Electromagnetic protection:
the strategic challenge of today’s and tomorrow’s conflicts
In the digital age, electromagnetic security has become a major concern for critical infrastructure. Electromagnetic interference (EMI) and electromagnetic pulses (EMP) can compromise communication confidentiality, the reliability of IT systems, and the protection of sensitive data.
The IEEE 299-2006 standard defines testing and measurement methods to assess the electromagnetic attenuation of shielded enclosures. Independently validated, it ensures that our protective solutions provide an effective shield against electromagnetic disturbances.
IEEE 299-2006 & Tempest: The Fundamentals of Electromagnetic Protection
IEEE 299-2006 Standard: Measuring the Effectiveness of Electromagnetic Shielding
The IEEE 299-2006 standard is a global benchmark for testing and certifying electromagnetic protection solutions. It establishes a rigorous protocol for measuring electromagnetic attenuation in laboratory settings and/or real-world conditions.
Test principle:
- An electromagnetic source is generated outside the enclosure being tested.
- Sensors measure the attenuation rate of the signal at various frequencies (from 9 kHz to 18 GHz).
- The goal is to ensure maximum reduction of interference and electromagnetic leakage.
Results are expressed in decibels (dB): the higher the attenuation, the more effective the protection.
TEMPEST: Securing Electromagnetic Emissions for the Protection of Sensitive Data
The TEMPEST concept (Telecommunications Electronics Material Protected from Emanating Spurious Transmissions) refers to a set of standards and security techniques designed to protect electronic equipment from the interception of electromagnetic signals. Originally developed by defense and intelligence agencies, the concept is based on the idea that all electronic devices unintentionally emit electromagnetic radiation—known as compromising emanations—which can be captured and exploited remotely to reconstruct sensitive information, such as text displayed on a screen or data transmitted over a network.
TEMPEST concerns are critical for sectors handling classified or strategic information, including governments, armed forces, cybersecurity firms, and financial institutions. To prevent any interception, several countermeasures are implemented: electromagnetic shielding of equipment and infrastructure, filters on power and data lines, secured and compartmentalized areas (SCIF – Sensitive Compartmented Information Facility), and strict emission control protocols.
By integrating TEMPEST principles, organizations significantly reduce the risk of espionage and covert surveillance, physical cyberattacks, intellectual property theft, interception of financial transactions, and electromagnetic intrusions—ensuring the highest level of confidentiality and protection for sensitive infrastructures.
The three fundamental principles of TEMPEST
Attenuate emissions
Use of shielded materials and components designed to limit electromagnetic leakage.
Protect the environment
Creation of secure zones with shielded partitions and doors preventing any interception.
Control transmissions
Use of electromagnetic filters and advanced encryption protocols to prevent any unauthorized signal retrieval.
Protect information from unintentional electromagnetic emissions
The TEMPEST principle is based on protection against electromagnetic espionage by limiting the unintentional emissions of signals from electronic equipment. Indeed, all digital devices (screens, keyboards, cables, servers, routers, etc.) generate electromagnetic radiation that can be captured remotely and exploited to reconstruct sensitive data.
- Problem: These emissions, known as compromising emanations, can be intercepted using specialized equipment, allowing malicious actors to read text on a screen, intercept encrypted communications, or track keystrokes without any physical contact with the target.
- Solution: TEMPEST enforces shielding, filtering, and security measures to prevent any information leakage through electromagnetic radiation.
How is the TEMPEST principle applied in practice?
Electromagnetic shielding of equipment
PCs, servers, and secure phones covered with materials that reduce emissions.
Secure enclosures (SCIF – Sensitive Compartmented Information Facility)
Electromagnetic Bunkerkit® (Faraday cage) preventing any information leakage.
Filtering of cables and connections
Protection against electromagnetic interference on power lines and wired networks.
Zoning protocol and workspace control
Restriction of unsecured devices in certain areas to prevent interception risks.
Téléchargez nos guides sur la protection électromagnétique

DOIC P040 | Electromagnetic information
DOIC P040 | Electromagnetic information

FTBK 005 | Bunkerkit : Electromagnetic protection
FTBK 005 | Bunkerkit : Electromagnetic protection
Electromagnetic threats: understanding the risks to better anticipate them
In an ultra-connected world, electromagnetic risks represent a major threat to the security of infrastructure, data, and sensitive communications. Our clients—whether from the government, military, industrial, or service sectors—must take into account several types of electromagnetic threats that can have critical consequences.
Eavesdropping, electronic espionage, and communication interception
Principle:
Interception of electromagnetic signals, particularly unsecured emissions from electronic equipment (computers, phones, printers, servers), whose protection may be governed by TEMPEST rules (a set of standards and security techniques)
Main threats:
- Theft of confidential information (bank data, sensitive files, access codes)
- Hacking of communications between strategic sites
- Exploitation of emitted signals to reconstruct documents displayed on a screen
Sectors concerned:
Defense
Governments
Technology companies
Strategic infrastructures

Electromagnetic Pulse (EMP) Attacks
Principle:
Electromagnetic pulses (EMP) are high-intensity waves generated by nuclear explosions, EMP weapons, or solar disturbances that can paralyze all electronic systems over a wide area.
Main threats:
- Destruction or malfunction of power and telecom networks
- Paralysis of critical infrastructure (hospitals, banks, transportation, defense)
- Erasure or corruption of digital data on servers
Sectors concerned:
Military sites
Hospitals
Data centers
Sensitive industries
Transport networks
Governments

Signal interference and jamming (Jamming & Spoofing)
Principle:
Electromagnetic jamming is an attack aimed at saturating communication signals (Wi-Fi, GPS, radios, mobile networks) to disable strategic transmissions.
Spoofing is a more sophisticated attack that involves sending false information over a network to hijack a GPS signal or communications.
Main threats:
- Neutralization of navigation systems and communication networks
- Disruption of law enforcement and emergency services during critical operations
- Manipulation of drones, autonomous vehicles, and connected devices
Sectors concerned:
Defense
Transportation, aviation
Telecommunications
Organizations or companies using IoT (Internet of Things)

Strong magnetic fields and stray currents
Principle:
Electromagnetic fields generated by heavy industrial equipment, high-voltage power lines, or thunderstorms can induce stray currents in electronic circuits, causing critical malfunctions.
Main threats:
- Malfunction or failure of sensitive devices and industrial automation systems
- Progressive degradation of IT and electrical equipment
- Risk of accidents in automated industrial facilities
Sectors concerned:
Heavy industry
Laboratories
Data centers
Hospitals
Railway systems

Data protection and cybersecurity
Principle:
Electromagnetic attacks can be combined with cyberattacks to hack critical infrastructure through both physical and digital channels.
Main threats:
- Intrusion into networks and theft of confidential data
- Sabotage of IT systems through exploitation of stray signals
- Bypassing conventional protections via physical attacks on hardware
Sectors concerned:
Cybersecurity
Technology companies
Financial services
Defense

Equip yourself with a modular Faraday cage
and maximize the electromagnetic protection
(EMC Shielding) of your buildings
The Federal Office for Information Security (BSI) in Germany defines the modular Faraday cage as a shell that allows the creation of large, custom-sized Faraday volumes. The systems installed inside do not require strict installation rules. The performance of this type of cage is defined based on dedicated templates depending on the intended use.
RECOMMENDED CHARACTERISTICS
Attenuation: 80 to 100 dB for an information processing site
Materials: Made of composite panels covered with galvanized steel sheets
Installation: Easy installation and robust design
Modularity: Removable and transformable panels
Cost-effectiveness: Good balance of cost/attenuation/implementation
THE BUNKERKIT® SOLUTION
The Bunkerkit® range includes Faraday cages tested and validated according to the IEEE 299-2006 standard, with substantial attenuation of 50 to 100 dB across frequency ranges from 9 kHz to 18 GHz.
These Faraday enclosures are modular and can be equipped with additional features, making them ideal for securing DATA CENTERS and recommended for protection against eavesdropping: anti-burglary (RC6), bulletproof (FB7), fire-resistant, acoustically treated, waterproof, and more.
Consult the documentation on our Faraday cages for more details on the protection offered, as well as the means and accessories implemented to ensure electromagnetic inviolability.