Electromagnetic terrorism: protection and counteraction.

elektromagnitnii terrorizm zashita iprotivodeistvie

Electromagnetic terrorism: protection and counteraction..

Electromagnetic terrorism: protection and counteraction.

UKOV Vyacheslav Sergeevich, Candidate of Technical Sciences

ELECTROMAGNETIC TERRORISM: PROTECTION AND COUNTERACTION 

The problems of combating terrorism are becoming more and more urgent every year. Unfortunately, terrorism is developing both “in depth” and “in breadth”. Even a dozen years ago, none of us thought that such a branch of information terrorism as electromagnetic terrorism (ET) already existed. And today, the capabilities of modern technologies force us to look for new methods of protection and counteraction to ET. First of all, the question arises: “How protect the defense systems themselves, which are becoming increasingly vulnerable to electromagnetic terrorism?”

Analysis of security system development trends shows that the most effective in terms of the “efficiency quality” criterion are integrated security systems (ISS), the core of which is a personal computer [1]. However, the practice of operating ISS shows that these systems, unfortunately, also have their weak points, knowledge of which will certainly help the user eliminate the shortcomings and improve the operational, technical and operational characteristics of existing ISS. This primarily applies to methods of protection against Force Destructive Impact(SDV) – a sharp surge in voltage in power supply networks, communications or signaling of security systems with the amplitude, duration and energy of the surge, capable of leading to failures in the operation of equipment or to its complete degradation. In this article, using the example of the ISB, modern possibilities of protection against destructive force impact, both intentional and spontaneous, are considered.

Technical means of destructive force impact (TMFDI) are, in essence, electromagnetic weapons that are capable of remotely and silently striking, for example, any unprotected security system. The main thing is to ensure the appropriate power of the electromagnetic pulse. The secrecy of the attack is significantly increased by the fact that the analysis of damage to the destroyed equipment does not allow for the unambiguous identification of the cause of the damage, since the cause may be either intentional (attack) or unintentional (for example, induction from lightning) destructive force impact. This circumstance allows the attacker to successfully use TMFDI repeatedly.

Main channels of destructive force impact

The analysis shows that a computer or any other electronic equipment of the security system, taking into account the environment of energy transmission, can be subjected to degradation by SDV through three main channels of destructive force impact (FDI):

  • through the power supply network (FDI No. 1);
  • through wire lines (FDI No. 2);
  • through the air using powerful short electromagnetic pulses (FDI No. 3).

The main channels of destructive impact on the integrated security system and defense lines are shown in Fig. 1.


Fig. 1. Main channels of destructive force impact
on the integrated security system of the facility

As can be seen from Fig. 1, the use of SDV, in principle, allows to overcome all standard defense lines in the ISS. Everything is determined by the power of impact, the selected means of protection, the available financial capabilities. These circumstances determine the choice of defense strategy. Let's consider one of them — a two-level defense strategy (TLDS).

The first (internal) level of the DSS involves selecting the appropriate technical means and constantly testing their stability for compliance with regulatory documents (Table 1). The second (external) level involves organizational and technical measures aimed at the maximum possible weakening or blocking of signals from the VLF (in particular, through shielding).

Table 1. Main regulatory documents on testing the immunity of technical equipment to electromagnetic influences

Regulatory document

Full name

Brief content

Note

GOST 29073-91 Electromagnetic compatibility of technical equipment (TE) for measuring, monitoring and controlling industrial processes. Immunity to electromagnetic interference (EI). General Provisions Establishes general requirements for the resistance of TE to EI

(in accordance with IEC 801)

The following EI are considered:

  • electrostatics;
  • pulse interference;
  • radio interference;
  • power supply network interference
GOST 29191-91 (IEC 801-2-88) Electromagnetic compatibility of technical equipment. Immunity to electrostatic discharges. TU and test methods Divides TS by the degree of severity of tests depending on voltage Establishes five degrees of severity of tests of equipment for contact and air discharges
GOST 29156-91 (IEC 801 –4-88) Electromagnetic compatibility of technical equipment. Immunity to nanosecond impulse interference (NPI). TU and test methods Establishes general methods for assessing the quality of operation of technical equipment when NPI affects power supply and input/output circuits Establishes five degrees of test severity separately for power supply and input/output circuits
GOST R 50627 Applies to TS connected to 50 Hz power grids with a load of no more than 16 A (in one phase) Establishes methods for testing TS for resistance to the impact of dynamic changes in network voltage The standard defines five degrees of equipment test severity that differ from GOST 29156
GOST 30374-95/GOST R 50007-92 According to the established requirements, the TS must maintain operability under operating conditions when power supply circuits are exposed to microsecond impulse interference in the form of lightning discharges and switching transient processes. Establishes technical requirements (TR) for the degree of severity of tests and methods for testing for resistance to high-energy microsecond impulse interference Seven degrees of test severity are established depending on the classes of operating conditions (from zero to sixth)
GOST 30375-95/GOST R 50008-92 TS must maintain the specified quality of operation under operating conditions when exposed to electromagnetic fields generated by radio and television transmitters, various installations and other sources Regulates tests that ensure protection of TS from high-frequency interference The impact of industrial radio interference in the range of 26 — 1000 MHz with regulated parameter values ​​​​(six degrees of severity) is considered.
GOST 29216-91 Industrial radio interference from information technology equipment (ITE). Standards and test methods Applies to information technology equipment and establishes standards and methods for measuring industrial radio interference in the frequency band of 0.15 — 1000 MHz ITE is divided into two classes:

  • Class A (outside residential buildings);
  • Class B (in residential buildings)

The main organizational and technical recommendations for protecting security systems from SDV are given in Table 2.

Table 2. General organizational and technical measures for protecting against SDV

No.

Recommendation for protecting security systems from SDV

Note

1. Conduct an analysis of the power supply circuits, internal and external communication channels of the facility, as well as emergency and fire alarm lines to identify possible SDV paths Qualified electricians and communications specialists are involved in the analysis
2. Divide the facility into protection zones and defense lines:

  • Line 1 – protection along the perimeter of the facility;
  • 2 line – floor protection;
  • 3 line – individual protection
For small objects (offices) 1 line may be absent, and 2 line may be reduced to protection of a separate room
3. After installation of the security system, conduct testing for real impacts Special SDV simulators are used for testing
4. Develop appropriate restrictive documents aimed at limiting the possibility of using SDV TS For example, prohibit the use of dedicated network sockets for vacuum cleaners and other equipment in which SDV TS, etc. may be built in.

Force destructive impact on the power supply network

To implement the SDV over power supply networks, special technical means are used that are connected to the network directly using galvanic coupling through a capacitor or using inductive coupling through a transformer. Experts' forecasts show that the probability of using SDV is growing year by year. Therefore, when developing a facility security concept, it is necessary to take into account the possibility of SDV over power supply networks, for which, first of all, it is necessary to classify the technical means of SDV. However, given the specific purpose of these means and the reluctance of the companies that produce them to widely advertise their work, the classification task turned out to be non-trivial. A possible classification of modern technical means of SDV over power supply networks, carried out based on the analysis results, is shown in Fig. 2.

elektromagnitnii terrorizm zashita iprotivodeistvie 2
Fig. 2. Classification of technical means of the SDV by power supply networks

The presented classification is quite clear and does not require additional explanations, with the exception, perhaps, of the class “Special and other TS SDV”. This class includes, in particular, various surrogate TS SDV, available at hand. For example, the nearest transformer substation can be used as a technical means of influence, to the part of the secondary winding of which it is possible to connect a TS SDV with a capacitive storage device, the parameters of which are selected so that the secondary winding of the transformer, the magnetic circuit and the capacitive storage device form a step-up resonant autotransformer. Such a force impact can disable all electronic equipment serviced by this substation. This class also includes means of reprogramming uninterruptible power supplies (UPS) using, for example, software bookmarks. Such a bookmark can be activated by the appropriate command on the power supply network to briefly reprogram the UPS to the maximum possible output voltage, which will also lead to failure of the electronic equipment connected to it.

As an example of the high efficiency of the destructive impact of the TS SDV, we can note relatively inexpensive devices with electrolytic capacitors, having a specific volumetric energy equal to 2000 kJ/m3. Such a device, placed in a regular case, is capable of disabling up to 20 computers simultaneously. The estimated cost of such a case is from 10,000 to 15,000 US dollars. Even more effective are molecular accumulators (ionistors), the specific volumetric energy of which reaches 10 MJ/m3. The TS SDV, containing ionistors, is already capable of disabling all computers of a large computing center. The cost of such a technical device is approximately 50,000 US dollars (the cost and energy parameters of the TS SDV are given to assess the effectiveness of protection).

Recently, a large number of technical means have appeared on the security market that are capable of not only detecting suspicious equipment, but also destroying it if necessary. A striking example of such technical means is the product of the French company “Cofroexport S.A.”, specializing in the field of security and radio communications, in particular, the so-called radio bug detection suitcase, which ensures disablingelectronic means by connecting to a higher voltage line.

Currently, there are two main channels for the penetration of SDV energy through the power supply network:

  • conductive path through the secondary power source (SPS);
  • interference through parasitic capacitive and inductive connections, both internal and external (for example, through signal circuits and communication lines), and, according to the features of the circuitry, the channels of influence can be either symmetrical or asymmetrical.

As an example, we will assess the stability of the components of the main power supply element of the integrated security system – the secondary power source, the typical circuit diagram of which is shown in Fig. 3, and the results of the stability assessment of the elements of the typical secondary power source unit are in Table 3.

elektromagnitnii terrorizm zashita iprotivodeistvie 3
Fig. 3. Schematic diagram of a typical secondary power supply unit

Table 3. Results of assessing the resistance of VIP elements to the effects of SDV

Element
designation

Element type

Energy absorption
capacity, J

Ultimate
Absorption
Capacity, J

Insulation
Strength, V

Note

C1, C2 Capacitor. 0.3   1200 Working voltage: 250 V AC, 1000 V DC
L1, L2 Throttle 0.1   2500 The main thing is insulation between the coils
С3, С4 Condensation. 0.002   1200  
VR1 Varistor 20/40/70/140 respectively

for diameter 7/10/14/20 mm

(3…4000)х10-3   25 ns response time, equipment does not protect against nanosecond interference
VD1…VD4 Half-power diode less than 1 (0.1…1000) x 10-3 600…1000 Permissible current pulse amplitude 60/100/200 A for micro-assemblies at 2/3/4 A
VT1 Transistor less 1 (20…1000)х10-3 500…800  
C5, C6 Condensation. 15   500 Insulation can be broken down with a pulse duration of at least 0.5 ms

As can be seen from the table, the elements of the input LC filter have a very low energy absorption capacity and do not provide protection against powerful impulse interference. Therefore, if the LC filter is the only protection device at the input of the VIP, then the TS SDV to achieve the goal is sufficient to provide the ability to supply powerful impulse interference with an amplitude of 2 kV and an energy of 1-2 J with a sufficiently steep front.

In modern VIPS, the main protection functions against powerful interference are performed by a varistor. However, despite the high levels of operating currents, they have a maximum permissible dissipated power of units of watts, so when exposed to long pulses with a relatively small current, they fail, causing the fuse at the input to burn out. In this case, the TS SDV requires energy of 50-100 J, amplitude — 1 kV, pulse duration — 0.1 s.

To disable the capacitors of the inverter input filter and the diodes of the TS SDV bridge, significantly less energy is required, and to bypass the varistor protection, the difference in the breakdown voltage of the capacitors and the voltage of the effective voltage limitation of the varistor is used, which is 70-120 V. The problem of force action is solved by using pulses with a duration of up to 5 ms, an amplitude of 500-600 V and an energy of 15-25 J. In this case, after the breakdown of the capacitors, an additional current pulse occurs through the bridge diodes, which for a hot thermistor reaches 1000 A, which disables the diodes. With such an impact, it is very likely that transistors and other elements of the inverter will fail, as well as destructive pulses will pass to the VIP output, which will damage other components of the security system.

It is especially necessary to note the possibility of a powerful destructive force impact using interference through parasitic capacitances between the elements and nodes of the circuit. It has been established that the input high-voltage and output low-voltage circuits of VIP equipment (for example, computers) have a capacitive coupling through a parasitic capacitance equal to 10-30 pF, and a parasitic capacitance equal to 5-10 pF connects the power supply network with the elements of the computer motherboard. Through these parasitic capacitances, it is possible to completely block the operation of software and hardware by generating high-voltage pulses with a nanosecond rise time in the SDV TS, including ensuring data distortion, computer freezing and software failures. These destructive impact capabilities impose additional requirements for protection against impulse interference.

Based on the analysis results, it can be concluded that traditional VIPs are insufficient to protect computers and security equipment from SDV. However, as a rule, an additional protection device (UPS, stabilizer, filter, network conditioner, etc.) is installed between the power grid and VIP, which must also be taken into account when assessing resistance to SDV. Uninterruptible Power Supply (UPS) have recently become especially widely used in security systems, and we should dwell on them in particular. These devices are designed to improve the quality of AC power and ensure uninterruptible power supply to equipment in the event of a power grid failure.

By control method, UPS are divided into OFF-LINE and ON-LINE types. The main difference is the choice of the main channel for transmitting energy to the consumer.

For OFF-LINE mode in the main mode, the channel switch connects the UPS input to the output through a branch containing only the input filter. In this case, the batteries are recharged from a low-power charger, and the voltage from the inverter does not go to the source output. In the battery support mode, when the input voltage deviates from the permissible limits or disappears, the channel switch connects the branch containing the inverter, and energy is supplied to the consumer from the batteries.

ON-LINE mode is characterized by constant switching on of the branch containing a powerful charger, battery and inverter to the output of the UPS unit. Such a scheme allows not only to eliminate switching time, but also to provide galvanic isolation of the input-output, to have a stable sinusoidal output voltage. In case of failure of any cascade in the direct branch of energy transfer, overloads, as well as when the batteries are discharged, the channel switch connects the branch connecting the input-output through the filter. This auxiliary path of energy transfer, called bypass (BY PASS), is of particular importance in case of SDV and allows to bypass the UPS protection to defeat more important units of the security system, for example, a computer.

Recently, line interactive UPS have appeared, which are a further development of off-line technology. They are distinguished by the presence of a stabilizing autotransformer at the input, which helps to stabilize the output voltage of the UPS. In some cases, if power interruptions of several milliseconds are acceptable, line-interactive UPS are preferable to off-line type and cheaper than on-line devices.

Usually, when the SDV is detected in the power supply network, the UPS fails, and in this case the bypass is activated and through it the energy of the SDV TS reaches the target bypassing the UPS. In addition, as a rule, in thyristor stabilizers, voltage correctors, and network switches, when the SDV is detected, spontaneous “unlocking of thyristors” occurs contrary to the standard algorithm of the control circuit with an emergency shutdown or failure. Thus, traditional power protection devices not only do not protect security systems from SDV, but are themselves highly susceptible to destructive effects. The main recommendations for protecting security systems from SDV in the power supply network are given in Table. 4.

Table 4. Protection of security systems from SDV via the power supply network

Recommendation for protection of security systems from SDV

Note

Install group protection devices (PD) against SDV on all feeders that go beyond the security service (SS) controlled zone. Install group PDs in SS controlled zones.
Install individual protection on the power supply network of the facility's servers, security systems, and alarm systems. Depending on the tasks being solved, the scope of individual protection can be significantly expanded.
Power panels, distribution boards, sockets, ground terminals, etc. must be placed in rooms controlled by the Security Service. It is not recommended to install sockets in poorly controlled rooms (buffet, warehouse, cloakroom, etc.)
Using a line heterogeneity analyzer, take a control portrait of the electrical network The control portrait is taken after the network installation is completed
To detect unauthorized connections to the network, it is necessary to regularly monitor the current “portrait” of the electrical network and compare it with the control “portrait” This monitoring method is especially effective for detecting sequential type SDV TS
Current maintenance and repair of electrical equipment must be carried out under the supervision of security personnel  
Access to power panels and other electrical equipment must be restricted The restriction is determined by the relevant documents and measures
All electrical equipment, including household equipment, must be carefully checked Pay special attention to UPS, microwave ovens, vacuum cleaners, air conditioners, welding machines
Organize round-the-clock monitoring of the power supply network with simultaneous recording in the log of all failures and damage to equipment, recording the time of failures and the nature of the defects. By analyzing the results, it is possible to timely detect the fact of unauthorized access A wide range of devices can be used as recorders, from simple pulse counters to complexes with a PC
When purchasing electrical equipment for security systems, it is necessary to pay attention to the degree of its protection against impulse interference. Conventional equipment must have a resistance class of at least A, and critical equipment must have a resistance class of at least B. According to IEEE 587-1980, interference

class A: 0.5 μs/6 kV/200 A/1.6 J;

class B: 0.5 μs/6 kV/500 A/4 J

For protection of the 1st line, specially designed interference-proof transformer substations and super filters are best suited. The protection class must be higher than B, i.e. the protection device must be designed for the impact of induced voltages from nearby lightning strikes with a possible pulse current of up to 40 kA. Automatic network switching devices do not protect against SDV due to their low response speed. Thyristor stabilizers and correctors are also of little use. Technical means with a smaller energy reserve can be used to protect the 2nd line, including super filters, voltage correctors and interference suppression transformers.In addition to special filters and voltage limiters, superfilters may contain adaptive energy absorption circuits for the SDV
For protection of the 3rd line, the most optimal are interference-suppressing transformers (transfilters) or a combination of a voltage corrector, limiter and filter. A transfilter is much more effective than other types of filters and voltage correctors Modern transfilter designs ensure the operability of the computer when exposed to powerful impulse interference with an amplitude of up to 10 kV

Force destructive impact on low-current wire circuits

For the penetration of the energy of the LWF through wire lines, it is necessary to overcome the maximum absorption capacity of the components that can be used in the input circuits. Analysis shows that for the degradation of these components (microcircuits, transistors, diodes, etc.), the impact of a pulse with an energy of 1 1000 μJ is sufficient, and this pulse can be very short, since the breakdown time of a MOS structure or pn junction is 10 — 1000 ns. As is known, the breakdown voltages of junctions are from units to tens of volts. Thus, for gallium arsenide devices, this voltage is 10 V, memory devices have threshold voltages of about 7 V, logic integrated circuits (IC) on MOS structures — from 7 to 15 V. And even silicon high-current bipolar transistors, which have increased resistance to overloads, have a breakdown voltage in the range from 15 to 65 V. From this we can conclude that for VDV via wire channels, the energy required is several orders of magnitude lower than via the power supply network, and the destructive effect can be implemented using relatively simple technical means that ensure a high probability of disabling the target of attack. In particular, in this case, any electromagnetic shocker can be used for VDV.

Further analysis should be carried out taking into account the presence of impulse interference protection devices at the input. In this case, the protected components have a significantly higher maximum energy absorption capacity (up to 1–10 J for low-speed devices and up to 1–10 mJ for high-speed devices). However, due to high prices, high-quality protection devices have not yet found wide application in Russia. The classification of SDV TS by wire lines is shown in Fig. 4.

elektromagnitnii terrorizm zashita iprotivodeistvie 4
Fig. 4. Classification of low-current devices by wired low-current lines

The main recommendations for protecting security systems from low-current devices via wired lines are given in Table 5.

Table 5. Protecting a security system from low-current devices via wired lines

Recommendation for protecting security systems from low-current devices

Note

Install devices for protection against SDV on all wired communication lines and emergency and fire alarm systems that go beyond the security service control zone Locations for installing cabinets with SDV are selected in zones controlled by the security service
To detect unauthorized connections to wire lines, use a heterogeneity analyzer to take a control “portrait” of the network. Systematic comparison of the current and control “portraits” of the network ensures detection of unauthorized connections The control “portrait” is taken only after the complete installation of the wire line network
Repair work and routine maintenance of equipment, communication lines and alarm circuits of the security system must be carried out under the supervision of the security service  
Access to communication and alarm lines, sensors, cross panels, mini-PBX and other elements of the security system must be restricted Restriction is provided by relevant documents and technical means
It is undesirable to place network equipment (routers, TS, cross, etc.) on the external walls of the facility In this case, there is a high probability of successful SDV from an uncontrolled zone
It is advisable not to use the generally accepted topology of laying wire communication and signaling lines along the wall parallel to each other, since it is ideal for attacking an object using a SDV TS with a contactless capacitive injector. It is advisable to use multi-pair communication cables with twisted pairs Otherwise, using a flat surface-mounted electrode and a SDV TS, the equipment can be disabled by an intruder in 10 — 30 s
When purchasing security system equipment, it is necessary to take into account the degree of its protection against impulse interference. The minimum degree of protection must comply with GOST R 50746-95 with a test severity level of 3 – 4 For more detailed information, see the journal “Confidential. Information Security”, No. 2, 1998
To protect the 1st line, it is necessary to install protection of all wire lines from overvoltage using air arresters and varistors. Communication and signaling cables must be shielded using metal sleeves, pipes and boxes. Protection is installed both between communication lines and between each of the conductors and the ground loop
To protect the 2nd line, you can use combined low-threshold interference protection circuits from such elements as gas arresters, varistors, combined diode limiters, RC and LC filters and other elements. It is advisable to install a group protection device made in the form of a cabinet with a lock
To protect the 3rd line, it is necessary to use protection schemes that are as close as possible to the protected equipment Protection schemes for the 3rd line are usually integrated with connectors, sockets, computers, etc.

Wireless destructive force impact

The most hidden and most effective is the channel of forceful destructive action via the ether using a powerful short electromagnetic pulse. In this case, it became possible to implement fairly compact electromagnetic technical means of the VLF, placed outside the object of attack and at a sufficient distance from communications to mask the attack. The design of the electromagnetic TS VLF using the example of a generator with a virtual cathode (vircator) is shown in Fig. 5.

elektromagnitnii terrorizm zashita iprotivodeistvie 5
Fig. 5. Design of high-frequency electromagnetic TS SDV

As can be seen from Fig. 5, the design of the vircator is quite simple. Its operating principle can be described just as simply. When a positive potential of about 105 – 106 V is applied to the anode, a flow of electrons rushes from the cathode to the anode due to explosive emission. After passing through the anode grid, it begins to slow down due to its own “Coulomb field”. This field reflects the electron flow back to the anode, forming a virtual cathode. After passing through the anode in the opposite direction, the electron flow slows down again at the surface of the real cathode. As a result of such interaction, a cloud of electrons is formed, oscillating between the virtual and real cathodes. The microwave field formed at the oscillation frequency of the electron cloud is radiated by the antenna through the fairing into space. The currents in the vircators, at which generation occurs, are 1 – 10 kA. Experimentally, powers from 170 kW to 40 GW in the centimeter and decimeter ranges have already been obtained from vircators.

The injection of a powerful electromagnetic pulse in such a VLF TS is carried out using a special antenna system, the efficiency of which largely determines the operational and technical characteristics of the entire VLF complex. Despite the presence of a directional antenna, a powerful electromagnetic signal (EMS) affects all components within the electromagnetic impact zone and all circuits formed by connections between equipment elements when attacking an object, therefore, not being a means of selective impact, VLF TS inflict global damage, justifying the established concept of an “electromagnetic bomb”.

The urgency of the problem of protection against electromagnetic VHF increases also because at present some research works have ended with the development of prototypes of information weapons. Thus, of interest is the American prototype of this class of weapons under the conditional name MPS-II, which is a high-power microwave radiation generator using a mirror antenna with a diameter of 3 m. This prototype develops a pulse power of about 1 GW (voltage 265 kV, current 3.5 kA) and has great capabilities for waging information warfare. Thus, in the manual for its use and technical maintenance, its main characteristic is defined: the defeat zone is 800 m from the device in a sector of 24 degrees [2]. Moreover, it is important to note that people with electronic heart pacemakers are prohibited from accessing the device. Using this device, you can effectively erase not only credit cards, but also records on magnetic media.

The use of new technologies, in particular, phased antenna arrays, allows for the implementation of VLF on several targets at once. An example is the GEM2 system, developed by order of Boeing by the South African company PCI, which consists of 144 solid-state emitters of pulses with a duration of less than 1 ns with a total power of 1 GW. This system can be installed on mobile objects. Even the examples considered indicate the great possibilities and high efficiency of the new information weapon, which must be taken into account when ensuring the protection of information, especially since the combat use of such weapons in a missile version was already recorded during the Gulf War.

The analysis shows that the most dangerous TS VLF for integrated security systems are technical means of destructive force action via the air using an electromagnetic pulse (wireless TS VLF). This is especially true for powerful mobile TS VLF, the destructive action of which can be carried out from an unguarded area. Unfortunately, the lack of open information on this type of TS VLF significantly complicates their classification. The classification of wireless TS VLF used in this work is shown in Fig. 6.

elektromagnitnii terrorizm zashita iprotivodeistvie 6
Fig. 6. Classification of VLF TS by ether (wireless VLF TS)

When analyzing the possibilities of using VLF TS, it should be noted that the most convenient to use and the most advanced in research are high-frequency electromagnetic VLF devices, including magnetrons, klystrons, gyrotrons, free-electron lasers, plasma-beam generators, as well as the vircators discussed above, which, although they have low efficiency (units of percent), are the easiest to tune in frequency. Plasma-beam generators are the most broadband, and the peculiarity of gyrotrons is that they operate in the millimeter range with high efficiency (tens of percent).

However, one of the first examples of electromagnetic weapons, which was demonstrated back in the late 1950s at the Los Alamos National Laboratory in the United States, was a generator with explosive compression of a magnetic field [3].

Subsequently, many modifications of such a generator were developed and tested, for example, in the USA, developing an impact energy of tens of megajoules, and the peak power level reached tens of terawatts, and the current produced by the generator was 10 — 1000 times greater than the current generated by a lightning discharge [4]. At present, some of these models have already been adopted for service and have been successfully tested in the Persian Gulf, Yugoslavia, etc. Unfortunately, there have been many examples of how military equipment becomes the property of terrorists after some time. This happens especially often with technical means of the tactical level (low-power means). And you should not wait for the «thunder to strike». Despite the fact that statistics on the use of VDV are not kept today (as a rule, incidents are attributed to natural disasters such as thunderstorms, static, random coincidences, etc., and it is very difficult to identify them), the probability of using VDV today is very high. Therefore, the problem of protection from electromagnetic VLF, being very relevant, requires its solution. The main recommendations for protecting security systems from electromagnetic VLF via the air are given in Table 6.

Table 6. Protection of security systems from electromagnetic VLF via the air

Recommendation for protecting security systems from electromagnetic VLF

Note

The main method of protection against VLF is shielding at all boundaries of both equipment and premises. If it is impossible to shield the entire premises, it is necessary to lay communication and signaling lines in metal pipes or along a wide grounded strip of metal, and also to use special protective materials As a shielding material, you can use metal, fabric, protective paint, film, special materials
Multi-line protection from VLF over the air is organized similarly to protection over the power supply network and over wire lines See similar items in Tables 4, 5
Instead of conventional communication channels, use, if possible, fiber-optic lines The use of fiber-optic lines also protects against possible information leakage
In protected areas, pay special attention to protection over the power supply network, using, first of all, arresters and a shielded power cable Note that traditional power supply filters from interference here do not protect against VLF
Consider the need to eliminate any parasitic emissions from both the protected and auxiliary equipment of the facility The radiation not only unmasks the equipment, but also facilitates the targeted targeting of wireless VLF vehicles
Security personnel must take into account that VLF is usually organized over the air from a zone not controlled by the security service, while its destructive effect is carried out throughout the entire territory of the facility Expansion of the security service control zone is possible through the use of television monitoring outside the facility

More detailed information on protection against ET can be found in the literature provided and on Internet sites.

Thus, destructive force impact, implemented via wired and wireless channels, as well as via power supply networks, is currently a serious weapon against object protection systems, in particular, integrated security systems and protected premises. This weapon justifies its name «electromagnetic bomb» and is more formidable in terms of its effectiveness than software destructive weapons for computer networks. Analytical studies show that new technologies make technical means of destructive force impact increasingly promising for use and require more attention, primarily from security services and developers of protection systems. By the way, not only equipment but also people suffer from SDV. But this is another, no less urgent problem, which you will read about in the next issues of the magazine.

Literature

1. Ukov V.S. Security: technologies, means, services. — M.: KUDITS — IMAGE, 2001.
2. Winn Schwartau. More about HERP than some? — Information Warfare: Thunder’s month press, New York, 1996.
3. Carlo Kopp. The E-bomb — a Weapon of Electronical Mass Destruction. — Information Warfare: Thunder’s month press, New York, 1996.
4. David A. Fulghum. Microwave Weapons Await a Future War. — Aviation Week and Space Technology, June 7, 1999.

    Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
    Принять