Since tarmac info apparently discovered via "Tempest," thought I'd share this… Apologies for taking up space if already discussed!
HISTORY OF TEMPEST & CONNECTION TO SRI INTERNATIONAL?
The word "TEMPEST" is handwritten on p 27 of a 1981 report on remote viewing ("DOG FLAME GRILL," released in 2007). It's next to a section indicating SRI International was tasked with developing a database management system for easy access & manipulation of RV data and RV target management.
https:// web.archive.org/web/20170124012147/https:// www.cia.gov/library/readingroom/docs/CIA-RDP96-00788R001300250001-1.pdf
What's SRI INTERNATIONAL'S current connection with TEMPEST attacks? (as well as "FLOODING" and "SEISMIC" attacks referred to in Wired article below) - MORE DIGGING?
TEMPEST HISTORY: Bell researchers discovered as early as 1943 that digital equipment leaked information… U.S. developed & refined this science in an attempt to spy on Soviets during Cold War. Strict standards for shielding sensitive buildings/equipment were issued and those rules are now known to government agencies and defense contractors as TEMPEST. They apply to everything from computer monitors to encrypted cell phones that handle classified information.
EXAMPLES OF USE: CIA (1951) told NSA that they played with the Bell teletype machines and found they could read plain text from a quarter mile down the signal line. Japanese (in 1962) attempted just that by aiming antenna on top of a hospital at a U.S. crypto center. Russians did the same – planting not just the famous 40 microphones in the U.S.'s Moscow embassy, but also seeding mesh antenna in the concrete ceiling, whose only purpose could have been stealing leaked energy pulses.
HOW IT WORKS: "The principal of the TEMPEST attack is deceptively simple. Any machine that processes information (photocopier, electric typewriter, laptop) has parts inside that emit electromagnetic & acoustic energy that radiates out, as if they were tiny radio stations. The waves can even be picked up and amplified by nearby power lines, telephone cables and even water pipes, carrying them even further. A sophisticated attacker can capture the right frequency, analyze the data for patterns and recover the raw information the devices were processing or even the private encryption keys inside the machine… These days we know that computer monitors, audio cables and other information machines -actually emit sensitive info."
"FLOODING" & "SEISMIC" - Two related types of "attacks" not declassified as of 2008. The NSA did not declassify the entire paper however, leaving the description of two separate, but apparently related, types of attacks enticingly redacted. One attack is called "Flooding" and the other "Seismic."
Wired 2008 article: "DECLASSIFIED NSA DOCUMENT REVEALS THE SECRET HISTORY OF TEMPEST" https:// archive.is/lv6qc
Declassified NSA doc: "Tempest: A Signal Problem"
https:// www.nsa.gov/news-features/declassified-documents/cryptologic-spectrum/assets/files/tempest.pdf
https:// archive.is/Cerop