SlideShare a Scribd company logo
ELECTROMAGNETIC BOMB
5/23/2015 1
Contents:
Introduction.
Basic Principle of E-Bomb.
Technology Base for E-Bomb.
Coupling Modes.
E-Bomb Targets.
Firing of E-Bombs.
Defences Against E-Bombs.
Military Applications of E-Bomb.
Advantages and disadvantages.
Conclusions.
References.
5/23/2015 2
Introduction
The most recent war operations relied on air power and precision
guided ammunitions.
Future campaigns will require more suitable weapons to achieve
shock effect over large targets with small attacking forces.
Electromagnetic bombs (E-Bombs) can perform such a role.
5/23/2015 3
Basic Principle of E-Bomb
The Electro Magnetic Pulse (EMP) effect .
The Electromagnetic Pulse is an electromagnetic shock wave.
This pulse of energy produces a powerful electromagnetic field
sufficiently strong to produce short lived transient voltages of
thousands of volts on exposed electrical conductors like wires,
printed circuit boards etc.
This can cause irreversible damage to wide range of electrical and
electronic equipments particularly computers and radio or radar
devices.
5/23/2015 4
Technology Base for E-Bomb
There are two widely used technologies:
Flux Compression Generators(FCG),and
Virtual Cathode Oscillator or Vircator.
5/23/2015 5
Flux Compression Generators(FCG)
FCG can produce tens of Mega Joules in tens to hundreds of
microseconds.
Main parts of FCG include:
Armature(copper tube).
Stator(helical heavy wire coil).
Initiator(plane wave explosion lens) and
5/23/2015 6
Contd…..
Jacket(prevents disintegration due to magnetic field).
FCG start current is provided by an external source.
When start current peaks initiator is fired to initiate explosive burn.
Explosive pressure expands armature and creates moving short.
Moving armature compressses a magnetic field.
5/23/2015 7
Virtual Cathode Oscillator
5/23/2015 8
Contd…..
Electron beam is accelerated through foil or mesh anode.
Electrons passing through anode will form a bubble of space charge
around anode.
Under proper conditions this space charge will oscillate at micro
frequencies.
Peak power of tens of GW for 100s of sec.
Cheap and simple to manufacture.
5/23/2015 9
Coupling Modes:
Front Door Coupling through antennas.
Destroys RF semiconductor devices in transmitters and receivers.
Back Door Coupling through power /data cabling,
telephone wiring.
Destroys exposed semiconductor devices.
Punches through isolation transfomers.
5/23/2015 10
E-Bomb Targets:
Fixed installations(buildings,radars etc.).
Radiating mobileshidden targets(ships,mobiles).
Non radiating mobileshidden targets.
5/23/2015 11
Firing of E-Bombs:
Warhead comprises of priming current source,FCG(cascade) and
Vircator tube.
Missile installations must supply 100% of weapon priming energy
from own supply.
Bomb installation-weapon can be precharged before release from
aircraft.
A free fall E-Bomb is more lethal.
5/23/2015 12
Firing of E-Bomb
5/23/2015 13
Firing options:
Aircraft Dumb bombs (free fall delivery).
GPS or satellite guided bombs.
standoff missiles.
Cruise Missiles(weight restricted to 340kg).
5/23/2015 14
Defence and Hardening
Destroy the delivery vehicle.
Electromagnetically harden/hide important assets.
Use optical fibres for data transfer and comprehensive shielding.
Isolate power feeds with transient arrrestors.
Use non-electromagnetic power feed and electromagnetic “air
lock”.
5/23/2015 15
Hardening
5/23/2015 16
Military applications of E-Bomb:
Electronic combat:
The E-Bomb enables rapid attrition of enemy electronic assets over
large areas.
The E-Bomb offers important force multiplication effects compared
to conventional weapons.
Strategic warfare:
Economic vitals-finance and stock
markets,manufacturing,petroleum are highly vulnerable.
5/23/2015 17
Contd…..
Transport infrastructure-signalling and vehicle ignition systems are
vulnerable.
Population-radio and TV receivers.
Military equipments are vulnerable.
Theatre Warfare
Offensive Counter Air operations-disable aircraft in flight,on
ground and destroy their supporting infrastructure.
5/23/2015 18
Contd…..
Sea Control-disable surface combatants prior to attack with
conventional weapons.
Punitive Missions:
The E-Bomb is a punitive weapon as it can cause much economic
and military damage with no loss of civilian life.
E-Bombs could be profitably used against countries which sponser
terrorism and info-terrorism.
5/23/2015 19
Advantages:
Not lethal to humans.
Negligible collateral damage.
No mass media coverage of bombing casualities(broadcast
equipment destroyed)will reduce threshold for the use of strategic
air power and missile forces.
5/23/2015 20
Disadvantages:
Means of delivering E-Bombs are difficult.
Difficulty in kill assessment.
Atmospheric propagation of pulse.
5/23/2015 21
Conclusion:
E-Bombs are weapons of electrical mass destruction.
High payoff in using E-Bombs against fundemental infrastructure
results in substantial paralysis.
Decisive advantage in the conduct of electronic combat.
E-Bombs are non lethal weapon.
The critical issues for next decade are the devolopment of E-
Bombs and hardening of infrastructure.
5/23/2015 22
References:
1. The air power manuel second edition.RAAF
APSC,CANBERRA,1994.
2. IEEE PULED POWER CONFERENCE,NEWYORK,1989.
3. IEEE SPECTRUM 2002,2003,2001.
4. DIGEST OF TECHNICAL PAPERES.
5. HOEBERLING G92-’ADVANCES IN VIRTUAL CATHOD
MICROWAVE SOURCES’.
5/23/2015 23

More Related Content

Similar to Emb

E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
Jithendra Babu
 
Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
rj246
 
E Bomb
E BombE Bomb
E Bomb
Dipak Horo
 
E bomb
E bombE bomb
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar reportDeepak Mittal
 
E bomb
E bombE bomb
E bomb
Abhay Kumar
 
E-BOMB REPORT
E-BOMB REPORTE-BOMB REPORT
E-BOMB REPORT
Ankit Vij
 
E-BOMB ppt
E-BOMB pptE-BOMB ppt
E-BOMB ppt
Ankit Vij
 
Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)
MURALIDHAR R
 
e-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdfe-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdf
SrinidhirkGowda
 
E BOMB
E BOMBE BOMB
E BOMB
ShortsWala
 
8 fault-analysis-and-electrical
8 fault-analysis-and-electrical8 fault-analysis-and-electrical
8 fault-analysis-and-electrical
Senghuo LY
 
Electromagnetic bomb ppt.
Electromagnetic bomb ppt.Electromagnetic bomb ppt.
Electromagnetic bomb ppt.
Biswajit Rana
 

Similar to Emb (20)

ELECTROMAGNETIC BOMB
ELECTROMAGNETIC BOMBELECTROMAGNETIC BOMB
ELECTROMAGNETIC BOMB
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
 
Electromagnetic bomb
Electromagnetic bomb Electromagnetic bomb
Electromagnetic bomb
 
E Bomb
E BombE Bomb
E Bomb
 
E bomb
E bombE bomb
E bomb
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
E bomb
E bombE bomb
E bomb
 
E bomb
E bombE bomb
E bomb
 
E-BOMB REPORT
E-BOMB REPORTE-BOMB REPORT
E-BOMB REPORT
 
E-BOMB ppt
E-BOMB pptE-BOMB ppt
E-BOMB ppt
 
Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)
 
E bomb
E bomb E bomb
E bomb
 
Emp Bomb
Emp BombEmp Bomb
Emp Bomb
 
60.pptx
60.pptx60.pptx
60.pptx
 
e-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdfe-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdf
 
E BOMB
E BOMBE BOMB
E BOMB
 
8 fault-analysis-and-electrical
8 fault-analysis-and-electrical8 fault-analysis-and-electrical
8 fault-analysis-and-electrical
 
Electromagnetic bomb ppt.
Electromagnetic bomb ppt.Electromagnetic bomb ppt.
Electromagnetic bomb ppt.
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Emb

  • 2. Contents: Introduction. Basic Principle of E-Bomb. Technology Base for E-Bomb. Coupling Modes. E-Bomb Targets. Firing of E-Bombs. Defences Against E-Bombs. Military Applications of E-Bomb. Advantages and disadvantages. Conclusions. References. 5/23/2015 2
  • 3. Introduction The most recent war operations relied on air power and precision guided ammunitions. Future campaigns will require more suitable weapons to achieve shock effect over large targets with small attacking forces. Electromagnetic bombs (E-Bombs) can perform such a role. 5/23/2015 3
  • 4. Basic Principle of E-Bomb The Electro Magnetic Pulse (EMP) effect . The Electromagnetic Pulse is an electromagnetic shock wave. This pulse of energy produces a powerful electromagnetic field sufficiently strong to produce short lived transient voltages of thousands of volts on exposed electrical conductors like wires, printed circuit boards etc. This can cause irreversible damage to wide range of electrical and electronic equipments particularly computers and radio or radar devices. 5/23/2015 4
  • 5. Technology Base for E-Bomb There are two widely used technologies: Flux Compression Generators(FCG),and Virtual Cathode Oscillator or Vircator. 5/23/2015 5
  • 6. Flux Compression Generators(FCG) FCG can produce tens of Mega Joules in tens to hundreds of microseconds. Main parts of FCG include: Armature(copper tube). Stator(helical heavy wire coil). Initiator(plane wave explosion lens) and 5/23/2015 6
  • 7. Contd….. Jacket(prevents disintegration due to magnetic field). FCG start current is provided by an external source. When start current peaks initiator is fired to initiate explosive burn. Explosive pressure expands armature and creates moving short. Moving armature compressses a magnetic field. 5/23/2015 7
  • 9. Contd….. Electron beam is accelerated through foil or mesh anode. Electrons passing through anode will form a bubble of space charge around anode. Under proper conditions this space charge will oscillate at micro frequencies. Peak power of tens of GW for 100s of sec. Cheap and simple to manufacture. 5/23/2015 9
  • 10. Coupling Modes: Front Door Coupling through antennas. Destroys RF semiconductor devices in transmitters and receivers. Back Door Coupling through power /data cabling, telephone wiring. Destroys exposed semiconductor devices. Punches through isolation transfomers. 5/23/2015 10
  • 11. E-Bomb Targets: Fixed installations(buildings,radars etc.). Radiating mobileshidden targets(ships,mobiles). Non radiating mobileshidden targets. 5/23/2015 11
  • 12. Firing of E-Bombs: Warhead comprises of priming current source,FCG(cascade) and Vircator tube. Missile installations must supply 100% of weapon priming energy from own supply. Bomb installation-weapon can be precharged before release from aircraft. A free fall E-Bomb is more lethal. 5/23/2015 12
  • 14. Firing options: Aircraft Dumb bombs (free fall delivery). GPS or satellite guided bombs. standoff missiles. Cruise Missiles(weight restricted to 340kg). 5/23/2015 14
  • 15. Defence and Hardening Destroy the delivery vehicle. Electromagnetically harden/hide important assets. Use optical fibres for data transfer and comprehensive shielding. Isolate power feeds with transient arrrestors. Use non-electromagnetic power feed and electromagnetic “air lock”. 5/23/2015 15
  • 17. Military applications of E-Bomb: Electronic combat: The E-Bomb enables rapid attrition of enemy electronic assets over large areas. The E-Bomb offers important force multiplication effects compared to conventional weapons. Strategic warfare: Economic vitals-finance and stock markets,manufacturing,petroleum are highly vulnerable. 5/23/2015 17
  • 18. Contd….. Transport infrastructure-signalling and vehicle ignition systems are vulnerable. Population-radio and TV receivers. Military equipments are vulnerable. Theatre Warfare Offensive Counter Air operations-disable aircraft in flight,on ground and destroy their supporting infrastructure. 5/23/2015 18
  • 19. Contd….. Sea Control-disable surface combatants prior to attack with conventional weapons. Punitive Missions: The E-Bomb is a punitive weapon as it can cause much economic and military damage with no loss of civilian life. E-Bombs could be profitably used against countries which sponser terrorism and info-terrorism. 5/23/2015 19
  • 20. Advantages: Not lethal to humans. Negligible collateral damage. No mass media coverage of bombing casualities(broadcast equipment destroyed)will reduce threshold for the use of strategic air power and missile forces. 5/23/2015 20
  • 21. Disadvantages: Means of delivering E-Bombs are difficult. Difficulty in kill assessment. Atmospheric propagation of pulse. 5/23/2015 21
  • 22. Conclusion: E-Bombs are weapons of electrical mass destruction. High payoff in using E-Bombs against fundemental infrastructure results in substantial paralysis. Decisive advantage in the conduct of electronic combat. E-Bombs are non lethal weapon. The critical issues for next decade are the devolopment of E- Bombs and hardening of infrastructure. 5/23/2015 22
  • 23. References: 1. The air power manuel second edition.RAAF APSC,CANBERRA,1994. 2. IEEE PULED POWER CONFERENCE,NEWYORK,1989. 3. IEEE SPECTRUM 2002,2003,2001. 4. DIGEST OF TECHNICAL PAPERES. 5. HOEBERLING G92-’ADVANCES IN VIRTUAL CATHOD MICROWAVE SOURCES’. 5/23/2015 23

Editor's Notes

  1. 02
  2. 03
  3. 04
  4. 05
  5. 06
  6. 07
  7. 08
  8. 09
  9. 10
  10. 11
  11. 13
  12. 14
  13. 16
  14. 17
  15. 18
  16. 19
  17. 20
  18. 21