Fandom

The IT Law Wiki

Technical penetration

32,198pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definitions Edit

Technical penetration(s)

include the employment of optical, electro-optical, electromagnetic, fluidic, and acoustic means as the sensor and transmission medium, or the use of various types of stimulation or modification to equipment or building components for the direct or indirect transmission of information meant to be protected.[1]
[is a]n unauthorized or unintentional physical or electrical connection; an unauthorized or unintentional optical, acoustic, or RF hardware modification, implant, software driver or firmware modification, or the unauthorized collection of fortuitous information-bearing emanations from unmodified systems, from any of these sources designed to intercept and compromise information:
(1) Known to the source;
(2) Fortuitous and unknown to the source;
(3) Clandestinely established; or
(4) Those implemented or verified through detailed physical and instrumented technical inspections, such as technical surveillance countermeasures (TSCM) operation.[2]

References Edit

  1. Office of Counterintelligence (DXC), Defense CI & HUMINT Center, Defense Intelligence Agency, "Terms and Definitions of Interest for DoD Counterintelligence Professional," at GL-169 (May 2, 2011) (full-text).
  2. 12 FAM 090 (full-text).

Also on Fandom

Random Wiki