Nowadays, industrial and state espionage is booming. Thanks to the development of information technology, new methods of tracking and illegally obtaining information about the activities of their competitors appear daily. Technical channels for confidential information leakage arise from physical transformers. Absolutely any electronic device in the room can become a source of leakage, in turn, it can be detected and neutralized. Moreover, neutralizing it is often easier than finding it.
General information
. , , . . – , .
" " . . , , .
. . . , . . , .
, , . , . , . – . – .
, . , , . , , .
. , , , . . .
, – . . , , . , , , .
. . , , . , . .
, . , , . , , :
, , , , .
, . , . , .
, , . , . .
. . . , .
, . , . , . , - . .
- , . , . , . , , . , , .
. , :
-
- . , , :
. - - . , - . , , . , .
, , , , , . , . , .
. , , . , . , , , .
, . . , . . , , , .