US Critical Infrastructure Is Vulnerable To Electromagnetic War

source: Metatech

With nearly every aspect of modern life relying on computers and electronics, the dangers of electromagnetic pulse (EMP) weaponry cannot be overstated. An EMP attack could fry all non-shielded electronics, crippling infrastructure and paralysing both vital and non-vital services.

 Recently, John McAfee – cyber-security expert, former CEO of McAfee antivirus fame, presidential candidate, and sometime fugitive – joined the ranks of analysts warning against the dangers of EMPs. Up to 90% of the population in areas affected by a large-scale attack could perish within months due to crumbling infrastructure and services unable to function, McAfee warns.

The risk of belligerent state actors and terrorist organisation employing modified nuclear warheads to incapacitate the entire continental United States in one fell swoop, engendering enormous loss of lives and economic devastation, is very real. Peter Vincent Pry, executive director of the Task Force on National and Homeland Security and a former CIA nuclear-weapons analyst, testified before the Congress that North Korea is working on such weapons. Natural phenomena such a significant solar storms could cause the same devastation. As yet, there are no defences against electromagnetic pulses.

But the dangers of foes abusing capabilities in the electromagnetic spectrum are not limited to electromagnetic pulse weapons, a new report from the Centre for Strategic and Budgetary Assessments details. “Winning the Airwaves: Sustaining America’s Advantage in the Electronic Spectrum” details the dangers of electromagnetic systems (EMS) warfare. Rather than dealing a single devastating blow, EMS warfare involves stealthy tactics on a much smaller scale that can compromise local military computer systems and operational data procurement.

The report warns that in the covert EMS battlefield, the United States is close to losing its technological advantage. The authors state that following the end of the Cold War, the US failed to advance EMS technology enough, which “provided China, Russia, and other rivals with an opportunity to field systems that target vulnerabilities in sensor and communication networks the US military has come to depend on.”

The “Winning the Airwaves” report paints a grim picture. Failing to allocate the necessary investments the US allowed its rivals to overtake it in several fields. China, Russia, as well as others, have “fielded radars that operate outside the frequency range of US jammers, and developed their own jammers that are capable of targeting frequencies used by US sensors and radios,” and have deployed “large, complex sensor arrays that outrange most sensors carried by US power projection forces.”

Following the infancy of the field in World War II, where crude jammers could interfere with friendly equipment as well as that of foes, active countermeasures were developed. These employ sophisticated communications jammers and chaff to confuse enemy radar. The next phase ushered the “stealth” era, with stealth planes, low-power communications, and passive sensors. EMS warfare has now entered its third stage, according to the report.

“Winning the Airwaves” cites several hurdles to upgrading America’s EMS strategy, including the significant costs of upgrading the vast reserves of military equipment, regulatory hurdles, and the challenges of power projection to lands where adversaries possess a “home field advantage.”

The report posits some suggestions for increasing America’s edge. Deploying large-scale passive-sensor networks, the US can harness the vast reserves of computational power at its disposal to assemble thorough profiles on enemy movements. Using its technological prowess, the US can quickly engineer effective counter-measures against enemy technology. The reports puts emphasis on “low-to-no-power” systems that can operate while emitting practically no radiation, thus depriving the enemy of a target to aim their systems at.

Two warnings emerge from the report.

One is that an American focus on EMS weapons could kick-start a global EMS arms race. These systems, when developed, could fall into the hands of terrorist, who could use them to ruinous results.

Second, there seem to be no foreseeable avenues for active defenses. With no way to stop EMS weapons other than destroying them directly, we must rely on the limited protections offered by electronics hardening. Hardening, on its part, is generally only economically viable for military applications, and is almost completely missing from the civilian sphere. This leaves huge tracts of the world utterly vulnerable to attack.

I-HLS: http://bit.ly/1OWPcPu

« NSA Chief Says The Rules of War Do Apply to Cyberwar
Five Things That Happened To Data In 2015 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

SixThirty CYBER

SixThirty CYBER

SixThirty is a venture fund that invests in early-stage enterprise technology companies from around the world building FinTech, InsurTech, and Cybersecurity solutions.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.