US Critical Infrastructure Is Vulnerable To Electromagnetic War

source: Metatech

With nearly every aspect of modern life relying on computers and electronics, the dangers of electromagnetic pulse (EMP) weaponry cannot be overstated. An EMP attack could fry all non-shielded electronics, crippling infrastructure and paralysing both vital and non-vital services.

 Recently, John McAfee – cyber-security expert, former CEO of McAfee antivirus fame, presidential candidate, and sometime fugitive – joined the ranks of analysts warning against the dangers of EMPs. Up to 90% of the population in areas affected by a large-scale attack could perish within months due to crumbling infrastructure and services unable to function, McAfee warns.

The risk of belligerent state actors and terrorist organisation employing modified nuclear warheads to incapacitate the entire continental United States in one fell swoop, engendering enormous loss of lives and economic devastation, is very real. Peter Vincent Pry, executive director of the Task Force on National and Homeland Security and a former CIA nuclear-weapons analyst, testified before the Congress that North Korea is working on such weapons. Natural phenomena such a significant solar storms could cause the same devastation. As yet, there are no defences against electromagnetic pulses.

But the dangers of foes abusing capabilities in the electromagnetic spectrum are not limited to electromagnetic pulse weapons, a new report from the Centre for Strategic and Budgetary Assessments details. “Winning the Airwaves: Sustaining America’s Advantage in the Electronic Spectrum” details the dangers of electromagnetic systems (EMS) warfare. Rather than dealing a single devastating blow, EMS warfare involves stealthy tactics on a much smaller scale that can compromise local military computer systems and operational data procurement.

The report warns that in the covert EMS battlefield, the United States is close to losing its technological advantage. The authors state that following the end of the Cold War, the US failed to advance EMS technology enough, which “provided China, Russia, and other rivals with an opportunity to field systems that target vulnerabilities in sensor and communication networks the US military has come to depend on.”

The “Winning the Airwaves” report paints a grim picture. Failing to allocate the necessary investments the US allowed its rivals to overtake it in several fields. China, Russia, as well as others, have “fielded radars that operate outside the frequency range of US jammers, and developed their own jammers that are capable of targeting frequencies used by US sensors and radios,” and have deployed “large, complex sensor arrays that outrange most sensors carried by US power projection forces.”

Following the infancy of the field in World War II, where crude jammers could interfere with friendly equipment as well as that of foes, active countermeasures were developed. These employ sophisticated communications jammers and chaff to confuse enemy radar. The next phase ushered the “stealth” era, with stealth planes, low-power communications, and passive sensors. EMS warfare has now entered its third stage, according to the report.

“Winning the Airwaves” cites several hurdles to upgrading America’s EMS strategy, including the significant costs of upgrading the vast reserves of military equipment, regulatory hurdles, and the challenges of power projection to lands where adversaries possess a “home field advantage.”

The report posits some suggestions for increasing America’s edge. Deploying large-scale passive-sensor networks, the US can harness the vast reserves of computational power at its disposal to assemble thorough profiles on enemy movements. Using its technological prowess, the US can quickly engineer effective counter-measures against enemy technology. The reports puts emphasis on “low-to-no-power” systems that can operate while emitting practically no radiation, thus depriving the enemy of a target to aim their systems at.

Two warnings emerge from the report.

One is that an American focus on EMS weapons could kick-start a global EMS arms race. These systems, when developed, could fall into the hands of terrorist, who could use them to ruinous results.

Second, there seem to be no foreseeable avenues for active defenses. With no way to stop EMS weapons other than destroying them directly, we must rely on the limited protections offered by electronics hardening. Hardening, on its part, is generally only economically viable for military applications, and is almost completely missing from the civilian sphere. This leaves huge tracts of the world utterly vulnerable to attack.

I-HLS: http://bit.ly/1OWPcPu

« NSA Chief Says The Rules of War Do Apply to Cyberwar
Five Things That Happened To Data In 2015 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Defendify

Defendify

We built Defendify to help small businesses navigate the cybersecurity landscape with cybersecurity that is dead simple, affordable, and works around the clock.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.

True Corporation

True Corporation

True Corporation is Thailand’s leading Telecom-Tech company, empowering people and businesses with connected solutions that advance society sustainably.