Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Electrical and Computer Engineering

PDF

System Vulnerabilities

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle Jul 2008

Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle

George H Baker

Because the operation and control of most critical infrastructures are highly dependent on electronics, it is important to understand the vulnerability of those electronics to intentional electromagnetic interference (EMI). The possibility of interference using readily available consumer devices is a particular concern. We investigated the feasibility and effectiveness of using compact stun guns to intentionally interfere with electronic systems. Test articles included individual computers and computers networked through a central hub. 60KV and 600KV devices were used in the experiments. Results indicate that stun guns are effective in disabling digital electronic systems.


Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham Jul 2008

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham

George H Baker

The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …


Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg Nov 2002

Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg

George H Baker

Our critical national infrastructure systems have become almost universally dependent upon computer-based control systems technically referred to as supervisory control and data acquisition (SCADA) systems. SCADA systems evolved from the telemetry and event-alarm systems developed in the early days of utilities. With the widespread use of SCADA systems, computers have become the "basis element" for much of our critical infrastructure. Thus, the disruption of controlling computer terminals and networks due to natural disasters, electric power failure, accidents or malicious activity can have catastrophic consequences.


A Unified Topological Approach To Electromagnetic Environmental Effects Protection, George H. Baker, J. Philip Castillo, Edward F. Vance Jun 1995

A Unified Topological Approach To Electromagnetic Environmental Effects Protection, George H. Baker, J. Philip Castillo, Edward F. Vance

George H Baker

The presentation recommends an approach for unifying electronic system protection designs for a wide spectrum of electromagnetic environments. A general electromagnetic topological construct is developed as the basis for a consistent shielding and terminal protection methodology. Spectral characteristics of multiple interfering electromagnetic sources, both internal and external, are described. Effects addressed include EMI/EMC, lightning, nuclear EMP, and RF weapons. Protection practices for individual effects are discussed and means for integrating these into a single protection topology.