Open Access. Powered by Scholars. Published by Universities.®

Physics Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Computer Engineering

PDF

Electronics Vulnerability

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Physics

Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle Jul 2008

Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle

George H Baker

Because the operation and control of most critical infrastructures are highly dependent on electronics, it is important to understand the vulnerability of those electronics to intentional electromagnetic interference (EMI). The possibility of interference using readily available consumer devices is a particular concern. We investigated the feasibility and effectiveness of using compact stun guns to intentionally interfere with electronic systems. Test articles included individual computers and computers networked through a central hub. 60KV and 600KV devices were used in the experiments. Results indicate that stun guns are effective in disabling digital electronic systems.


A Unified Topological Approach To Electromagnetic Environmental Effects Protection, George H. Baker, J. Philip Castillo, Edward F. Vance Jun 1995

A Unified Topological Approach To Electromagnetic Environmental Effects Protection, George H. Baker, J. Philip Castillo, Edward F. Vance

George H Baker

The presentation recommends an approach for unifying electronic system protection designs for a wide spectrum of electromagnetic environments. A general electromagnetic topological construct is developed as the basis for a consistent shielding and terminal protection methodology. Spectral characteristics of multiple interfering electromagnetic sources, both internal and external, are described. Effects addressed include EMI/EMC, lightning, nuclear EMP, and RF weapons. Protection practices for individual effects are discussed and means for integrating these into a single protection topology.