)

doi.org

dx.doi.org

eurecom.fr (Global: low place; English: low place)

s3.eurecom.fr

governmentattic.org (Global: 7,676th place; English: 4,184th place)

harvard.edu (Global: 18th place; English: 17th place)

ui.adsabs.harvard.edu

iad.gov (Global: low place; English: low place)

lasecepfl.ch (Global: low place; English: low place)

nato.int (Global: 940th place; English: 907th place)

ia.nato.int

nsa.gov (Global: 7,043rd place; English: 4,687th place)

  • N.S.A., TEMPEST: A Signal Problem (PDF), archived from the original (PDF) on 2013-09-18, retrieved 2014-01-28
  • Maneki, Sharon (8 January 2007). "Learning from the Enemy: The GUNMAN project" (PDF). Center for Cryptologic History, National Security Agency. Archived from the original (PDF) on 30 January 2019. Retrieved 30 January 2019. All of the implants were quite sophisticated. Each implant had a magnetometer that converted the mechanical energy of key strokes into local magnetic disturbances. The electronics package in the implant responded to these disturbances, categorized the underlying data, and transmitted the results to a nearby listening post. Data were transmitted via radio frequency. The implant was enabled by remote control.[...] the movement of the bails determined which character had been typed because each character had a unique binary movement corresponding to the bails. The magnetic energy picked up by the sensors in the bar was converted into a digital electrical signal. The signals were compressed into a four-bit frequency select word. The bug was able to store up to eight four-bit characters. When the buffer was full, a transmitter in the bar sent the information out to Soviet sensors.

sans.org (Global: low place; English: low place)

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

sst.ws (Global: low place; English: low place)

usenix.org (Global: 5,990th place; English: 3,752nd place)

blogs.usenix.org

web.archive.org (Global: 1st place; English: 1st place)

  • Product Delivery Order Requirements Package Checklist (PDF), US Air Force, archived from the original (PDF) on 2014-12-29
  • TEMPEST Equipment Selection Process, NATO Information Assurance, 1981, archived from the original on 2019-02-02, retrieved 2014-09-16
  • "Emission Security" (PDF). US Air Force. 14 April 2009. Archived from the original (PDF) on December 23, 2013.
  • N.S.A., TEMPEST: A Signal Problem (PDF), archived from the original (PDF) on 2013-09-18, retrieved 2014-01-28
  • "SST: TEMPEST Standards SDIP 27 Level A, Level B & AMSG 784, 720B, 788A". Sst.ws. Archived from the original on 2015-02-26. Retrieved 2015-05-31.
  • "The Directory of Infosec Assured Products" (PDF). CESG. October 2010. Archived from the original (PDF) on May 19, 2011.
  • Vuagnoux, Martin; Pasini, Sylvain. "Compromising radiation emanations of wired keyboards". Lasecwww.epfl.ch. Archived from the original on 2019-09-25. Retrieved 2008-10-29.
  • Maneki, Sharon (8 January 2007). "Learning from the Enemy: The GUNMAN project" (PDF). Center for Cryptologic History, National Security Agency. Archived from the original (PDF) on 30 January 2019. Retrieved 30 January 2019. All of the implants were quite sophisticated. Each implant had a magnetometer that converted the mechanical energy of key strokes into local magnetic disturbances. The electronics package in the implant responded to these disturbances, categorized the underlying data, and transmitted the results to a nearby listening post. Data were transmitted via radio frequency. The implant was enabled by remote control.[...] the movement of the bails determined which character had been typed because each character had a unique binary movement corresponding to the bails. The magnetic energy picked up by the sensors in the bar was converted into a digital electrical signal. The signals were compressed into a four-bit frequency select word. The bug was able to store up to eight four-bit characters. When the buffer was full, a transmitter in the bar sent the information out to Soviet sensors.

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org

youtube.com (Global: 9th place; English: 13th place)

zdnet.com (Global: 786th place; English: 558th place)