US Critical Infrastructure Is Vulnerable To Electromagnetic War

source: Metatech

With nearly every aspect of modern life relying on computers and electronics, the dangers of electromagnetic pulse (EMP) weaponry cannot be overstated. An EMP attack could fry all non-shielded electronics, crippling infrastructure and paralysing both vital and non-vital services.

 Recently, John McAfee – cyber-security expert, former CEO of McAfee antivirus fame, presidential candidate, and sometime fugitive – joined the ranks of analysts warning against the dangers of EMPs. Up to 90% of the population in areas affected by a large-scale attack could perish within months due to crumbling infrastructure and services unable to function, McAfee warns.

The risk of belligerent state actors and terrorist organisation employing modified nuclear warheads to incapacitate the entire continental United States in one fell swoop, engendering enormous loss of lives and economic devastation, is very real. Peter Vincent Pry, executive director of the Task Force on National and Homeland Security and a former CIA nuclear-weapons analyst, testified before the Congress that North Korea is working on such weapons. Natural phenomena such a significant solar storms could cause the same devastation. As yet, there are no defences against electromagnetic pulses.

But the dangers of foes abusing capabilities in the electromagnetic spectrum are not limited to electromagnetic pulse weapons, a new report from the Centre for Strategic and Budgetary Assessments details. “Winning the Airwaves: Sustaining America’s Advantage in the Electronic Spectrum” details the dangers of electromagnetic systems (EMS) warfare. Rather than dealing a single devastating blow, EMS warfare involves stealthy tactics on a much smaller scale that can compromise local military computer systems and operational data procurement.

The report warns that in the covert EMS battlefield, the United States is close to losing its technological advantage. The authors state that following the end of the Cold War, the US failed to advance EMS technology enough, which “provided China, Russia, and other rivals with an opportunity to field systems that target vulnerabilities in sensor and communication networks the US military has come to depend on.”

The “Winning the Airwaves” report paints a grim picture. Failing to allocate the necessary investments the US allowed its rivals to overtake it in several fields. China, Russia, as well as others, have “fielded radars that operate outside the frequency range of US jammers, and developed their own jammers that are capable of targeting frequencies used by US sensors and radios,” and have deployed “large, complex sensor arrays that outrange most sensors carried by US power projection forces.”

Following the infancy of the field in World War II, where crude jammers could interfere with friendly equipment as well as that of foes, active countermeasures were developed. These employ sophisticated communications jammers and chaff to confuse enemy radar. The next phase ushered the “stealth” era, with stealth planes, low-power communications, and passive sensors. EMS warfare has now entered its third stage, according to the report.

“Winning the Airwaves” cites several hurdles to upgrading America’s EMS strategy, including the significant costs of upgrading the vast reserves of military equipment, regulatory hurdles, and the challenges of power projection to lands where adversaries possess a “home field advantage.”

The report posits some suggestions for increasing America’s edge. Deploying large-scale passive-sensor networks, the US can harness the vast reserves of computational power at its disposal to assemble thorough profiles on enemy movements. Using its technological prowess, the US can quickly engineer effective counter-measures against enemy technology. The reports puts emphasis on “low-to-no-power” systems that can operate while emitting practically no radiation, thus depriving the enemy of a target to aim their systems at.

Two warnings emerge from the report.

One is that an American focus on EMS weapons could kick-start a global EMS arms race. These systems, when developed, could fall into the hands of terrorist, who could use them to ruinous results.

Second, there seem to be no foreseeable avenues for active defenses. With no way to stop EMS weapons other than destroying them directly, we must rely on the limited protections offered by electronics hardening. Hardening, on its part, is generally only economically viable for military applications, and is almost completely missing from the civilian sphere. This leaves huge tracts of the world utterly vulnerable to attack.

I-HLS: http://bit.ly/1OWPcPu

« NSA Chief Says The Rules of War Do Apply to Cyberwar
Five Things That Happened To Data In 2015 »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

Beauceron Security

Beauceron Security

Beauceron's cloud-based platform gives employees a powerful personal cyber-risk coach empowering them to improve their cybersecurity practices and behaviours.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Arelion

Arelion

Arelion is a leading light in global connectivity and we've been keeping the world connected for nearly three decades.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.

Conifers

Conifers

Empower your existing SecOps team with the strength of AI - achieve SOC excellence with Conifers CognitiveSOC.

Modat

Modat

Modat is an AI-powered, research-driven company focused on developing products and services that enable cybersecurity professionals to outpace adversaries.

DevOcean

DevOcean

DevOcean, the leader in Cybersecurity Exposure Remediation, helps organizations cut through the chaos by automatically consolidating, prioritizing, and streamlining fixes.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.