Abstract

The explosion of telecommunication services has improved many folds the ability for people to disseminate information worldwide. New telephone, facsimile and computer communications have created opportunities totally revamp functioning and promote information interchange at a lower cost than ever before. By the sudden growth in the field of Information Technology today it becomes extensive usage in Functioning of Operations, Planning, and Material management. Maintenance & Repairs and even Training. However, just like every rose comes with a thorn, so does this technology, there are ways and means of monitoring information pinning information passing through these channels by very simple and inexpensive devices. On the other hand, there are also simple preventive measures that can be incorporated to limit the extent of surveillance. This paper attempts for the awareness of the dangers of inadvertent proliferation of IT and measures that can be taken to control leakage of sensitive information. The last few years have witnessed numerous advances in the field of data processing and communications, collectively referred to as Information Technology. It has transformed the way future combats are going to be fought and new concepts such as Information warfare have emerged. In this conflict information is the resource. The information technology equipment such as computers, modems, printers, networks, communication equipment including telephones, cordless/cellular phones, Fax machines, Satcoms, etc. will form the backbone of all our future activities - from Operations, Planning, Material management, Maintenance to even Training. Maintaining the security of sensitive information under such a scenario is an area that needs to be accorded top priority. Although advances in cryptographic technology are making communication links more secure. Most of this electronic data processing equipment makes extensive use of digital technology which is a rich source of unintended electromagnetic radiation in a wide band of the electromagnetic spectrum. This is due to the kind of signals they use to talk to each other -'square waves' with speeds up to hundreds of Megahertz and high switching frequencies. It is a well known fact that these unintended emissions not only disturb radio and television reception in the vicinity of the equipment but also leak information about the data being processed. This phenomenon constitutes a problem because remote reconstruction of signals is possible at considerable ranges using simple and inexpensive gadgets.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call