US Critical Infrastructure Is Vulnerable To Electromagnetic War

source: Metatech

With nearly every aspect of modern life relying on computers and electronics, the dangers of electromagnetic pulse (EMP) weaponry cannot be overstated. An EMP attack could fry all non-shielded electronics, crippling infrastructure and paralysing both vital and non-vital services.

 Recently, John McAfee – cyber-security expert, former CEO of McAfee antivirus fame, presidential candidate, and sometime fugitive – joined the ranks of analysts warning against the dangers of EMPs. Up to 90% of the population in areas affected by a large-scale attack could perish within months due to crumbling infrastructure and services unable to function, McAfee warns.

The risk of belligerent state actors and terrorist organisation employing modified nuclear warheads to incapacitate the entire continental United States in one fell swoop, engendering enormous loss of lives and economic devastation, is very real. Peter Vincent Pry, executive director of the Task Force on National and Homeland Security and a former CIA nuclear-weapons analyst, testified before the Congress that North Korea is working on such weapons. Natural phenomena such a significant solar storms could cause the same devastation. As yet, there are no defences against electromagnetic pulses.

But the dangers of foes abusing capabilities in the electromagnetic spectrum are not limited to electromagnetic pulse weapons, a new report from the Centre for Strategic and Budgetary Assessments details. “Winning the Airwaves: Sustaining America’s Advantage in the Electronic Spectrum” details the dangers of electromagnetic systems (EMS) warfare. Rather than dealing a single devastating blow, EMS warfare involves stealthy tactics on a much smaller scale that can compromise local military computer systems and operational data procurement.

The report warns that in the covert EMS battlefield, the United States is close to losing its technological advantage. The authors state that following the end of the Cold War, the US failed to advance EMS technology enough, which “provided China, Russia, and other rivals with an opportunity to field systems that target vulnerabilities in sensor and communication networks the US military has come to depend on.”

The “Winning the Airwaves” report paints a grim picture. Failing to allocate the necessary investments the US allowed its rivals to overtake it in several fields. China, Russia, as well as others, have “fielded radars that operate outside the frequency range of US jammers, and developed their own jammers that are capable of targeting frequencies used by US sensors and radios,” and have deployed “large, complex sensor arrays that outrange most sensors carried by US power projection forces.”

Following the infancy of the field in World War II, where crude jammers could interfere with friendly equipment as well as that of foes, active countermeasures were developed. These employ sophisticated communications jammers and chaff to confuse enemy radar. The next phase ushered the “stealth” era, with stealth planes, low-power communications, and passive sensors. EMS warfare has now entered its third stage, according to the report.

“Winning the Airwaves” cites several hurdles to upgrading America’s EMS strategy, including the significant costs of upgrading the vast reserves of military equipment, regulatory hurdles, and the challenges of power projection to lands where adversaries possess a “home field advantage.”

The report posits some suggestions for increasing America’s edge. Deploying large-scale passive-sensor networks, the US can harness the vast reserves of computational power at its disposal to assemble thorough profiles on enemy movements. Using its technological prowess, the US can quickly engineer effective counter-measures against enemy technology. The reports puts emphasis on “low-to-no-power” systems that can operate while emitting practically no radiation, thus depriving the enemy of a target to aim their systems at.

Two warnings emerge from the report.

One is that an American focus on EMS weapons could kick-start a global EMS arms race. These systems, when developed, could fall into the hands of terrorist, who could use them to ruinous results.

Second, there seem to be no foreseeable avenues for active defenses. With no way to stop EMS weapons other than destroying them directly, we must rely on the limited protections offered by electronics hardening. Hardening, on its part, is generally only economically viable for military applications, and is almost completely missing from the civilian sphere. This leaves huge tracts of the world utterly vulnerable to attack.

I-HLS: http://bit.ly/1OWPcPu

« NSA Chief Says The Rules of War Do Apply to Cyberwar
Five Things That Happened To Data In 2015 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Devel

Devel

Devel is a LATAM cybersecurity company specialized in providing red, blue and purple team services for the financial sector.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.