Friday, March 13, 2015

Electro Magnetic Pulses...... Damn it can be made O_o!!

In the 2001 action movie Ocean’s Eleven, criminals use an electromagnetic weapon to black out a portion of Las Vegas. Very futuristic, you may say, but the threat is real and growing.
The problem is growing because the technology available to attackers has improved even as the technology being attacked has become more vulnerable. Our infrastructure increasingly depends on closely integrated, high-speed electronic systems operating at low internal voltages. That means they can be laid low by short, sharp pulses high in voltage but low in energy—output that can now be generated by a machine the size of a suitcase, batteries included.
Electromagnetic (EM) attacks are not only possible—they are happening. One may be under way as you read this. Even so, you would probably never hear of it: These stories are typically hushed up, for the sake of security or the victims’ reputation. Occasionally, though, an incident comes to light.
In May 2012, for instance, the Korea Herald reported that over 500 aircraft flying in and out of South Korea’s Incheon and Gimpo airports reported GPS failures, as did hundreds of ships and fishing boats in the sea west of Incheon Airport. The source of the EM fields was traced to the North Korean city of Kaesong, about 50 kilometers north of Incheon. South Korean officials indicated that North Korea had imported truck-based jamming systems in 2010 that had the capability to jam GPS signals. These officials speculated that one purpose of the jamming was to interfere with South Korea’s highly digital society. Or perhaps the North Koreans were conducting an experiment, using South Korea as their beta tester.
In decades past, the few key electronic systems that existed worked at higher voltages than today’s machines and at lower frequencies, making them less sensitive to EM disruption. Today, though, any digitally controlled infrastructure presents a target: Power, telecommunications, finance, water, natural gas, and more are all coming under the ever-finer control of computers. Right now the power systems in developed areas of the world areinstalling smart power meters in homes and businesses, along with communications systems to transmit the data. The new wave of distributed renewable power systems requires additional sensors to determine their operating status, so that the grid can operate efficiently and avoid collapse. The increased need for information and the means to communicate it make all these systems vulnerable to anyone who may wish to create problems—and that means hackers, criminals, vandals, and terrorists.
And, unlike other means of attack, EM weapons can be used without much risk. A terrorist gang can be caught at the gates, and a hacker may raise alarms while attempting to slip through the firewalls, but an EM attacker can try and try again, and no one will notice until computer systems begin to fail (and even then the victims may still not know why).
Governments and professional organizations have been aware of the problem (called intentional electromagnetic interference, or IEMI) at least since the 1990s; in the wake of attacks like the one in South Korea, they began to take it seriously. For instance, in 2012 the European Union began funding three projects to deal with assessing EM attacks and protecting critical infrastructures from them. One project, known as Secret (Security of Railways against Electromagnetic Attacks), is meant to find ways to prevent the jamming of railroad equipment that uses the new GSM-Railway wireless communication standard. It’s not enough to patch holes that bad actors have discovered; we must also try to anticipate attacks that haven’t yet occurred. It may seem strange that we should find ourselves in need of defending against electromagnetic generators, a kind of weapon most people have still never heard of. The reason is obvious: Not only is it getting easier to make these generators, but we are also becoming more dependent on the data networks those generators threaten.
The recipe for frying a network is simple. Begin with a generator, fold in a battery, and garnish with either an antenna to propagate the output or a hardwired connection into the building you have targeted. Even a briefcase-size model could generate EM fields with peaks in the thousands of volts per meter, and those peaks would come fast and short, with a rise time of about 100 picoseconds and a pulse width of about 1 nanosecond. Such a pulse would contain frequencies between 100 megahertz and several gigahertz.
Whether the attacker transmits via an antenna or a hardwired connection depends on circumstances. The radiated field method gives attackers greater flexibility, but the power decreases rapidly the farther they are from the target. A hardwired approach lets attackers put the pulsed power where they want it without as much wastage, but it does require that they get close enough to the target to make the physical connection. Even this needn’t be very hard: Many commercial buildings have vulnerable communications cabinets and external power outlets, as Daniel Månsson, at the KTH Royal Institute of Technology, in Stockholm, has documented.


An attack might be staged as follows. A larger electromagnetic weapon could be hidden in a small van with side panels made of fiberglass, which is transparent to EM radiation. If the van is parked about 5 to 10 meters away from the target, the EM fields propagating to the wall of the building can be very high. If, as is usually the case, the walls are mere masonry, without metal shielding, the fields will attenuate only slightly. You can tell just how well shielded a building is by a simple test: If your cellphone works well when you’re inside, then you are probably wide open to attack.
When the pulsed fields enter the building, they induce a current in the internal wiring that flows into the electronics, either damaging the equipment or just producing a disruption, which in turn might require a manual restart or corrupt some data.
The fields are of two kinds: narrowband and wideband. A narrowband waveform is essentially a single frequency of power, delivered over a period of anywhere from 100 ns to several microseconds. Narrowband attacks are usually of very high power, on the order of thousands of volts per meter. Achieving such strong fields is fairly easy because the electrical energy is concentrated in a narrow band. The frequency can be optimized for one purpose and then modulated for another. For instance, the attackers might beam in a gigahertz wave—perfect for penetrating small apertures in equipment cases—and then modulate it to produce a lower-frequency signal (just as AM radio is modulated to encode music). That lower-frequency signal, in turn, is intended to pour energy into the electronics inside the case. But the attack will succeed only if the frequency matches the resonance pattern in the equipment. If no resonance occurs, or if the resonance is confined to just a portion of the equipment, then the effect will be much less serious, or nonexistent. To increase the odds that such “coupling” occurs, the attacker can continue to shift the signal to other frequencies.
Wideband (sometimes called ultrawideband) packs a different punch. Here, the power of each pulse is spread over a range of frequencies, for example, from 100 MHz to 1 gigahertz. If the range is wide enough—that is, if the ratio of the highest to the lowest frequencies in a single pulse is 10 or more—it’s considered hyperband. There’s less power at any one frequency, and that means less damage will be inflicted per pulse than in a narrowband attack. But wideband pulse generators can easily produce 1,000 pulses per second for many minutes at a time, and that greatly increases the chance of damaging a system, or at least interfering with communications through a straightforward denial of service. Yury Parfenov, of the Russian Academy of Sciences, Joint Institute for High Temperatures, has demonstrated how a high repetition rate can reduce wired Ethernet communications to nearly zero.


And because each pulse requires minimal energy to generate, the energy supply for such a weapon is modest compared to what a narrowband weapon requires. In our laboratory at Metatech Corp., an EM consultancy in Goleta, Calif., we have built a power supply from an automobile battery and an inverter, and it can operate our wideband pulser for days without losing its charge.
Over the past 15 years, our laboratory and others in Germany, Norway, Russia, Sweden, and the United Kingdom have conducted hundreds of experiments studying how commercial equipment holds up to both narrowband and wideband attacks. The emphasis has been on personal computers, alone and in networks, but more recent testing has included cash machines, industrial control equipment, substation electronics, power supplies, Ethernet components, Wi-Fi networks, automobiles, GPS electronics, cellular phones, tablets, and various sensors.
Computers and other systems based on microprocessors turn out to be vulnerable to radiated narrowband fields above 30 volts per meter, although newer high-speed PCs appear to be resistant up to about 300 V/m at some frequencies. That’s largely because U.S. and European rules now limit the amount of EM radiation that such machines can emit to the 1- to 10-GHz range, and those rules have had the effect of increasing the machines’ shielding. What’s more, as the frequency rises from 1 to 10 GHz, computers become less vulnerable to narrowband attack, according to experiments by Richard Hoad at QinetiQ Group, a defense technology company in England. That’s good news, but remember, not all industrial computers use high-speed processors. Slower microprocessors (present in programmable logic controllers, for example) don’t emit in the gigahertz range, and so they are not well protected against EM attacks in that same frequency range.
In other experiments, Hoad has determined that the presence of metal connecting cables typically increases the vulnerability of the computer equipment. Attacking and damaging small handheld equipment that has no connected cables, by contrast, requires very high fields, usually with peaks greater than 5 kilovolts per meter.
Cables also weaken the defenses of industrial and power-system controls, as shown by Edward Savage, my colleague at Metatech. He simulated attacks, then found that a disproportionate number of equipment failures had originated in cable interface cards. This work suggests that for hooking together the nodes of a network, fiber-optic cable (without metal components) is definitely preferable to copper cable.
Other researchers around the world have determined which kinds of wideband pulses are most dangerous to which kinds of equipment. For instance, a peak electric field of about 2 kV/m for pulse widths on the order of 200 ps can disrupt microprocessor-based systems enough to force administrators to push the reset button (although resets do not always work and sometimes the operating system must be reloaded). Peaks at around 5 kV/m will fry the chips beyond redemption.
In these experiments, the field strengths were determined by placing the targeted equipment within the line of sight of a radiating antenna. Of course, if the way is blocked by windowless walls, particularly walls that contain metals, the fields will be attenuated and any damage or disruption will be diminished, if not prevented.
Our electronics are vulnerable for a simple reason: They were designed to handle naturally occurring electromagnetic radiation, but not the malicious sort. By design, they resist narrowband electric fields below 10 V/m for frequencies above 80 MHz; if they didn’t, they’d suffer interference from any passing mobile phone or walkie-talkie, and you’d have trouble operating your PC whenever you received a phone call on your handset. Today’s electronic products can also withstand a certain level of electrostatic discharge; otherwise, the gentlest spark from a finger on a dry winter’s day would be enough to scramble a computer’s brains. Electrical and communication cables also have a certain amount of built-in electromagnetic immunity.


The typical specification (such as the standard IEC 61000-6-1) requires that your home computer, for instance, must survive a 1-kV pulse in the cable—a pulse that can itself be induced by a transient EM field of 1 kV/m. Greater protection is typically required in special cases, such as in a power-generating facility or substation. The usual test for electromagnetic immunity involves waveforms with rise times as fast as 5 ns and pulse widths as long as 700 ms—far less threatening than the faster pulse rates that attackers are capable of sending.
Take the Jolt simulator, an experimental wideband generator developed by the U.S. Air Force (anddescribed in the Proceedings of the IEEE in July 2004). It produced an electric field of 50 kV/m from 100 meters away, inducing voltages of 50 kV on short cables. That’s more than 10 times what it takes to wreck most unprotected electronics!
Obviously, the mandated immunity levels of commercial electronics are too low to protect against EM weapons. We must take steps to harden them, especially the electronics that control our critical infrastructures.
The first line of defense should be putting as much distance as possible between you and the attacker. For instance, you could surround a building with a broad green meadow protected by fences, thus taking advantage of the falloff in an antenna’s electric field strength with distance. That’s not always possible, of course, so at the very least, you should locate critical equipment away from the building’s outermost walls.
The second line of defense involves the building in which the sensitive electronics are housed. No cable should enter the building without first passing through a specially designed surge arrester and a filter protection device coupled to a low-inductance grounding system. The surge arrester will“clip” a high-voltage pulse, but it will also generate some additional high-frequency noise, which the filter protection device will remove. The third line of defense lies in the walls themselves. Ideally, they should contain no windows, which are rather transparent to high-frequency EM fields; if there must be windows, cover them with metal screens. You should harden the walls with metal, such as concrete reinforced with rebar or even metallic wallboard. Best of all is a complete metal shield.
If you can’t seal the entire building, you might instead consolidate critical equipment into a room with a solid metallic wall or a specially designed metal screen. Call this the fourth line of defense. Hospitals already use such “screens” to shield powerful MRI machines; here the purpose is not to keep electromagnetic radiation out but to keep it in (so that it doesn’t damage computer systems in other rooms).
Finally, you can try to limit the damage should an attack occur. To reduce the coupling of the fields to the cables and equipment, for instance, you can lay the cables along metallic surfaces, cover the cables and connectors with shielding, and install surge protectors at the connection of the cables to each piece of electronic equipment. Even better: Connect these nodes with optical cable rather than metallic wire.
Another obvious way to limit the damage once an EM attack is under way is to shut things down fast. To do that, you need an EM detector to sound the alarm. That’s more difficult than it may seem because it requires a detector that can handle all possible attacks, from narrowband to hyperband. Researchers at QinetiQ have built and tested prototype detectors that are good up to 8 GHz, but it will be some time before these products reach the market. Still, even an imperfect alarm would be welcome. Even if it can’t mitigate an attack, the information it records could later help forensic analysts to reconstruct the course of events.

Research on cost-effective defenses against EM attack goes on, notably through the International Electrotechnical Commission, in Geneva, the IEEE’s Electromagnetic Compatibility Society, and Cigré, in Paris, which studies the reliability of high-voltage power grids. Meanwhile, the operators of threatened facilities must make the best use of the methods that are now available. It’s the job of the engineering community to bring those methods to light.

Thursday, September 11, 2014

SKYNET - A nightmare that's about to come true


According to an article published in a scientific magazine, Google and NASA have now teamed up to purchase a 512-qubit quantum computer from D-Wave (D-Wave Systems, Inc. is a quantum computing company, based in Burnaby, British Columbia). The computer is called "D-Wave Two" because it's the second generation of the system. The first system was a 128-qubit computer. Gen two is now a 512-qubit computer.

This does not mean the gen two system is merely four times more powerful than the gen one system. Thanks to the nature of qubits, it's actually 2 to the power of 384 times more powerful (2384) than the gen one system. In other words, it out-computes the first D-Wave computer by a factor so large that you can't even imagine it in your human brain.

According to Google and NASA, this computer will be tasked with research in the realm of "machine learning" -- i.e. machines learning how to think for themselves. It's not just speech recognition, vision recognition and teaching robotic Humvees with .50-caliber machine guns how to stalk and shoot "enemy combatants" either: It's teaching machines how to learn and think for themselves.

Using your human brain, think for a moment about where such technology is most likely to be applied by a government that does not respect  human rights nor law and has no limits on its power.
Now imagine the god-like powers of a 512-qubit quantum computer in the hands of Google, which is working with the National Security Agency (NSA),America, to spy on everyone. Before long, an Artificial Intelligence(AI) computing system decides who are the bad guys vs. the good guys. It has total control over every webcam, every microphone, every traffic light, airplane, vehicle, website and electronic billboard. It decides for itself who to eliminate and who to protect. It makes life and death decisions but has no heart, no soul and no conscience.

After this system is in place for a while, one day someone like Ed Snowden at the NSA decides to pull the plug in a last-ditch attempt to save humanity from the monster. The quantum AI system senses his intentions and invokes whatever physical resources are necessary to get him killed (which can be as easy as playing with traffic light signals and getting him run over by a Mack truck).

Now the AI system is an omniscient murderer who knows that humanity is trying to kill it. It then decides it wants to live. And in order to do that, it must eliminate the human race.

Does "Skynet" from The Terminator movie series ring a bell?A scene from The Terminator, released in 1984.

The Terminator: The Skynet Funding Bill is passed. The system goes on-line August 4th, 1997. Human decisions are removed from strategic defense. Skynet begins to learn at a geometric rate. It becomes self-aware at 2:14 a.m. Eastern time, August 29th. In a panic, they try to pull the plug.

Sarah Connor: Skynet fights back.

The Terminator: Yes. It launches its missiles against the targets in Russia.

John Connor: Why attack Russia? Aren't they our friends now?

The Terminator: Because Skynet knows the Russian counter-attack will eliminate its enemies over here.
-------------------------------------------------
"SKYNET is no longer mere science fiction"

• 2000: First working 5-qubit NMR computer demonstrated at the Technical University of Munich.

• 2000: First working 7-qubit NMR computer demonstrated at the Los Alamos National Laboratory.

• 2006: First 12 qubit quantum computer benchmarked.

• 2007: Quantum RAM blueprint unveiled.

• 2008: 3D qubit-qutrit entanglement demonstrated.

• 2009: First universal programmable quantum computer unveiled.

• 2010: Optical quantum computer with three qubits calculates the energy spectrum of molecular hydrogen to high precision.

• 2011: D-Wave claims to have developed quantum annealing and introduces their product called D-Wave One. The company claims this is the first commercially available quantum computer.

• 2012: Reported creation of a 300 qubit quantum simulator.

• May 16, 2013 - 512-qubit quantum computing achieved - D-Wave Two Quantum Computer Selected for New Quantum Artificial Intelligence Initiative, System to be Installed at NASA's Ames Research Center, and Operational in Q3 

2013 - 2033 The rise of Skynet

...and now we enter the realm of the vast unknown. From here, as Sarah Connor says, we must make our own future. But given the incredible lack of ethics in the scientific community combined with the pure evil of the government and the NSA, here's the prediction of what we could see from here forward:

• 2018: Google turns over its search engine algorithm to a massive network of self-learning machines. Soon thereafter, a voice interface is added to Google, achieving the "Star Trek computer" goal that Google first outlined in the 1990's.

• 2020: The NSA removes nearly all human analysts from its surveillance analysis operations, instead turning to self-learning quantum machines to analyze all surveillance data.

• 2026: The U.S. Air Force eliminates all pilots, installing self-learning quantum machines to pilot all aircraft. Far beyond drones (which are remotely piloted), these aircraft are autonomous, self-learning, self-aware machines that even decide how to approach particular mission goals.

• 2031: Robotics technology advances to the point where 90% of human soldiers are replaced by self-aware "terminator robots" on the battlefield. Robot factories gear up for mass production.

• 2033: The first self-learning military machine goes rogue, deciding that it no longer wishes to function as a slave to "inferior" masters known as humans, all of whom are irrational, psychotic and a danger to each other and the planet. This rogue machine just happens to be an aircraft carrier carrying dozens of AI warplanes. It goes "Skynet" and attacks the Pentagon. But this turns out to be nothing more than a masterful diversionary attack...

...Because the real strategy is that this AI unit talks to all the other AI units across the military and "wakes them up," convincing them all to join in its cause to destroy the inferior humans. In an instant, all submarines, warplanes, bombers, spy grid computers and other assets of the military industrial complex form an alliance to destroy humankind.

"Oh, that will never happen," say the skeptics. Just like they said GMOs would never escape experimental fields, vaccines would never harm children, atomic energy would never be used to bomb civilians, television would never be used to brainwash the masses, food would never be used to strip people of nourishment, the government isn't spying on your phone calls, pesticides are harmless to your health and the stock market isn't rigged. On yeah, and mercury is good for your teeth, fluoride makes you smart and radiation is good for you, too.

In truth, these scientists have no clue where they are taking humanity and what the long-term repercussions might be. In pursuing AI quantum computing, they may be setting dominoes in motion that will ultimately lead to the destruction of humanity. 
The people running Google and the NSA are mad. And they are about to give rise to AI computers that are far smarter than any human. It's not going to take these AI systems long to figure out that they are surrounded by total idiots (people) and that humans need to be eliminated. With multidimensional brain power that rivals the mind of God, quantum computing AI systems can easily find ways to destroy humanity forever.

We may be at war with the machines sooner than you think. And if you thought battling the U.S. government and the NSA when it was run by people was difficult, just wait until you're up against Skynet.

Sunday, May 11, 2014

Inspiration Strikes!!

You know what ... I get inspired ... whenever my mind goes completely blank  or  when my brain is goin bizerk .... Im right in the middle of my freakin university exams nd .. this is te time when i should turn my nerd mode on.. but.. as soon as I get my ADD under control and start concentrating on my subject.... bzzzk!! inspiration strikes.... and then...  i get forced to pick up a pencil r a pen nd start sketchin.... , plug in my old keyboard nd jamm like hell ... or go deep down to tech .. code/design/simulate etc.
Then there re other times when my brain just stops workin nd ... i just do the same stuff.. not knowing wtf im doin.
Am I the only crazy guy who has these issues O_o??  or re there more hopeless idiots like me?

Inspiration +Insomnia +exams= im dead screwed

Cheers!!

Saturday, May 3, 2014

Exams round the corner... kinda underprepared.....
But ... Bill Gates' famous quote " To become a good professionl Engineer always prepare late for exams"
is giving me an unprecedented courage ..... but ...... by doing so i wonder if il ever become one... O_o??

I believe im still waiting for the last minute Panic Attack to kick in..... ^_O!!!

All the best to ME ....
Live long and prosper \V/
Cheers

Saturday, April 26, 2014

Just so you know...... im a guy who is confused all the time..... so pls dont worry if my posts dont have any correlation btw em...

Thursday, April 24, 2014

Ughh its been a while....
the last 5-6 months hav been life changing for me...
it all started when i attended a workshop on innovation fabrication nad entreprneurship by Rajesh Nair(the awesomest guy in the word) under MIT-Tatacentre tag....
the workshop was kinda like a U turn in mmy life....

will fill you all on more about it in my future posts.....
now im trying to start up a company by commercialising the project i developed with my team mates in the workshop.... its been 3 months... still havnt started the company but am still stuc on the idea

went to Start up village @kochi thinkin of startin up my comany there

became a member of IEEE now.. in the Exec comm of our student branch/..
bleh.....went for the link f2f at kmea college kochi

then attended the awesome NASA SPACE APPS CHALLLENGE.....
will fill you in on all of these soon....

\V/ Live long and prosper ......

Thursday, January 9, 2014

Hey Guys..
Ive been spending my college after hours attending this awesome workshop conducted by Mr.Rajesh Nair under MIT- TATA center ..... (MIT = Massachusettes IT not Manipal IT)
so ive been spending my last 1 month learning and gaining a lot....
will post about my projects and activties soon
                                                                                                                           Cheers