The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s assessment of the effects of a high altitude electromagnetic pulse (EMP) attack on our critical national infrastructures and provides recommendations for their mitigation. The assessment is informed by analytic and test activities executed under Commission sponsorship, which are discussed in this volume. An earlier executive report, Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) — Volume 1: Executive Report (2004), provided an overview of the subject. The electromagnetic pulse generated by a high altitude nuclear explosion is one of a small number of threats that can hold our society at risk of catastrophic consequences. The increasingly pervasive use of electronics of all forms represents the greatest source of vulnerability to attack by EMP. Electronics are used to control, communicate, compute, store, manage, and implement nearly every aspect of United States (U.S.) civilian systems. When a nuclear explosion occurs at high altitude, the EMP signal it produces will cover the wide geographic region within the line of sight of the detonation.1 This broad band, high amplitude EMP, when coupled into sensitive electronics, has the capability to produce widespread and long lasting disruption and damage to the critical infrastructures that underpin the fabric of U.S. society.
- EMP Commission,
- Infrastructure Protection,
- Infrastructure Assurance,
- Intentional EMI,
- Information Warfare
Available at: http://works.bepress.com/george_h_baker/17/