Skip to content
  • Home
  • Products
    • All products
    • Tailor-made security projects
  • Performances
    • Anti-burglary protection
    • Bullet-resistant protection
    • Fire-resistant performance
    • Prison security
    • Electromagnetic protection
    • Protection Vault
    • Other performances
  • Partners
    • Customers
    • Installers
    • Suppliers
  • Downloads
  • About Us
    • Who are we?
    • Our team
    • Icomet Group
    • Security and Quality Certificates
    • News
  • EN
    • EN
    • FR
    • NL
  • Home
  • Products
    • All products
    • Tailor-made security projects
  • Performances
    • Anti-burglary protection
    • Bullet-resistant protection
    • Fire-resistant performance
    • Prison security
    • Electromagnetic protection
    • Protection Vault
    • Other performances
  • Partners
    • Customers
    • Installers
    • Suppliers
  • Downloads
  • About Us
    • Who are we?
    • Our team
    • Icomet Group
    • Security and Quality Certificates
    • News
  • EN
    • EN
    • FR
    • NL
Contact
  • Home
  • Products
    • All products
    • Tailor-made security projects
  • Performances
    • Anti-burglary protection
    • Bullet-resistant protection
    • Fire-resistant performance
    • Prison security
    • Electromagnetic protection
    • Protection Vault
    • Other performances
  • Partners
    • Customers
    • Installers
    • Suppliers
  • Downloads
  • About Us
    • Who are we?
    • Our team
    • Icomet Group
    • Security and Quality Certificates
    • News
  • EN
    • EN
    • FR
    • NL
  • Home
  • Products
    • All products
    • Tailor-made security projects
  • Performances
    • Anti-burglary protection
    • Bullet-resistant protection
    • Fire-resistant performance
    • Prison security
    • Electromagnetic protection
    • Protection Vault
    • Other performances
  • Partners
    • Customers
    • Installers
    • Suppliers
  • Downloads
  • About Us
    • Who are we?
    • Our team
    • Icomet Group
    • Security and Quality Certificates
    • News
  • EN
    • EN
    • FR
    • NL
Contact

Electromagnetic protection

IEEE 299-2006
-50 up to -100 dB (from 9 KHz to 18 GHz)

Electromagnetic protection

IEEE 299-2006
-50 up to -100 dB (from 9 KHz to 18 GHz)

Home > Electromagnetic protection

Electromagnetic protection:
the strategic challenge of today’s and tomorrow’s conflicts

In the digital age, electromagnetic security has become a major concern for critical infrastructure. Electromagnetic interference (EMI) and electromagnetic pulses (EMP) can compromise communication confidentiality, the reliability of IT systems, and the protection of sensitive data.

The IEEE 299-2006 standard defines testing and measurement methods to assess the electromagnetic attenuation of shielded enclosures. Independently validated, it ensures that our protective solutions provide an effective shield against electromagnetic disturbances.

Download our complete guide on electromagnetic threats

IEEE 299-2006 & Tempest: The Fundamentals of Electromagnetic Protection

IEEE 299-2006 Standard: Measuring the Effectiveness of Electromagnetic Shielding

The IEEE 299-2006 standard is a global benchmark for testing and certifying electromagnetic protection solutions. It establishes a rigorous protocol for measuring electromagnetic attenuation in laboratory settings and/or real-world conditions.

Test principle:

  • An electromagnetic source is generated outside the enclosure being tested.
  • Sensors measure the attenuation rate of the signal at various frequencies (from 9 kHz to 18 GHz).
  • The goal is to ensure maximum reduction of interference and electromagnetic leakage.

Results are expressed in decibels (dB): the higher the attenuation, the more effective the protection.

Discover the detailed testing protocol of the IEEE 299-2006 standard

TEMPEST: Securing Electromagnetic Emissions for the Protection of Sensitive Data

The TEMPEST concept (Telecommunications Electronics Material Protected from Emanating Spurious Transmissions) refers to a set of standards and security techniques designed to protect electronic equipment from the interception of electromagnetic signals. Originally developed by defense and intelligence agencies, the concept is based on the idea that all electronic devices unintentionally emit electromagnetic radiation—known as compromising emanations—which can be captured and exploited remotely to reconstruct sensitive information, such as text displayed on a screen or data transmitted over a network.

TEMPEST concerns are critical for sectors handling classified or strategic information, including governments, armed forces, cybersecurity firms, and financial institutions. To prevent any interception, several countermeasures are implemented: electromagnetic shielding of equipment and infrastructure, filters on power and data lines, secured and compartmentalized areas (SCIF – Sensitive Compartmented Information Facility), and strict emission control protocols.

By integrating TEMPEST principles, organizations significantly reduce the risk of espionage and covert surveillance, physical cyberattacks, intellectual property theft, interception of financial transactions, and electromagnetic intrusions—ensuring the highest level of confidentiality and protection for sensitive infrastructures.

The three fundamental principles of TEMPEST

Attenuate emissions

Use of shielded materials and components designed to limit electromagnetic leakage.

Protect the environment

Creation of secure zones with shielded partitions and doors preventing any interception.

Control transmissions

Use of electromagnetic filters and advanced encryption protocols to prevent any unauthorized signal retrieval.

Protect information from unintentional electromagnetic emissions

The TEMPEST principle is based on protection against electromagnetic espionage by limiting the unintentional emissions of signals from electronic equipment. Indeed, all digital devices (screens, keyboards, cables, servers, routers, etc.) generate electromagnetic radiation that can be captured remotely and exploited to reconstruct sensitive data.

  • Problem: These emissions, known as compromising emanations, can be intercepted using specialized equipment, allowing malicious actors to read text on a screen, intercept encrypted communications, or track keystrokes without any physical contact with the target.
  • Solution: TEMPEST enforces shielding, filtering, and security measures to prevent any information leakage through electromagnetic radiation.

How is the TEMPEST principle applied in practice? 

Electromagnetic shielding of equipment

PCs, servers, and secure phones covered with materials that reduce emissions.

Secure enclosures (SCIF – Sensitive Compartmented Information Facility)

Electromagnetic Bunkerkit® (Faraday cage) preventing any information leakage.

Filtering of cables and connections

Protection against electromagnetic interference on power lines and wired networks.

Zoning protocol and workspace control

Restriction of unsecured devices in certain areas to prevent interception risks.

Understanding the TEMPEST principle and NATO zoning
Téléchargez nos guides sur la protection électromagnétique

DOIC P040 | Electromagnetic information

DOIC P040 | Electromagnetic information

Electromagnetic protection
Download

FTBK 005 | Bunkerkit : Electromagnetic protection

FTBK 005 | Bunkerkit : Electromagnetic protection

Electromagnetic protection
Download

Electromagnetic threats: understanding the risks to better anticipate them

In an ultra-connected world, electromagnetic risks represent a major threat to the security of infrastructure, data, and sensitive communications. Our clients—whether from the government, military, industrial, or service sectors—must take into account several types of electromagnetic threats that can have critical consequences.

Eavesdropping, electronic espionage, and communication interception
Principle:

Interception of electromagnetic signals, particularly unsecured emissions from electronic equipment (computers, phones, printers, servers), whose protection may be governed by TEMPEST rules (a set of standards and security techniques)

Main threats:
  • Theft of confidential information (bank data, sensitive files, access codes)
  • Hacking of communications between strategic sites
  • Exploitation of emitted signals to reconstruct documents displayed on a screen
Sectors concerned:
  • Defense

  • Governments

  • Technology companies

  • Strategic infrastructures

Espionnage Electromagnetique
Electromagnetic Pulse (EMP) Attacks
Principle:

Electromagnetic pulses (EMP) are high-intensity waves generated by nuclear explosions, EMP weapons, or solar disturbances that can paralyze all electronic systems over a wide area.

Main threats:
  • Destruction or malfunction of power and telecom networks
  • Paralysis of critical infrastructure (hospitals, banks, transportation, defense)
  • Erasure or corruption of digital data on servers
Sectors concerned:
  • Military sites

  • Hospitals

  • Data centers

  • Sensitive industries

  • Transport networks

  • Governments

EMP Electromagnetique
Signal interference and jamming (Jamming & Spoofing)
Principle:

Electromagnetic jamming is an attack aimed at saturating communication signals (Wi-Fi, GPS, radios, mobile networks) to disable strategic transmissions.
Spoofing is a more sophisticated attack that involves sending false information over a network to hijack a GPS signal or communications.

Main threats:
  • Neutralization of navigation systems and communication networks
  • Disruption of law enforcement and emergency services during critical operations
  • Manipulation of drones, autonomous vehicles, and connected devices
Sectors concerned:
  • Defense

  • Transportation, aviation

  • Telecommunications

  • Organizations or companies using IoT (Internet of Things)

Attaque EMP Electromagnetique
Strong magnetic fields and stray currents
Principle:

Electromagnetic fields generated by heavy industrial equipment, high-voltage power lines, or thunderstorms can induce stray currents in electronic circuits, causing critical malfunctions.

Main threats:
  • Malfunction or failure of sensitive devices and industrial automation systems
  • Progressive degradation of IT and electrical equipment
  • Risk of accidents in automated industrial facilities
Sectors concerned:
  • Heavy industry

  • Laboratories

  • Data centers

  • Hospitals

  • Railway systems

Piratage Electromagnetique Hopital
Data protection and cybersecurity
Principle:

Electromagnetic attacks can be combined with cyberattacks to hack critical infrastructure through both physical and digital channels.

Main threats:
  • Intrusion into networks and theft of confidential data
  • Sabotage of IT systems through exploitation of stray signals
  • Bypassing conventional protections via physical attacks on hardware
Sectors concerned:
  • Cybersecurity

  • Technology companies

  • Financial services

  • Defense

Donnes Confidentielles Electromagnetique

Equip yourself with a modular Faraday cage
and maximize the electromagnetic protection
(EMC Shielding) of your buildings

The Federal Office for Information Security (BSI) in Germany defines the modular Faraday cage as a shell that allows the creation of large, custom-sized Faraday volumes. The systems installed inside do not require strict installation rules. The performance of this type of cage is defined based on dedicated templates depending on the intended use.

RECOMMENDED CHARACTERISTICS

Attenuation: 80 to 100 dB for an information processing site
Materials: Made of composite panels covered with galvanized steel sheets
Installation: Easy installation and robust design
Modularity: Removable and transformable panels
Cost-effectiveness: Good balance of cost/attenuation/implementation

THE BUNKERKIT® SOLUTION

The Bunkerkit® range includes Faraday cages tested and validated according to the IEEE 299-2006 standard, with substantial attenuation of 50 to 100 dB across frequency ranges from 9 kHz to 18 GHz.

These Faraday enclosures are modular and can be equipped with additional features, making them ideal for securing DATA CENTERS and recommended for protection against eavesdropping: anti-burglary (RC6), bulletproof (FB7), fire-resistant, acoustically treated, waterproof, and more.

Consult the documentation on our Faraday cages for more details on the protection offered, as well as the means and accessories implemented to ensure electromagnetic inviolability.

Discover our Bunkerkit® Faraday cages (EMC shielding)

Our products with this performance

Product #0000

Tailor-made security projects

  • Electromagnetic protection, Acoustic, Burglary resistance, Vault room, Bullet Proof, Prison, Fire resistance
  • Semi-glazed, Barred, Solid, Glazed
Armoured outdoor guard booth, burglar-resistant and/or bullet-resistant | RC3 to RC6 – FB3 to FB7 – AK47 square

Product #0930

Armoured outdoor guard booth, burglar-resistant and/or bullet-resistant | RC3 to RC6 – FB3 to FB7 – AK47

  • Burglary resistance, RC3, RC4, RC5, RC6, Bullet Proof, FB3, FB4, FB5, FB6, FB7, AK47
  • Semi-glazed, Barred, Solid, Glazed
Bunkerkit Partition | Burglar Resistance RC4 square

Product #1000

Bunkerkit® armoured partitions

  • Electromagnetic protection, Burglary resistance, MBE3, RC2, RC3, RC4, RC5, RC6, Vault room, Bullet Proof, FB3, FB4, FB5, FB6, FB7, AK47

Do you have a question? Would you like more information or a quote?

Thanks to our extensive experience with security projects, we offer a fast and customized solution for the physical protection of people, assets, and data centers.

Request more information or a customized quote

Some references: the proof of excellence

  • rue de la Verte Reine 15
    7600 Péruwelz
    Belgium
  • BE +32 (0)69 77 95 21
  • metalquartz@icometgroup.com
  • Company number
    BE0473062169
Contact & Quote

Solutions and Products

  • Burglar-resistant doors
  • Bullet-resistant doors
  • Secure Sliding Doors – Bullet resistance FB5
  • Secure windows and partitions
    • Burglar-resistant windows RC3-RC4-RC5-MBE3
    • Bullet-resistant windows
    • Bullet-Resistant Partitions FB4 – FB5 – FB6 – FB7 – AK47
    • Security curtain walls
  • Burglar-resistant overhead doors
  • Secured counters
    • Burglar-resistant counters
    • Bullet-resistant counters
  • Security booths
  • Prison security
  • Bunkerkit
  • Burglar-resistant ventilation grilles

Safety Performances

  • Anti-burglary protection
  • Bullet-resistant protection
  • Fire-resistant performance
  • Electromagnetic protection (EMC)
  • Prison security
  • Anti-burglary protection
  • Bullet-resistant protection
  • Fire-resistant performance
  • Electromagnetic protection (EMC)
  • Prison security

Sectors and Applications

  • Bank and Finance
  • Energy
  • High Security
  • Luxury
  • Police and Prison
  • Retail
  • Bank and Finance
  • Energy
  • High Security
  • Luxury
  • Police and Prison
  • Retail

About Us

  • Documentation
  • Who are we?
  • Our team
  • Icomet Group
  • Security and Quality Certificates
  • Our Latest News
  • Contact and Offers
  • Documentation
  • Who are we?
  • Our team
  • Icomet Group
  • Security and Quality Certificates
  • Our Latest News
  • Contact and Offers
Metal Quartz is a member of ICOMET GROUP | Copyright© ICOMET GROUP | Pricavy policy
Linkedin
Manage consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent may adversely affect certain features and functions.
Functioneel Always active
De technische opslag of toegang is strikt noodzakelijk voor het legitieme doel het gebruik mogelijk te maken van een specifieke dienst waarom de abonnee of gebruiker uitdrukkelijk heeft gevraagd, of met als enig doel de uitvoering van de transmissie van een communicatie over een elektronisch communicatienetwerk.
Voorkeuren
De technische opslag of toegang is noodzakelijk voor het legitieme doel voorkeuren op te slaan die niet door de abonnee of gebruiker zijn aangevraagd.
Statistieken
De technische opslag of toegang die uitsluitend voor statistische doeleinden wordt gebruikt. De technische opslag of toegang die uitsluitend wordt gebruikt voor anonieme statistische doeleinden. Zonder dagvaarding, vrijwillige naleving door je Internet Service Provider, of aanvullende gegevens van een derde partij, kan informatie die alleen voor dit doel wordt opgeslagen of opgehaald gewoonlijk niet worden gebruikt om je te identificeren.
Marketing
De technische opslag of toegang is nodig om gebruikersprofielen op te stellen voor het verzenden van reclame, of om de gebruiker op een site of over verschillende sites te volgen voor soortgelijke marketingdoeleinden.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}