Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

System Vulnerabilities

PDF

Social and Behavioral Sciences

Publication Year

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii May 2012

Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii

George H Baker

EMP and solar storm wide geographic coverage and ubiquitous system effects beg the question of “Where to begin?” with protection efforts. Thus, in addressing these “wide area electromagnetic (EM) effects,” we must be clever in deciding where to invest limited resources. Based on simple risk analysis, the electric power and communication infrastructures emerge as the highest priority for EM protection. Programs focused on these highest risk infrastructures will go a long way in lessoning societal impact. Given the national scope of the effects, such programs must be coordinated at the national level but implemented at local level. Because wide-area EM …


Proceedings Of The 2009 Nrc Federal Facilities Council/James Madison University Symposium On Protecting Large Facility Complexes;, George H. Baker, Cheryl E. Wilkins Apr 2010

Proceedings Of The 2009 Nrc Federal Facilities Council/James Madison University Symposium On Protecting Large Facility Complexes;, George H. Baker, Cheryl E. Wilkins

George H Baker

Large, complex facilities pose unique protection challenges involving multidisciplinary expertise and collaboration among government, academia, and the private sector. The symposium served as a forum for sharing experiences in dealing with large facility catastrophic events and risk management. The symposium was organized based on the value of interaction among different people representing diverse disciplines. In many instances, such interactions lead to solutions that would not have been developed within disciplinary stovepipes. The venue was divided into three panels addressing physical security, cyber security, and real facility case studies. We were also privileged to have three keynote speakers including Dr. Charles …


Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle Jul 2008

Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle

George H Baker

Because the operation and control of most critical infrastructures are highly dependent on electronics, it is important to understand the vulnerability of those electronics to intentional electromagnetic interference (EMI). The possibility of interference using readily available consumer devices is a particular concern. We investigated the feasibility and effectiveness of using compact stun guns to intentionally interfere with electronic systems. Test articles included individual computers and computers networked through a central hub. 60KV and 600KV devices were used in the experiments. Results indicate that stun guns are effective in disabling digital electronic systems.


Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham Jul 2008

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham

George H Baker

The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …


Cascading Infrastructure Failures: Avoidance And Response, George H. Baker, Cheryl J. Elliott Dec 2007

Cascading Infrastructure Failures: Avoidance And Response, George H. Baker, Cheryl J. Elliott

George H Baker

No critical infrastructure is self-sufficient. The complexity inherent in the interdependent nature of infrastructure systems complicates planning and preparedness for system failures. Recent wide-scale disruption of infrastructure on the Gulf Coast due to weather, and in the Northeast due to electric power network failures, dramatically illustrate the problems associated with mitigating cascading effects and responding to cascading infrastructure failures once they have occurred.

The major challenge associated with preparedness for cascading failures is that they transcend system, corporate, and political boundaries and necessitate coordination among multiple, disparate experts and authorities. This symposium brought together concerned communities including government and industry …


Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg Nov 2002

Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg

George H Baker

Our critical national infrastructure systems have become almost universally dependent upon computer-based control systems technically referred to as supervisory control and data acquisition (SCADA) systems. SCADA systems evolved from the telemetry and event-alarm systems developed in the early days of utilities. With the widespread use of SCADA systems, computers have become the "basis element" for much of our critical infrastructure. Thus, the disruption of controlling computer terminals and networks due to natural disasters, electric power failure, accidents or malicious activity can have catastrophic consequences.