US Critical Infrastructure Is Vulnerable To Electromagnetic War

source: Metatech

With nearly every aspect of modern life relying on computers and electronics, the dangers of electromagnetic pulse (EMP) weaponry cannot be overstated. An EMP attack could fry all non-shielded electronics, crippling infrastructure and paralysing both vital and non-vital services.

 Recently, John McAfee – cyber-security expert, former CEO of McAfee antivirus fame, presidential candidate, and sometime fugitive – joined the ranks of analysts warning against the dangers of EMPs. Up to 90% of the population in areas affected by a large-scale attack could perish within months due to crumbling infrastructure and services unable to function, McAfee warns.

The risk of belligerent state actors and terrorist organisation employing modified nuclear warheads to incapacitate the entire continental United States in one fell swoop, engendering enormous loss of lives and economic devastation, is very real. Peter Vincent Pry, executive director of the Task Force on National and Homeland Security and a former CIA nuclear-weapons analyst, testified before the Congress that North Korea is working on such weapons. Natural phenomena such a significant solar storms could cause the same devastation. As yet, there are no defences against electromagnetic pulses.

But the dangers of foes abusing capabilities in the electromagnetic spectrum are not limited to electromagnetic pulse weapons, a new report from the Centre for Strategic and Budgetary Assessments details. “Winning the Airwaves: Sustaining America’s Advantage in the Electronic Spectrum” details the dangers of electromagnetic systems (EMS) warfare. Rather than dealing a single devastating blow, EMS warfare involves stealthy tactics on a much smaller scale that can compromise local military computer systems and operational data procurement.

The report warns that in the covert EMS battlefield, the United States is close to losing its technological advantage. The authors state that following the end of the Cold War, the US failed to advance EMS technology enough, which “provided China, Russia, and other rivals with an opportunity to field systems that target vulnerabilities in sensor and communication networks the US military has come to depend on.”

The “Winning the Airwaves” report paints a grim picture. Failing to allocate the necessary investments the US allowed its rivals to overtake it in several fields. China, Russia, as well as others, have “fielded radars that operate outside the frequency range of US jammers, and developed their own jammers that are capable of targeting frequencies used by US sensors and radios,” and have deployed “large, complex sensor arrays that outrange most sensors carried by US power projection forces.”

Following the infancy of the field in World War II, where crude jammers could interfere with friendly equipment as well as that of foes, active countermeasures were developed. These employ sophisticated communications jammers and chaff to confuse enemy radar. The next phase ushered the “stealth” era, with stealth planes, low-power communications, and passive sensors. EMS warfare has now entered its third stage, according to the report.

“Winning the Airwaves” cites several hurdles to upgrading America’s EMS strategy, including the significant costs of upgrading the vast reserves of military equipment, regulatory hurdles, and the challenges of power projection to lands where adversaries possess a “home field advantage.”

The report posits some suggestions for increasing America’s edge. Deploying large-scale passive-sensor networks, the US can harness the vast reserves of computational power at its disposal to assemble thorough profiles on enemy movements. Using its technological prowess, the US can quickly engineer effective counter-measures against enemy technology. The reports puts emphasis on “low-to-no-power” systems that can operate while emitting practically no radiation, thus depriving the enemy of a target to aim their systems at.

Two warnings emerge from the report.

One is that an American focus on EMS weapons could kick-start a global EMS arms race. These systems, when developed, could fall into the hands of terrorist, who could use them to ruinous results.

Second, there seem to be no foreseeable avenues for active defenses. With no way to stop EMS weapons other than destroying them directly, we must rely on the limited protections offered by electronics hardening. Hardening, on its part, is generally only economically viable for military applications, and is almost completely missing from the civilian sphere. This leaves huge tracts of the world utterly vulnerable to attack.

I-HLS: http://bit.ly/1OWPcPu

« NSA Chief Says The Rules of War Do Apply to Cyberwar
Five Things That Happened To Data In 2015 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Defimoon

Defimoon

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

Ronet Cyber Security

Ronet Cyber Security

Ronet Cyber Security offers crypto forensics services for regulators, law enforcement, companies and individuals to ensure that your transactions are safe and secure.

Sansec Technology

Sansec Technology

Sansec Technology is dedicated to the research and development of cryptographic products and solutions for cyber security.