Industry Publications Index ... Click Here




Information Warfare - Part 2

Originally published  February, 1997
by Carlo Kopp
¿ 1997, 2005 Carlo Kopp

In the last issue, dedicated to security topics, we digressed from our established technology base theme and took a look at the emerging problem area of information warfare and info-terrorism. In this issue we follow up and discuss a range of defensive measures which can be used to protect computing assets.

Defending Against IW

The first question which we must ask is whether we are at risk or not, and what are the likely losses to be incurred should we be successfully attacked. This provides baseline for the budget to be allocated to the task of protecting our site. The second question is then that of what is the most likely mode of attack.

Cyberwar attack or hacking will in many instances be the preferred mode of attack, but in some instances electromagnetic attack intended to cause denial of service for short or long periods of time may be a possibility. In the short term, electromagnetic attack is not particularly likely, although some reports from Europe and the US suggest that it is beginning to occur. Once police forces worldwide start deploying HERF guns for traffic control purposes (see an early November issue of New Scientist for more detail here), the technology will however become more available, thus better understood in the wider community, and the frequency of incidents will inevitably increase. The law enforcement community should give some careful thought to the fact that in promoting the proliferation of the HERF gun to solve one law enforcement problem, they may have inadvertently opened a Pandora's box of other law enforcement problems, potentially far more expensive to the general public.

Having determined that we are at risk from electromagnetic attack, we must then determine what the likely style of attack will be. The threat can be divided into high power and low power styles of attack. High power attack, by flux generator bomb or microwave bomb, is less likely but considerably more damaging. It is less likely because the technology is difficult to produce without the resources of a government research establishment, and the equipment to perform this kind of attack requires often difficult to source materials, such as high grade plastic explosives, high performance detonation systems similar to those used in nuclear weapons, and finally a non-trivial amount of expertise is required to use these weapons properly. Delivery may also prove to be an issue, as a high power flux generator requires a packaging volume similar to that of a sizeable car bomb. High power attack is therefore only likely in the instance of war, or a terrorist attack sponsored by a hostile government prepared to provide the logistical support for the weapons. It is worth noting that any government with the ability to build an implosion type nuclear bomb will have the required hydro-dynamics expertise to eventually design themselves a flux generator or microwave bomb.

Low power attack is more likely simply because the expertise required to build a HERF gun is much lower, the components are quite readily available, and finally with the expected wide proliferation of police HERF guns these will be relatively easy to acquire. Since they are not as yet covered by legislation in most countries, it is entirely feasible that such "Luddite specials" will be smuggled across national boundaries.

Other modes of low power attack, such as disruption of mains power supplies and Tazer attack on LANs, are also more probable because the technology to do these is readily available, particularly in the US.

There are a wide number of measures which can be applied to hardening a site against such attacks, and we will now take a closer look at some of the alternatives.

Site Hardening

Site hardening is based upon the model of electromagnetically "soft" computer equipment being protected from exposure to damaging voltages and electromagnetic fields. In this fashion, the user has the choice of arbitrary computer equipment, which is survivable because it is never exposed. The weakness of a site hardening approach is that an attacker who can penetrate the site's security perimeter, the hard protective shell of the installation, may have the opportunity to do much damage.

The starting point for site hardening must be networking, as networking cables are exceptionally good at propagating damaging voltages which may be coupled into them, and because networking interfaces are often not designed to handle anything beyond trivial levels of power.

Fortuitously, the network is probably the easiest part of a site to harden, because optical fibre variants of most networking interfaces are readily available. Indeed, the 10-Base-T and 100-Base-T standards support optical fibre versions, which are commercially available off the shelf. Whilst they may be slightly more expensive than their copper equivalents, they are wholly immune to any kind of electromagnetic attack, as well as being inherently immune to problems with building earths, and lightning strikes. Because a short run of a 62.5 graded index optical fibre cable also has a bandwidth running into Gigabits/sec, it is also a worthwhile investment in the long term, unlike 100-Base-T and ATM twisted pair cables which will cease to be useful in a decade or so, when the industry moves up to Gigabit/sec network speeds. Needless to say, while these are all excellent reasons for installing optical fibre LANs, rather than copper LANs, the short term cost overheads, and a lack of familiarity in the marketplace mean that to date, only a small proportion of the existing LAN base has adopted this superb technology.

The next item on our list is the protection of the mains power supply. Just as LANs represent a potential single point of failure for many machines on a site, so does the mains power distribution in a site. High voltage spikes or high RF voltages injected into the mains power will find their way to almost every machine hanging off the mains. Because most machines employ low cost volume production switchmode supplies, particularly PCs, it is possible that damage may be caused directly to the power supply. Should the power supply cope, then it is entirely possible that damaging voltages can couple through the supply into the equipment to damage or disrupt logic devices. Surge suppressors and uninterruptible power supplies (UPS) may be quite ineffective, as most of these are designed to cope with much less destructive circumstances. Of major concern is that many UPS types are of the cheaper standby/bypass variety, which route mains power directly through and couple the standby battery power in only if the mains goes down. As a result, a large spike or RF voltage injected into the mains will pass through them quite unhindered. In any event, a low cost fully isolated UPS may not survive an RF or spike hit coming in from outside, leaving the site with X minutes of uptime before the batteries are exhausted. If the UPS is bypassed to get the site up and running, the next hit will get at the site's computers directly.

As with networking, a simple and relatively cheap measure may be used to solve this problem entirely. And it is not by any means a new idea. The solution is the use of a motor-generator power isolator. Such devices are simply built by coupling a robust single or triple phase electrical motor to a single or triple phase generator (alternator). Mains voltage powers the generator, which produces clean mains power for internal distribution within the site. It is worth noting that motor-generator power converters were commonly used in the early days of mainframes, as the then dominant linear power supplies did not cope well with poor quality mains power and thus motor-generators were a must to achieve good uptime and avoid mainframe crashes. So, if you have an old motor-generator mains converter in the company warehouse or basement, now may be the time to dust it off and give it a new lease of life. If not, you may have to expend a few thousand dollars and get one built or ordered. Needless to say, the motor-generator should be installed upstream of the UPS or any other lesser protection devices within the site.

An important note here is that a motor-generator will protect the site from disruption injected into the mains from outside the building. A HERF gun aimed into the building may couple directly into the mains wiring downstream of the protection device.

If we have installed optical networking and protected the building or computer room power supply, we have made life very difficult for an attacker. He will have no choice than to specifically target a given room or area in the building with his HERF gun to couple into local mains wiring, keyboard/mouse cables or SCSI cabling, or get through the shielding of the machine in question. However, a number of straightforward solutions exist to this mode of attack as well.

To solve this problem we can use Faraday cage or electrostatic shielding to simply exclude RF signals from the environment occupied by the equipment. A good measure of protection may be applied to mains wiring by running it through metal enclosed cable trays, and threading it through flexible metal shielding armour from the tray to the wall socket where it is to be used. A wide range of off-the-shelf commercial products may be used to this end.

A computer room, office or even equipment cupboard may also be built or refitted as a Faraday cage, by covering the walls, floors and ceiling, windows and doors with conductive copper mesh. Even a very basic shielding arrangement will exclude much of an impinging RF signal. For the very security conscious, this will also disable bugs and mobile telephones.

If the site is critical, then comprehensive Faraday cage shielding may be warranted. Too do it thoroughly, the shielding must not only be comprehensive but even small gaps and apertures will need to be thoroughly sealed. This means that incoming and outgoing cables will need to be routed through RF traps or Ferrite grommets, doors, windows and air conditioning vents will need proper flexible seals (similar to that in many microwave ovens), and a airlock arrangement may be needed for the door. Phone lines in and out will also need to be coupled through optical fibres. Needless to say, this can get to be quite expensive, particularly if the intent is to shield a large area or whole building. However, all of the required technology has been available off the shelf for many years, due the US military EMP hardening effort during the Cold War. The author has a 2 inch thick stack of component, seal and material catalogues, most acquired locally.

As is quite clear, the means of defending against most types of electromagnetic attack have been around for decades, and provide if applied properly, an excellent measure of security against nearly all threats lesser than a flux generator bomb on your site doorstep. Players in the latter league will be more inclined to park a van loaded with ammonium nitrate in your site basement.

Hardening Computer Equipment

Hardening of computer equipment by design would obviate many of the cost overheads which may be incurred through site hardening. Indeed, if a piece of computer equipment is sufficiently robust, then it may not be necessary to apply any hardening measures to the site as a whole. However, hardening by design requires that the vendors of the equipment cooperate and since they are largely oriented toward to minimising production costs of equipment to maximise margins, only intense pressure from the customer base will produce the desired effect. Arguably, should a sufficiently large number of corporate and government customers demand robust equipment, then we may see some results.

The more likely route for such equipment to appear in the near term will be through specialist suppliers, such as the large number of US manufacturers (Codar, Radstone, Cyberchron, AP Labs, Interstate Electronics) who supply "Milspec" packaged "ruggedised" versions of commercial computers to military and government customers. Such equipment uses commercial internals in a robust military spec chassis, built to withstand vibration, high temperatures, impact, dousing with salt water and various other indignities which a computer in military service may have to suffer.

An electromagnetically hardened commercial computer will not require the physical and environmental ruggedness of a military system, but will require the ability to cope with high RF fields, voltages and spiked power lines. Therefore, it is likely to be much cheaper than existing ruggedised equipment, but probably still much more expensive than off-the-shelf commercial equipment.

The first important area which must be addressed is that of providing high performance and comprehensive shielding for the equipment. Existing shielding for government TEMPEST rated equipment would probably be in the right class of performance. This would address the ability to keep to nasty RF fields from getting in through gaps, cracks and cooling grilles in equipment. Monitors, be they CRT or LCD based, will need conductive materials embedded in the screen or screen cover to render it opaque to RF radiation.

The power supply is the next item which needs to be addressed. A good measure of protection could be provided by a well designed conventional switchmode with high performance RF and spike traps designed into the hot end, but higher performance alternatives do exist. Many techniques can be used for non-electrical coupling between the mains and the low-voltage side of the equipment. The simplest is a miniature motor-generator scheme, where the "hot" mains side uses a squirrel cage electrical motor to drive via a shaft an internal alternator or DC generator, which is integrated with a regulator arrangement to produce the required +5V, +3.3V, +12V and -12V rails. Such a supply if built properly could easily fit into the form factor of most current tower case PC supplies. Equipping such a device with an internal flywheel would also provide a good resilience to short mains voltage dips. A power supply built this way would provide much smoother power than existing switchmodes, and also avoid the production of nasty RF interference, common to cheaper switchmodes.

More esoteric schemes may be used, such as hydraulic power transfer (mains driven pump to impeller to alternator), or fuel cell based schemes. In theory, such devices could be built with similar efficiencies to existing switchmodes.

Having addressed shielding, power and networking, we are left with the machine's immediate interfaces, such as the keyboard, mouse, serial ports, external drives etc. In the short term, these may be problematic. There are no technical reasons why keyboards and mice cannot be built with optical fibre interfaces rather than copper interfaces. A keyboard could, in theory be built wholly with optical switching technology. Certainly the push toward fibre based SCSI interfaces, driven by demand for bandwidth, will solve the external peripheral problem, assuming that power supplies and chassis for external devices are suitably robust.

In terms of other interfaces, the characteristic backpanel's worth of connectors will have to go, as these are all potential entry points. Again, there are no technical reasons why optical fibres cannot be used for all connections between pieces of equipment. It would certainly solve many other problems our support engineers have to grapple with, such as ground looping between equipment.

The author has designed many computer chassis, and quite a few board level products (eg workstation motherboards, I/O boards, fibre comms equipment etc) over the years, and can state without fear of contradiction that the interface and packaging design changes required to cope with an electromagnetically hostile environment could be readily integrated into the existing technology base. Indeed, the commercial opportunities for smaller manufacturers in the production of hardened equipment chassis and interfaces, using standard commercial internals, are considerable in the medium term. We can hope that our industry will rise to this challenge.




$Revision: 1.1 $
Last Updated: Sun Apr 24 11:22:45 GMT 2005
Artwork and text ¿ 2005 Carlo Kopp


Industry Publications Index ... Click Here