EMC and Circuit Protection
Electromagnetic Pulse (EMP) Protection and Restoration Guidelines for Equipment and Facilities, published in 2016. Following the first Gulf War, several national strategies were developed, promulgating methods for initiating a “black-out” war by completely turning off the adversary’s power via cyber, kinetic or EMP activity. Subsequently state sponsors of terrorism and terrorist networks such as ISIS have openly stated that they are exploring these same strategies as a means of delivering their threat. However, such activity is at a national or strategic level and, whilst the results of such large-scale EMP effects are generally recognised, the probability of such events taking place is considered to be relatively low.
In more recent times, the discussion has progressed to concentrate on more directed, localised or tactical EMP events and has expanded beyond the defence arena to include commercial and industrial organisations, public authorities and their infrastructures. It is understood that the effects of tactical EMP attacks are likely to be lesser than strategic EMP ones, but it is equally clear that the threat and probability of those attacks taking place are far greater. What is also recognised is that the likelihood of such EMP occurrences being intentionally generated has also significantly increased. This is commonly referred to as Intentional Electromagnetic Interference (IEMI).
Such IEMI attacks may be driven by a political motive or financial gain, but could just as easily be motivated by a desire for peer group recognition or simply by the challenge of breaching complex computer systems. That could be considered similar to computer hacking or high-level cyber-crime. Nevertheless, whilst the execution of cyber- crime activities calls for specialist skills and expensive and sophisticated equipment, IEMI can be unleashed with a minimum of technical knowledge and has a low cost-of-entry. What is more, the originators of cyber-crime are often eventually traced back and prosecuted. By contrast, unless a perpetrator can be caught in the brief act of delivering an IEMI attack, it is completely untraceable and leaves no evidential trail.
Any search of the Internet will yield a number of YouTube-type instructional videos, showing how to construct an IEMI device. Following such instructions requires little or no prior electrical knowledge, few tools and some common raw materials and components. You can then source your shopping list of these parts, generally available on the Internet, for no more than a few dollars, euros or pounds.
www.cieonline.co.uk
The impact of an attack The method of delivery of any such IEMI attack may differ and can range from a primitive homemade contrivance, a suitcase- size apparatus, up to vehicle-mounted, transportable devices. The method used may be determined by how much the perpetrator is prepared to spend. In carrying out any such IEMI or localised EMP threat, two factors are of primary importance. These are the amount of power that can be generated by the chosen device and how close it is to its target. In general terms, the more power that can be generated by a device and the nearer it is to the target, the greater the effects will be. In cases where these two factors are diminished, the resulting effects may be limited to errors in data or outages with minor disruption to services or operations, or control room monitors freezing for a short period. But, given sufficient power and a reasonable proximity to the target, effects could easily result in entire systems going down and requiring the reset and reboot of servers. In the worst-case scenario, the outcome would be the destruction of electronic equipment, where no data is recoverable from that system.
The most widespread, costly and potentially devastating are likely to be the repercussions of IEMI jamming computer systems inside the critical assets which run our communications, navigation and broadcasting systems, public utilities, transportation, hospitals, datacentres, banks, financial institutions and commodity and stock exchanges.
According to the U.S. Department of Energy’s Lawrence Berkeley National Laboratory, the annual cost of short interruptions (lasting five minutes or less) to the American economy had risen from $52 billion in 2002 to $60 billion in 2014. Estimates from other publicly available information are that up to 25 per cent of power disruptions have an undefined cause. It is now widely understood and accepted that a percentage of these undefined causes are the result of unintentional or intentional EMI or EMP activity.
Disturbingly, at an organisational level, S&C Electric’s (S&C) 2018 State of Commercial & Industrial Power Reliability report found that 18 per cent of companies surveyed had experienced a loss of more than $100,000 as a result of their worst outage, whilst half of customers surveyed had endured outages lasting more than one hour during the past year. The same survey revealed that 25 per cent of companies reported experiencing at least one outage per month. Again, the view is widely held that a percentage of such system downtime is as a result of EMI or EMP activity.
Calculations show that, on average, organisations lose between $84,000 and $108,000 for every hour of IT system downtime, and a 2016 study by the Ponemon Institute for IT and data protection based in Michigan estimated that the cost of a datacentre outage in the USA had grown to $8,851 per minute.
Protecting against IEMI Until 2010 consideration of protection against such EMI and EMP events was almost exclusively limited to military installations and defence-focused organisations around the world. In the main this was due to the only available testing compliance standards being the very onerous U.S. Mil-Std-188-125 and the UK’s Def Stan 59-188. The cost to implement protection compliant with these standards could be prohibitive.
More recently, the publication, for example, of the previously referenced Lloyds Report of 2013 along with the new IEC Standards for IEMI immunity test methods for equipment and systems (IEC 61000-4-36) and Radiated & Conducted HEMP protection (IEC 61000-4-23 & 24) published in 2015 has led to an increase in non-defence- related organisations considering, investing in and implementing protection against IEMI.
For instance, one of Scandinavia’s largest power grid company owners has been implementing EMP protection for a number of years to add resilience to its network. In the USA, a major communications provider nationwide is now exploring in detail how they may best implement protection of their facilities, to ensure the continuity of the services they provide in the case of any localised EMI or EMP event.
This spread of EMI and EMP protection into commercial, public and utility sectors is only set to increase further, with a raft of new legislation and standards updates either already introduced during 2018 or in
consultation for introduction in the very near future.
The Network and Information Security (NIS) EU Law was published in May 2018. This EU Law requires any company providing essential services – such as in banking and finance, public sector, IT, healthcare and transport – to report henceforth all cyber security incidents caused by EMI, EMP or other threats and the extent of any resultant damage and disruption. In the USA Mil-Std-188-125 is due to be updated, whilst in the UK Def Stan 59-188 is also rumoured to be being updated. Moreover, the IEC is due to release further guidance regarding HEMP and IEMI (IEC 61000-5-10). The Critical Infrastructure Protection Act (CIPA) in the USA has been with Congress since 2016 and is expected to be passed into legislation. This Act will make public utility organisations responsible for protecting their own systems and services against the effects of EMI and EMP events, or risk significant punitive fines, should those systems and services be affected as a direct result. This shifting of responsibility to both private and public sector service providers for maintaining and protecting their services in the face of any tactical IEMI attack is a significant development. In addition to the potentially crippling physical, financial and reputational damage that they may cause, the repercussions of IEMI strikes could now be punishable in law, and consequently protective solutions to combat the threat have never been in greater demand. Independent British defence electronics manufacturer MPE supplies resilient filter solutions for just this purpose to markets around the world. MPE has the experience of having provided over ten million filters for EMC, EMP and TEMPEST applications over the past 30 years and is a specialist supplier of high-altitude electromagnetic pulse (HEMP) filters.
www.mpe.co.uk Components in Electronics September 2022 45
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62