CONTACT US

PRODUCTS-- SERVICES-- FACILITIES.-- BOOKS-- COURSES-- SOFTWARE


[Logo: Owl, perched on the letter T, and superimposed on the globe.]
TEMPEST INC.

(703) "TEMPEST" - 703.836.7378

info-2014
@
tempest-inc.com


*** OUR 29th YEAR IN BUSINESS: 1985 - 2014 ***

___________________________________________________

Updated: OCTOBER 27, 2014

We build electromagnetically hardened (HEMP) and TEMPEST secure communication devices that meet the most stringent US Department of Defense (DoD) and NATO requirements. We have done this successfully for over twenty years.

PROBLEMS AND SOLUTIONS IN WIRELESS COMMUNICATIONS AND ELECTROMAGNETIC COMPATIBILITY

How to make RF computations quickly and accurately without a calculator.

THE SHIELDED ENCLOSURE HANDBOOK

The definitive guide for the buyer, builder, tester and user of electromagnetically shielded enclosures.

ELECTROMAGNETIC COMPATIBILITY SOFTWARE

* FCC and European Community (CE MARK) Electromagnetic Compatibility Testing, Acoustics.
* High Energy Electromagnetic Pulse ( HEMP ) hardening.
* Electromagnetic Compatibility TEST CAPABILITY TO 300 GIGAHERTZ
* FCC Listed Electromagnetic Compatibility .testing of cybersecurity intelligence surveillance and reconnaisance ISR systems . Facility
* iNARTE Certified
* Our Acoustic testing of cybersecurity intelligence surveillance and reconnaisance ISR systems . Capability meets all of the stringent requirements of MIL-STD-1474D

* Software verification testing.

TEMPEST Security / EMSEC

TEMPEST Security and Electromagnetic Compatibility Products.

TEMPEST Security and Electromagnetic Compatibility Services.

TEMPEST Security and Electromagnetic Compatibility Courses.

TEMPEST Security and Electromagnetic Compatibility Test Facilities.

Model NA-200/2G ANTENNA, 200 MHz - 2 GHz: compact, rugged, and ideal for on-site Electromagnetic Compatibility testing of cybersecurity intelligence surveillance and reconnaisance ISR systems .

TEMPEST INC. offers TEMPEST security / EMSEC and Electromagnetic Compatibility testing of cybersecurity intelligence surveillance and reconnaisance ISR systems . and design services in accordance with current US Department of Defense (DoD) Military, FCC, Australian & European Community Requirements.

Please note: Our TEMPEST security engineering services are only available to the US Government and its contractors. others require US Government approval in advance.

We offer:

1. Fast, effective service by U.S. Department of Defense (DoD) Certified TEMPEST Professionals holding the highest level of certification,
Certified Electromagnetic Compatibility Engineers, and
Certified Electrostatic Discharge Control Engineers.

2. Cursory TEMPEST security and Electromagnetic Compatibility testing, with proven expertise and facilities to find and correct deficiencies quickly.

3. Effective TEMPEST security and Electromagnetic Compatibility design of cybersecurity intelligence surveillance and reconnaisance ISR systems . modifications when needed.

4. Certification testing of cybersecurity intelligence surveillance and reconnaisance ISR systems . in accordance with all U.S. TEMPEST security standards, US Department of Defense (DoD) Military Electromagnetic Compatibility (EMC) Standards, and the civilian EMC standards of:
The US Federal Communications Commission ( FCC ), and
European Community Directive 89/336/EEC ( CE Mark ),
The Australian Communications and Media Authority ( ACA / ACMA ) " C-tick mark."

5. Cooperative arrangements with European Electromagnetic Compatibility Laboratories ("Competent Bodies")

6. Federal Communications Commission (FCC) listed Electromagnetic Compatibility testing of cybersecurity intelligence surveillance and reconnaisance ISR systems . facilities.

7. Shielding effectiveness testing.

8. Electromagnetically shielded enclosures.

********************************


| TEMPEST Security Engineering | TEMPEST Security design of cybersecurity intelligence surveillance and reconnaisance ISR systems . and Manufacturing |
| TEMPEST Security Testing | TEMPEST Security Training |
Our TEMPEST security engineering services are only available to the US Government and its contractors. others require US Government approval in advance.

********************************

This site has been made fully accessible to the handicapped, in accordance with Section 508 of Title 29 of the United States Code, Paragraph 794d, ( The Rehabilitation Act.) see http://www.Section508.gov ]

site map

********************************

Mission Statement.

Taking the risk out of TEMPEST security. tm. since 1985.

TEMPEST security and electromagnetic compatibility deal with electromagnetic fields, things that we cannot see, hear, feel, taste or smell. Lacking an intuitive reality check, TEMPEST security and electromagnetic compatibility engineers assume an extra degree of risk that does not exist when, for example, erecting a house or assembling an automobile.

A skeptical reader might ask why TEMPEST security and electromagnetic compatibility are so unusual, when ordinary radio communications also deal with signals that you cannot sense naturally. One important difference is that in the field of TEMPEST security, as well as in electromagnetic compatibility the phenomena that you are trying to control occur unintentionally.

If two amateur radio operators try to make contact with each other halfway around the world, they enjoy certain advantages. Each knows that the other's signal is being produced on purpose, and that it must meet certain rules regarding its frequency, power, and other characteristics. TEMPEST security and electromagnetic compatibility engineers don't have these advantages. This is why their risks are greater.

The Industrial Sides of TEMPEST security and electromagnetic compatibility.

The extra risks in TEMPEST security and electromagnetic compatibility are not borne solely by the engineers that work in these fields. To see this, let's examine a business from top to bottom:

Overview.
When someone uses the term " TEMPEST products " most people think about TEMPEST computers, including TEMPEST desktops, TEMPEST notebooks, TEMPEST laptops and TEMPEST all-in-ones, among other things. They also include TEMPEST printers, TEMPEST video displays, TEMPEST video display systems, TEMPEST scanners, and other TEMPEST peripherals, such as TEMPEST external disk drives ( highly recommended when you are assembling TEMPEST systems ) TEMPEST keyboards, and special items lik TEMPEST KVM switches, TEMPEST secure voice switchwes , TEMPEST secure voice systems, and TEMPEST crypto interfaces. Because of the wide variety of TEMPEST products that can go to make up TEMPEST systems, so-called TEMPEST cabinets or other so-called TEMPEST enclosures must also be used. Strictly speaking, the terms " TEMPEST cabinets " and "TEMPEST enclosures " are actually misnomers. this is because cabinets and other enclosures, by themselves, do not process any information. However, electromagnetically shielded cabinets and other electromagnetically shielded enclosures are often needed to complete the assembly of TEMPEST secure systems.

When considering the design , manufacturing and long term support of TEMPEST computers, such as TEMPEST desktops, TEMPEST notebooks as well as the newer TEMPEST laptops and TEMPEST all-in-ones, besides traditional issues like security, safety, reliability, etc., the designer must now consider obsolescence. this factor is not as important with TEMPEST printers, TEMPEST scanners, TEMPEST video displays, TEMPEST video display systems, TEMPEST external disk drives and TEMPEST peripherals like TEMPEST keyboards, TEMPEST KVM switches, TEMPEST secure voice switches , TEMPEST secure voice systems, and TEMPEST crypto interfaces. The following are some of the specific problems that affect the above components of TEMPEST secure sytems:

TEMPEST desktops:

TEMPEST desktops have been traditionally regarded as easy to customize, repair and upgrade, but this is no longer always the case. More and more functions are being made part of the motherboard.

TEMPEST notebooks:

TEMPEST notebooks are small, light, and easily stashed in a safe. However, TEMPEST notebooks are harder to repair and customize, and TEMPEST notebooks are inherently more fragile than TEMPEST desktops. TEMPEST notebooks are more easily misplaced or stolen than TEMPEST desktops.

TEMPEST laptops:

TEMPEST laptops are a further step down the road to miniaturization from TEMPEST desktops and TEMPEST notebooks. TEMPEST laptops are still more easily misplaced or stolen than TEMPEST desktops and TEMPEST notebooks. TEMPEST laptops are even harder to repair and customize TEMPEST desktops and TEMPEST notebooks, and TEMPEST laptops are inherently more fragile than TEMPEST desktops and TEMPEST notebooks.

TEMPEST all-in-ones:

TEMPEST all-in-ones are the latest step down the road to miniaturization that started with TEMPEST desktops, went to TEMPEST notebooks to TEMPEST laptops Although TEMPEST all-in-ones are somewhat larger than TEMPEST laptops, TEMPEST all-in-ones have the advantage of having all the TEMPEST peripherals, including the TEMPEST keyboard and TEMPEST touchpad, contained in one single unit. TEMPEST all-in-ones are not as easily misplaced or stolen than TEMPEST laptos, but in our opinion the repair and upgrade of TEMPEST all-in-ones is more difficult than that of TEMPEST notebooks, TEMPEST laptops, and TEMPEST desktops.

TEMPEST printers:

TEMPEST printers Are a good example of the growing divergence between the needs of the commercial users and the needs of the TEMPEST industry. Many printers are now designed to connect wirelessly. This makes the design, repair and upgrade of TEMPEST printers more difficult. Unfortunately, this si a growing trend.

********TO BE CONTINUED**********

TEMPEST scanners,

TEMPEST monitors:

TEMPEST video displays:

TEMPEST video display systems:

TEMPEST external disk drives:

TEMPEST peripherals:

TEMPEST keyboards:

TEMPEST KVM switches,

TEMPEST secure voice switches:

TEMPEST secure voice systems:

TEMPEST crypto interfaces:

The investors.

If you invest in a company that builds a certain product, and that product turns out to have a TEMPEST security deficiency or an electromagnetic interference problem, you could lose money. If the product has to be recalled and modified, this could cause the company to have a bad quarter or a bad year. If the problem is serious enough, it could affect the firm's reputation, future sales, and even its survival.

The management.

If you are an officer or an executive with the firm that had an unexpected TEMPEST security or electromagnetic emissions or susceptibility problem, you could suddenly find your position or your career in jeopardy. The key word is "unexpected." No one plans to have a TEMPEST security or electromagnetic interference problem. Since these phenomena are also invisible, etc. they can catch even the most competent and responsible people by surprise.

The Engineers.

TEMPEST security and electromagnetic interference problems can present both a risk and an opportunity for a firm's TEMPEST security engineers. These risks are due to human nature, coupled with the fact that TEMPEST security problems and electromagnetic interference problems cannot be seen, heard, felt, etc. The risks are twofold:

Risk #1: Preventing a TEMPEST security or electromagnetic interference problem.

If an engineer identifies a potential TEMPEST security or electromagnetic compatibility problem early in the design of cybersecurity intelligence surveillance and reconnaisance ISR systems . phase, he or she runs the risk of being accused of adding to the size, weight, and cost of a product merely to address a problem that some would consider to be "imaginary."

Risk #2: NOT preventing a TEMPEST security problem or an electromagnetic interference problem.

If an engineer fails to prevent a TEMPEST security problem or an electromagnetic compatibility problem, he or she will be the first to be blamed for the losses that the company suffers. This may seem fair, but as we will see below, TEMPEST security problems and electromagnetic compatibility problems sometimes may not be the design of cybersecurity intelligence surveillance and reconnaisance ISR systems . engineer's fault at all.

The opportunity.

Making a big problem go away can really make a person shine in a big organization. An engineer that solves a serious TEMPEST security problem or electromagnetic interference problem quickly, effectively, and economically is a hero indeed. He or she may actually get more recognition than an outstanding designer that goes quietly along for many years preventing electromagnetic interference problems or TEMPEST security deficiencies in the first place. This may be unfair, but it often happens. It is human nature, and it comes from the fact that TEMPEST security phenomena and electromagnetic interference problems are invisible, unintentional, and unexpected.

The technicians.

Along with the engineers, technicians share the blame and the glory albeit to a lesser extent. It is hard to blame a technician for a faulty design, although it has been done. On the other hand, technicians rarely get the credit they deserve for eliminating, or helping to eliminate, a TEMPEST security deficiency or an electromagnetic interference problem.

The assemblers.

Even assemblers can sometimes be blamed for a TEMPEST security problem or an electromagnetic interference problem. This happens when the manufacturing department makes what appears to be a minor change in an engineer's design. The product may be attractive and appear to work well, yet still have a TEMPEST security or electromagnetic compatibility flaw. Even if they avoid blame, assemblers are usually the first to lose their jobs when a firm finds itself in financial trouble. Their risks are substantial. On the positive side, the assemblers are usually among the first to find new jobs, too.

The Customer.

US Department of Defense ( DoD ) or other Government buyers risk their careers if a product or service that they select is inadequate. The deficiency might not even have anything to do with TEMPEST security or with electromagnetic compatibility. In order to meet TEMPEST requirements or electromagnetic compatibility specifications, the product might turn out to be too large, too heavy, not rugged enough, or simply delivered too late. None of these failings will endear the buyer to his or her commanding officer or Department of Defense ( DoD )supervisor. The risk of having any of these deficiencies appear is increased because TEMPEST signals and electromagnetic compatibility problems (a) are unexpected, and (b) usually cannot be spotted by the buyer without special skills and instruments.

The end user.
For the end user, a faulty device can lead to a failed mission. This can spell the end of a career, or worse. While the same can be said of any problem that occurs with military or DoD equipment, TEMPEST security deficiencies and electromagnetic compatibility issues are different. For example, if a military vehicle has a bad transmission, the user can often spot the problem on a test drive. It takes an expert with special equipment to spot a TEMPEST security problem, or an electromagnetic compatibility problem.

Taking the Risk out of TEMPEST security tm. since 1985.

Since its inception, TEMPEST INC. has recognized the extra risks that are involved in building TEMPEST security products and in providing TEMPEST security engineering services. Our goal has been to eliminate these risks for our Department of Defense ( DoD ) and other customers as much as possible. We do this by using proprietary design of cybersecurity intelligence surveillance and reconnaisance ISR systems . and testing of cybersecurity intelligence surveillance and reconnaisance ISR systems . techniques, and by educating our customers about the risks and related issues.

TEMPEST Products.

The term " TEMPEST Products " Is an unofficial term. To the best of TEMPEST INC.'s knowledge, there is no official U.S. Government document that defines the term " TEMPEST Products ". Nevertheless, the term TEMPEST Products has come to be sometimes used to refer to devices that claim to be free of TEMPEST problems or claim to comply with one or more TEMPEST security standards. Unfortunately, the fact that " TEMPEST Products " has no official definition has led to quite a bit of misunderstanding and errors.

For this reason we will try to clear up some of the misconceptions that arise from the use of the terms such as " TEMPEST products " , " TEMPEST Monitors " , " TEMPEST printers " , "TEMPEST computers " , " TEMPEST Fax " , " TEMPEST keyboards ", " TEMPEST scanners " , " TEMPEST ethernet " , "TEMPEST Video telecommunication systems " , " TEMPEST Secure systems " , and other " TEMPEST products " .

Please note: the information that we provide here regarding the term " TEMPEST Products " only pertains to the term "TEMPEST Products " as it is used < Copyright 2013 by TEMPEST INC. >in the United States. The term "TEMPEST Products " , or its translation may have different meanings in other countries. This only adds to the confusion regarding the term "TEMPEST Products " .

As popularly used, " TEMPEST Products " can include devices such as the following:

" TEMPEST monitors " : the term TEMPEST monitors is often used to refer to computer monitors that claim to have no known TEMPEST problems or claim to meet one or more TEMPEST security standards. However the term TEMPEST monitors is also used to refer to computer monitors that have been specially designed to that claim to meet certain requirements regarding the control of emissions that can produce electromagnetic interference. TEMPEST monitors can also be used to refer to computer monitors that claim to have been designed to have a low level of suceptibility to electromagnetc interference.


" TEMPEST computers " : the term TEMPEST computers is also often used to refer to computers that claim to meet one or more TEMPEST security standards or that claim to produce no TEMPEST signals. However the term TEMPEST computers is also used to refer to computers that claim to have been specially designed to reduce the electromagnetic emissions that can produce (Copyright 2013 by TEMPEST INC. ) electromagnetic interference (EMI). TEMPEST computers can also be used to refer to computers that have been designed to sustain electromagnetic interference without malfunctioning.


" TEMPEST scanners " : the term TEMPEST ethernet can be found to refer to ethernet that meet one or more TEMPEST security standards. Again, the term TEMPEST ethernet is also used to refer to ethernet that requirements regarding the control of their emissions and susceptibility to electromagnetic interference (EMI).


" TEMPEST printers " : the term TEMPEST printers is often used to refer to printers that meet or claim to meet one or more TEMPEST security standards. However the term TEMPEST printers is also used to refer to computer printers that have been specially designed to meet certain requirements regarding the control of emissions that can produce electromagnetic interference. TEMPEST printers can also be used to refer to computer printers that have been designed to have a lowlevel of suceptibility to electromagnetc interference.


" TEMPEST Fax " : the term TEMPEST fax can be found referring to fax machines that meet one or more TEMPEST security standards. The term TEMPEST fax is rarely, (Copyright 2013 by TEMPEST INC. ) but sometmes, used to refer to fax machines with reduced emissions of electromagnetic interference (EMI) and/or reduced suceptibility to electromagnetc interference (EMI).


" TEMPEST ethernet " : the term TEMPEST ethernet can mean ethernet links that comply with certain TEMPEST security standards. However the term TEMPEST ethernet is hardly ever used (Copyright 2013 by TEMPEST INC. ) to refer to ethernet links that have been hardened against electromagnetic interference.


" TEMPEST copiers " : Copiers used to be traditionally immune to TEMPEST or electromagnetic interference problems, but now this is not always true any more. For this reason, the unofficial term TEMPEST copiers can be found referring to copiers that claim to be free of TEMPEST problems or claim to meet meet one or more TEMPEST security standards, or electromagnetic interference (EMI) requirements.

TEMPEST systems. Like the term " TEMPEST Products, " there is no official US government definition of TEMPEST Systems either. However, the term " TEMPEST systems " has popularly been used to refer to another class of TEMPEST Products. Instead of referring to individual TEMPEST Products, such as TEMPEST computers, TEMPEST monitors, TEMPEST keyboards, TEMPEST printers, aand other TEMPEST devices individually, TEMPEST systems refer to are entire sets of TEMPEST Products that individually and together meet or claim to meet some TEMPEST security standard.

Confusing types of TEMPEST products.

Some devices that are described as TEMPEST Products lead to confusion because, for technical reasons, there is some doubt about whether or not there exists any official TEMPEST standard that applies to them. Included in this category are TEMPEST trackballs and TEMPEST mice, and unfortunately, TEMPEST switches, which will be discussed below.

Unintentionally Confusing uses of the term " TEMPEST Products ":

TEMPEST racks: There is no official US government definition of what constitutes a TEMPEST rack. However, some electromagnetically shielded racks, in combination with other devices that also have come to be popularly called TEMPEST products, can sometimes be used to produce equipment with some TEMPEST security features.

TEMPEST cabinets: There is also no official US government definition of what constitutes a TEMPEST cabinet. Still, some electromagnetically shielded cabinets, also in combination with other devices that have come to be popularly called TEMPEST products, can be used to produce " TEMPEST products " i.e. equipment with adequate TEMPEST security features.

TEMPEST cables: Simlarly, the US government does not define of what constitutes a TEMPEST cable, although some (but not all) electromagneticaly shielded cables, in conjunction with other popularly called TEMPEST products, can be used to produce TEMPEST products: i.e. products with acceptable TEMPEST security features.

TEMPEST filters.

When can ordinary emc filters be considered TEMPEST products or parts of TEMPEST products?

Occasionally, ordinary electromagnetic interference filters can be used in a particular application, to produce TEMPEST products. When this happens, the filter manufacturers sometimes advertise these filters as being TEMPEST products themselves. This is perfectly legal and not intentionally misleading, because there is no official definition of the term TEMPEST products. Engineers who design TEMPEST products must design their tempest products with care, and beware of easy solutions..

TEMPEST connectors.

When designing tempest products, perhaps no other devices give rise to as much confusion as do connectors. Engineers who design TEMPEST products have wide varieties of connectors from which to select. This can be both a blessing and a curse. Besides their suitability for use in TEMPEST PRODUCTS , Designers of TEMPEST products must consider their source reliability, quality control, availability,

Are TEMPEST rooms considered TEMPEST PRODUCTS?

Electromagnetically shielded rooms are sometimes called "TEMPEST Rooms". These are not really TEMPEST products. TEMPEST cabinets, TEMPEST enclosures, TEMPEST cables, TEMPEST filters, TEMPEST connectors, TEMPEST rooms, TEMPEST attenuators, TEMPEST gaskets, TEMPEST shields, TEMPEST vents, TEMPEST inductors, TEMPEST resistors, TEMPEST capacitors, TEMPEST transformers, TEMPEST latches, and even TEMPEST pouches and TEMPEST tents.

TEMPEST Test techniques and TEMPEST security design of cybersecurity intelligence surveillance and reconnaisance ISR systems . Techniques.

TEMPEST Test techniques and TEMPEST security design of cybersecurity intelligence surveillance and reconnaisance ISR systems . Techniques are discussed in our TEMPEST education and TEMPEST security training courses, and they will not be dicussed here. Please note that while our TEMPEST security courses provide a lot of valuable TEMPEST security information, some of which is available nowhere else, they do not cover any of our proprietary techniques.

Our TEMPEST Courses: TEMPEST Training leads to TEMPEST security.

At TEMPEST INC. we have found that a well-informed client makes the best customer. and that robust, reliable TEMPEST security is best achieved by starting with TEMPEST courses that provide practical and effective TEMPEST training. For this reason TEMPEST INC. has always provided TEMPEST training courses to US citizens with:
1) U.S. Government verified security clearances and
2) the verified need to know the technical details of TEMPEST security.

Our TEMPEST training and our TEMPEST courses are available to anyone who is resposible for TEMPEST security and meets the above criteria. We believe that our interests are ultimately best served by having knowledgeable customers and skilled, knowledgeable people in both the government and the TEMPEST security industry, even among our competitors.

Why does TEMPEST INC. provide TEMPEST training and TEMPEST courses to its competitors?

Since 1985, TEMPEST INC. has provided effective, economical TEMPEST courses and other types of formal TEMPEST training and informal TEMPEST training , (including one-on-one TEMPEST training and hands on TEMPEST training ) to all members of the TEMPEST security industry. We believe that it is good business to help ensure that the United States maintains a high level of TEMPEST security. A credible, effective TEMPEST security program improves the business environment for all of us who participate in the TEMPEST security industry.

Technical TEMPEST training and non-technical TEMPEST training courses.

You don't have to be an engineer to be involved in the TEMPEST security industry. Some of our TEMPEST training courses are specifically designed for senior executives and other decision makers in business and industry who need to understand the nature of the TEMPEST security threat, and how to address it.

Technical TEMPEST training.

For over 28 years, TEMPEST INC. has helped many TEMPEST engineers and TEMPEST technicians pass the challenging and technically detailed examinations that are required to become a Certified TEMPEST Professional, level I or II. Many of these TEMPEST professionals have gone on to fill important positions in government and industry.

For more information, click on TEMPEST COURSES. here or in our navigation bar.


Our Fundamentals of TEMPEST Security Course provides Department of Defense ( DoD,) military, government and industry executives with practical, essential TEMPEST trainingh that is available nowhere else. "Fundamentals of TEMPEST Security" is only available to US citizens with verified security clearances and a verified need to know about TEMPEST security issues.


Our "TEMPEST Professionals' Certification Course" presents in a clear and easily understood form, the many details involved in preparing an adequate TEMPEST test plan and in properly performing a TEMPEST test. Although it is much more limited in scope, it is much more challenging than "Fundamentals of TEMPEST Security." It is also only available to US citizens with Department of Defense ( DoD ) verified security clearances and a verified need to know about TEMPEST security issues.


We occasionally hear from people who want to take both "Fundamentals of TEMPEST Security," and the "TEMPEST Professionals' Certification Course." We encourage this, but it is not for everyone. If you are serious about investing a good part of your future in the TEMPEST security industry, taking both courses may be right for you.

The TEMPEST Professionals' Certification Course will help you to get started in TEMPEST testing. It will help you excel in this job.

"Fundamentals of TEMPEST Security" will help you get promoted into management. Taking both courses will help to make you into the best and most valuable type of TEMPEST security manager: one who understands the business aspects and also possesses the practical knowledge that can only be gained by working in the laboratory. It is no exaggeration to say that an executive with this type of background can be literally worth his or her weight in gold. At current rates, this would be about two million dollars for a 200 lb. person. A medium sized firm can make that much from one, single, well-planned, well-led TEMPEST security project: one that concentrates on "Taking the risk out of TEMPEST security." tm.

This Mission Statement has been reviewed by US Department of Defense ( DoD )Certified Facility Security Officer and a Certified TEMPEST Professional, Level II. It contains no classified information and no unclassified National Security Information.

Copyright 2006, 2007, 2008 by TEMPEST INC. All Rights reserved.

********************************

Terminology used in Electromagnetic Compatibility (EMC)

If someone turns on a hair dryer while you are watching television, you may see some annoying lines running across your TV screen. This is because the hair dryer unintentionally acts as a radio transmitter, producing signals that confuse the television set. This is known as " Electromagnetic Interference " ( EMI ).

If an engineer were to re-design the hair dryer so that it no longer produced electromagnetic interference ( EMI ), the problem would be solved. The hair dryer and the television set would now be compatible. This is known as "Electromagnetic Compatibility" (EMC.)

EMI and EMC are used interchangeably to refer to the technology of preventing and eliminating electromagnetic interference.

Other names for this technology include "Radio Frequency Interference " (RFI) and "Radio Interference." Amateur radio operators call it " QRM " and " QRN ."

Two other useful terms are "Emissions" and "Susceptibility." The radio signals that the hair dryer produces are its "emissions." The extent to which the television set malfunctions in the presence of these signals is called its "Susceptibility."

Many EMC standards require tests for both the Emissions that a device produces, and its Susceptibility to other emissions. In Europe, "Susceptibility" tests are called "Immunity" tests.

The field of electromagnetic compatibility now encompasses many sub-specialties. Some of these are:

* Electrostatic Discharge Control (ESD), the prevention of damage from the type of static electricity that you produce by walking across a carpet on a dry day.

* Radiation Hazards (RADHAZ), protection against injuries that can be caused by powerful radio transmitters.

*High Energy Radio Frequency (HERF) protection: Protection against electromagnetic interference that is intentionally caused by mischief-makers.

When you fill your car's gasoline tank, you may see a sign warning you to turn off your cell phone. This is because radio signals, like the ones produced by cell phones, have been known to cause sparks that can ignite gasoline fumes and cause a fire. The term "HERF" is also used to mean "Hazards of Electromagnetic Radiation to Fuel."

*Extremely Low Frequency ( ELF) signals, such as those produced by electrical power lines, have been accused of causing electromagnetic interference and even health problems. The study of ELF signals and their effects is also a part of the overall field of electromagnetic compatibility.

* Electromagnetically Shielded Enclosures are used to block unwanted radio signals from getting in or out. This general term is used to refer to enclosures that can be several stories tall, or small enough to fit on a printed circuit board.

* Shielded Enclosures that are approximately the size of a typical room or office are often called " shielded rooms, " or (in Canada) "Walk-in shielded enclosures" or "Faraday Cages " after the British scientist Michael Faraday who invented the first one, or "Screen Rooms" after the copper screening that was originally used to build them.

* Shielding Effectiveness testing of cybersecurity intelligence surveillance and reconnaisance ISR systems . is the technology used to determine if a sheilded enclosure is working properly. It is also used to determine the effectiveness of different types of shielding materials.

For more information about shielding, see "THE SHIELDED ENCLOSURE HANDBOOK" and our unclassified COURSES. entitled:

SHIELDED ENCLOSURES

SHIELDING EFFECTIVENESS testing of cybersecurity intelligence surveillance and reconnaisance ISR systems .

CONSTRUCTION OF ELECTROMAGNETICALLY SHIELDED ENCLSOURES

"TEMPEST" security.

* TEMPEST security can be considered a sub-specialty of electromagnetic compatibility.

Misinformation about "TEMPEST".

Unfortunately, the internet contains a lot of misinformation about TEMPEST. Here are some examples:

"TEMPEST" is not an acronym.

The word TEMPEST is not an acronym. TEMPEST is just an unclassified short name, similar to the term "Apollo " in NASA's manned moon landing Program.

"TEMPEST" is not a " codename " or a "code name ".

The U.S. government does not use the terms " codename " or " code name "in its official communicatxions. Therefore, there is no official definition of what constitutes a " codename " or a " code name ". The terms " Codename " and " code name " appear to be just something that somebody made up.

"TEMPEST" is not a code word or a codeword.

The word TEMPEST is not a code word or a codeword either. Unlike the terms " codename " or " code name ", The terms " codeword " and " code word " do have official definitions .

These are usually two syllable terms like "BASEBALL" and " HOT DOG " that are sometimes used to refer to classified projects, but TEMPEST is not a codeword or a code word either.

Ending the confusion about TEMPEST.

With all this misinformation about TEMPEST floating around the internet, how do you know what to believe? The answer is this: Don't rely on commercial or amateur web sites, even reliable ones like ours. Instead, go to your U.S. Government customer if you have one or else stick to official U.S. government web sites that end in ".gov" or ".mil" .

If you are not in the United States, stick to official web sites published by your own government.

Most information about TEMPEST security engineering is classified. This means that people who work in TEMPEST security engineering, including TEMPEST INC., are prohibited by the U.S. Government from discussing TEMPEST security matters with anyone who does not have:
a) a verified US security clearance, and
b) a need to know the TEMPEST security engineering information. Both must be verified by the US Government.

For this reason, please do not ask us anything about TEMPEST security matters unless we can verify in advance, through official US government channels, that you meet both of the above criteria. At TEMPEST INC. we are required to report all unusual or suspicious inquiries about TEMPEST security matters. We do this diligently and vigorously.

On the other hand, If you are in the Armed Forces of the United States, or if you are a United States government employee or US government contractor, if you meet the above requirements and you need to talk to an experienced TEMPEST engineer, call us. TEMPEST INC. will respond quickly and effectively.

TEMPEST INC. has a 28 year history of providing practical, timely solutions to a wide variety of TEMPEST security engineering problems.

Although TEMPEST security and Electromagnetic Compatibility technologies are related, an expert in one area is not necessarily an expert in another. For example, a Certified TEMPEST Professional may or may not have much experience in fixing electromagnetic interference problems. Similarly, a Certified Electromagnetic Compatibility Engineer may not know very much about TEMPEST security engineering. At TEMPEST INC. we have well-equipped facilities and proven expertise in both TEMPEST security and Electromagnetic Compatibility.

To learn more about Electromagnetic Compatibility, see our one-day course Introduction to Electromagnetic Compatibility" on our "Courses" page. This course is unclassified and open to all.

Copyright 2006 - 2013 by TEMPEST INC. All rights reserved.

**********************

Public Service Notice:

At TEMPEST INC. we receive many inquiries regarding products and services which employ the term " tempest " but are not related to TEMPEST security , which is our particular industry.

As a public service, and to dispel confusion regarding the term tempest, here are some typical uses. While many of these organizations that use the term " tempest " may provide valuable goods and services, they are not connected in any way with TEMPEST INC.:

Other uses of the term tempest : The term tempest is widely used in a variety of fields. We will try to provide clarifying information about some of them. Tempest can refer to:
A marketing firm called Tempest, Inc. that is not related to TEMPEST INC;
A helicopter parts firm called Tempest Aviation Group that is also not related to TEMPEST INC. , even though TEMPEST INC. makes special avionics that can be used in helicopters, and TEMPEST INC. has extensive experience performing TEMPEST tests and planning TEMPEST tests on helicopters specifically;
a tempest vacuum cleaner;
a tempest video game;
a shakespearian play called “ The tempest ;”
Books about the play " The Tempest " ;
a tempest firm that makes fire extinguishers;
an artist with the middle name of tempest ;
a 1982 film with Jon Cassavetes called tempest ;
a tempest lounge in Tacoma, Washington;
a tempest marketing firm called tempest ;
an athletic team called tempest ;
a celtic folk-rock band called tempest ;
a copyright 2010 by TEMPEST INC.;
a Finnish composer called tempest ;
a British band called tempest ;
a German band called tempest ;
a Christian band called tempest ;
a New Zealand band called tempest ;
a magician called tempest ;
an artist called tempest ;
an author with the middle name of tempest ;
a storm-chasing firm appropriately named tempest ;
an anti-bullying foundation called tempest ;
a science fiction author with the middle name of tempest ;
an internet services firm called tempest ;
a gas torch called the tempest.
a south african car rental firm called tempest car hire ;
a new home builder in Indiana called tempest homes ;
a WWII fighter plane called the hawker tempest ;
a classic car called the pontiac tempest ;
a down jacket called the tempest ;
a marketing firm called " tempest plus " ;
a Canadian restaurant called " tempest " ;
a sealed lead-acid battery named " tempest " ;
a breed of dogs called tempest terriers ;

USEFUL LINKS USING THE TERM "TEMPEST ":
The marketing firm called Tempest, Inc. that is not related to TEMPEST INC has this web site:
http://www.tempestmktkg.com
The helicopter parts firm called Tempest Aviation Group that is also not related to TEMPEST INC., has this web site:
http://www.tempestaero.com
The south african car rental firm called tempest car hire has the following web site:
http://www.tempestcarhire.co.za
The new home builder in Indiana called : tempest homes has the following web site:
http://www.tempesthomes.com
The hawker tempest aircraft has the following web site:
http://www.hawkertempest.se
The classic car called the pontiac tempest has this site:
http://www.americandreamcars.com/1963tempest.htm
The tempest jacket can be bought here:
http://www.shopzilla.com/clothing-accessories/tempest+down+jacket/10000000/search
Books about the play " The Tempest " are sold here:
http://www.amazon.com/s/?ie=UTF8&keywords=the+tempest&tag=mh0b-20&index=stripbooks&hvadid=55535937&ref=pd_sl_97uxmiv4sq_e
The Canadian restaurant called " tempest " has this web site:
http://www.tempest.ca
A web site for the marketing firm called " tempest plus " is here:
http://www.tempestplus.com
The battery named " tempest " has this web site:
http://www.tempestbatteries.com
The tempest terrier dogs have this web site:
http://www.tempest-terriers.com

Tempest can be capitalized and tempest can be written normally.

General information about the tempest arcade game:

The tempest arcade game is made by Atari. Regarding the tempest arcade game, a search on tempest reveals that tempest was developed by Atari Inc. tempest was designed by Dave Theurer. tempest runs on arcade platforms, tempest was released in 1980. The tempest arcade game is of the genres called Tube shooters. tempest takes up to 2 tempest game players. The tempest game players can take alternating turns. tempest can be played on a standard cabinet. tempest can be played on cabaret cabinet as a third option, tempest can be played on a table form. tempest is Displayed in a Vertical orientation. tempest is displayed in color.

The tempest arcade game was not only designed by MR Theurer. tempest was also programmed by him. tempest was released around October, 1981. Copyright 2010 by tempest INC. tempest became popular. tempest had port of the tempest games and tempest had sequels. tempest was the first video game with selectable difficulty. tempest is a shooting Copyright 2010 by tempest INC. game. In tempest the environment is 3-dimensional.

In tempest the object of tempest is to survive as long as possible. tempest game players score points by clearing tempest enemies that land in the tempest playing field. The game tempest can take place in a tube. . tempest can also be in a field. The tempest field is divided into tempest segments . The tempest game player uses a tempest space game’s ship . The tempest ship crawls along the tempest field, moving from tempest segment to tempest segment. The tempest game’s tempest ship shoots destroying tempest enemies within the tempest segment. The tempest game's ship has a tempest super-zapper. tempest super-zapper destroys tempest enemies on the tempest field.

---------------------------------

Facts about the Tempest folk-rock band:

The Tempest folk-rock band was formed in 1988. Tempest provides high-energy folk rock music. The Tempest folk-rock band is based in the San Francisco Bay Area. The Tempest band has released twelve critically acclaimed CDs. Tempest has played more than 2,000 gigs. The Tempest folk-rock band has evolved with each new member of the band.

Members of The Tempest folk-rock band:


The founding member of The Tempest folk-rock band is Lief Sorbye.
The The Tempest folk-rock band’s original fiddler is Michael Mullen.
Bassist Damien Gonzalez of The Tempest folk-rock band is also an accomplished drummer.
Guitarist James Crocker of The Tempest folk-rock band combines folk with rock.
Drummer Adolfo Lazo is an original Tempest member.

Tempest's releases are acclaimed worldwide. The Tempest folk-rock band's CDs include both original and traditional material. The Tempest band regularly plays at festivals. The Tempest band plays at American Celtic festivals. The Tempest folk-rock band hosts its own annual festival. For more information about The Tempest folk-rock band see their web site at http://www.tempestmusic.com