Compromising emanations are
|“||[u]nintentional signals that, if intercepted and analyzed, would disclose the information transmitted, received, handled, or otherwise processed by information systems equipment.||”|
|“||unintentional data-related or intelligence-bearing signals which, if intercepted and analyzed, would disclose the classified information transmission received, handled or otherwise processed by any information processing equipment.||”|
- ↑ OPSEC Glossary of Terms.
- ↑ Turquiose Book: A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems (NCSC-TG-004-88 Oct. 16, 2002) (full-text).