TEMPEST & CEMA


Secure Solutions for Defence and Gov

TEMPEST represents a class of attacks aimed at exploiting unintentional electromagnetic (EM) emissions from electronic devices. These emissions, often referred to as compromising emanations, can leak information about the operation of a device, including the data being processed or transmitted.

One of the primary targets of TEMPEST attacks is electronic devices, encompassing a wide range of hardware, including computers, monitors, keyboards, and other peripherals. Essentially, any device that processes or handles sensitive information and emits electromagnetic radiation during its operation is susceptible to TEMPEST attacks. By analysing these emissions, attackers can potentially reconstruct the data being processed or transmitted by the targeted device. This can include sensitive information such as keystrokes, screen contents, or even cryptographic keys, posing a significant threat to security and privacy.

Image of a COTS, rugged style laptop undergoing pre-testing in our anechoic chamber
Example emination captured from a standard COTS screen


As an NCSC and NATO approved vendor, we have a number of current products with a certification. Discover the full range of our TEMPEST products and services by clicking the button below…

For more information on TEMPEST, please follow the link below to download our whitepaper ‘Shielding the Signal: Understanding TEMPEST and Strengthening Organisational Defences’…

ENGINEERING SERVICES


Proven Engineering Accumen

CompTech engineering services encompass the adaptation of computing devices to operate effectively in challenging environments, such as those encountered by armed forces. Our scope ranges from modifying existing computing devices to conducting ground-up research and development (R&D) tailored to specific customer needs. We offer design proving, acceptance testing, and integrated logistic support to ensure seamless integration and operation.

At CompTech Solutions, we specialise in delivering adaptable solutions for national programmes, whether it’s small-scale production or full-service manufacturing. Our unique approach combines the agility of a small company with dedicated teams and the resources of a large corporation, minimising risks and maximising flexibility throughout the process. From initial scoping to final testing, we provide comprehensive services, ensuring simplicity, security, and efficiency for our clients. Our engineering team’s expertise allows us to integrate secure solutions seamlessly, ensuring programme excellence at every stage.


At CompTech Solutions, we are committed to delivering innovative engineering services that exceed expectations and drive success in even the most demanding environments…

Integrated crypto


Integrated Encryption Solutions

At CompTech Solutions, one of our strengths lies in seamlessly integrating advanced security solutions like the Cyber1st Bulldog and the Viasat DARC-ssd® 600 into a diverse array of end-user devices and custom solutions such as body-worn harnesses, and docking solutions. Leveraging our expertise in engineering and integration, we ensure that these cutting-edge products seamlessly complement the functionality of the devices they are installed in. Our products see facilitate the seamless connection and security of these devices in various environments, be it in offices, vehicles, or aircraft.


Protect your most valuable data assets with our range of custom encryption solutions…

LEARN MORE ABOUT OUR INTEGRATED ENCRYPTION SOLUTIONS