SlideShare une entreprise Scribd logo
1  sur  22
THE E-BOMB : A WEAPON
OF ELECTRICAL MASS
DESTRUCTION

By :
Awanish Kumar Singh
10104EN059
Critic:
Jeetendra Kumar Meena
10104EN075
INTRODUCTION:








Future warfare campaigns will require more suitable
weapons to achieve shock effect over large target sets
with small attacking forces.
Electromagnetic bombs (E-bombs) can perform such
a role
Developed by Dr Carlo Kopp, Associate Fellow
AIAA and freelance Defense Analyst.
It can destroy Power Grids, Electronics and
Communication System along an entire coast but
spare human and other living species.
E-BOMB TECHNOLOGY BASE:
Power source : Battery, Capacitor bank
 Explosively pumped Flux Compression
Generator (FCG).
 High Power Microwave Device
 Antenna

FCG :




FCG can produce tens of Mega Joules in tens to
hundreds of microseconds.
Peak current of an FCG is 100X that of a typical
lightning stroke.
FCG INTERNALS:





Armature - copper tube / fast explosive
Stator - helical heavy wire coil
Initiator - plane wave explosive lense
Jacket - prevents disintegration due magnetic
forces
FCG OPERATION:
A switch connects the capacitors to the stator
which provides starting current
 A fuse mechanism ignites the explosive material.
 As the explosion makes its way through the
cylinder, the cylinder comes in contact with the
stator winding. This creates a short circuit, cutting
the stator off from its power supply.
 The moving short circuit compresses the magnetic
field, generating an intense electromagnetic burst.

HIGH POWER MICROWAVE
(HPM) DEVICES:
The fundamental idea behind the HPM is to
amplify the resulting electromagnetic burst
into high power microwave
(e.g. Vircator, Klystrons, Magnetrons etc)
DAMAGE MECHANISMS:


Low frequency pulses produced by FCG create high
voltage spikes on fixed wiring infrastructure



Microwave radiation from HPM devices can couple
directly through ventilation grilles, gaps between
panels, poor interface shielding - producing a spatial
standing wave inside the equipment cavity
COUPLING MODES:
Front Door Coupling through antennas.
 Destroys RF semiconductor devices in transmitters
and receivers
Back Door Coupling through power/data cabling,
telephone wiring
 Destroys exposed semiconductor devices
EXAMPLE SCENARIO:


10 Giga Watt 5 GHz HPM E-bomb initiated at
several hundred meters altitude



Footprint has diameter of 400 - 500 meters with
field strengths of kilovolts/meter
DEFENCE AGAINST E-BOMBS:






convert computer rooms in to Faraday cages
use optical fibers for data
isolate power feeds with transient arrestors
use electromagnetic “air lock”
shielding must be comprehensive
MILITARY APPLICATIONS OF THE
E-BOMB
1) Electronic Combat: The objective is to paralyse the

opponent’s C3S and ADS as quickly as possible
2) Strategic Warfare: Implemented according to
Warden’s Five Ring model
3) Punitive Missions: The E-bomb is a useful punitive
weapon as it can cause much economic and military
damage with no loss of civilian life
ADVANTAGES:
Not lethal to humans
 Negligible collateral damage
 High tempo campaigns become easy due to the
powerful “shock” effect of using a WEMD
 No mass media coverage of bombing casualties
(broadcast equipts destroyed)

LIMITATIONS:


Means of implementing E-Bombs are difficult.



Means of delivery constrain the accuracy of
weapon.



Atmospheric propagation of waves.



Difficult kill assessment.
CONCLUSIONS:




E-bomb is a Weapon of Electric Mass Destruction.
E-bombs are a non-lethal weapon
The critical issues for the next decade are the
deployment of E-bombs and the hardening of
fundamental infrastructure
REFERENCES:


The Electromagnetic Bomb - a Weapon of Electrical Mass
Destruction by Carlo Kopp, Defence Analyst (1997)

http://www.airpower.maxwell.af.mil/airchronicles/cc/apje
mp.html
 E-Bomb – FAQ by Carlo Kopp (2012)
http://www.ausairpower.net/E-Bomb-FAQ.html
 How E-Bombs Work by Tom Harris
http://science.howstuffworks.com/e-bomb.htm
 E- Bomb by Jim Wilson and Edwin Herder
http://www.radiobergen.org/terrorism/e_bomb.htm
THANK YOU!

Contenu connexe

Tendances

Tendances (20)

E bomb
E bombE bomb
E bomb
 
ELECTROMAGNETIC BOMB
ELECTROMAGNETIC BOMBELECTROMAGNETIC BOMB
ELECTROMAGNETIC BOMB
 
Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
 
E bomb
E bomb E bomb
E bomb
 
Directed Energy Weapons 1/2
Directed Energy Weapons 1/2Directed Energy Weapons 1/2
Directed Energy Weapons 1/2
 
Electromagnetic wave and weapons
Electromagnetic wave and weaponsElectromagnetic wave and weapons
Electromagnetic wave and weapons
 
Directed Energy Weapons
Directed Energy WeaponsDirected Energy Weapons
Directed Energy Weapons
 
E-BOMB REPORT
E-BOMB REPORTE-BOMB REPORT
E-BOMB REPORT
 
E Bomb
E BombE Bomb
E Bomb
 
Seminar report on directed energy weapons
Seminar report on directed energy weaponsSeminar report on directed energy weapons
Seminar report on directed energy weapons
 
Wireless power transmission ppt by P.Sree Harsha
Wireless power transmission ppt by P.Sree HarshaWireless power transmission ppt by P.Sree Harsha
Wireless power transmission ppt by P.Sree Harsha
 
Wireless electricity by sonu
Wireless electricity by sonuWireless electricity by sonu
Wireless electricity by sonu
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmission
 
Digital testing of high voltage circuit breaker seminar ppt
Digital testing of high voltage circuit breaker seminar pptDigital testing of high voltage circuit breaker seminar ppt
Digital testing of high voltage circuit breaker seminar ppt
 
Cloud computing for smart grid applications
Cloud computing for smart grid applicationsCloud computing for smart grid applications
Cloud computing for smart grid applications
 
Wireless Power Transmission , Wireless Charging
Wireless Power Transmission , Wireless ChargingWireless Power Transmission , Wireless Charging
Wireless Power Transmission , Wireless Charging
 
wireless power Transmission
wireless power Transmissionwireless power Transmission
wireless power Transmission
 
Wireless power transmission from solar power satellite
Wireless power transmission from solar power satelliteWireless power transmission from solar power satellite
Wireless power transmission from solar power satellite
 
WPT
WPTWPT
WPT
 
Wireless power-transmission-using-microwave
Wireless power-transmission-using-microwaveWireless power-transmission-using-microwave
Wireless power-transmission-using-microwave
 

En vedette

Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
pratikprusty
 
Intelligent Substation & its applications
Intelligent Substation & its applicationsIntelligent Substation & its applications
Intelligent Substation & its applications
Gowtham MG
 
Rumba Presentation
Rumba PresentationRumba Presentation
Rumba Presentation
Derek Dreier
 

En vedette (17)

E bomb
E bombE bomb
E bomb
 
Electronics bomb
Electronics bombElectronics bomb
Electronics bomb
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
BiCMOS Technology
BiCMOS TechnologyBiCMOS Technology
BiCMOS Technology
 
E bomb
E bombE bomb
E bomb
 
Electrical bomb
Electrical bombElectrical bomb
Electrical bomb
 
Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
 
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
 
Emp Bomb
Emp BombEmp Bomb
Emp Bomb
 
Intelligent Substation & its applications
Intelligent Substation & its applicationsIntelligent Substation & its applications
Intelligent Substation & its applications
 
Rumba Presentation
Rumba PresentationRumba Presentation
Rumba Presentation
 
Metamaterialsppt
MetamaterialspptMetamaterialsppt
Metamaterialsppt
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
learning disability
learning disabilitylearning disability
learning disability
 
ppt on Smart antennas
ppt on Smart antennasppt on Smart antennas
ppt on Smart antennas
 
Data compression
Data compressionData compression
Data compression
 

Similaire à E bomb

thee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptxthee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptx
karunyamittapally
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
Deepak Mittal
 
e-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdfe-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdf
SrinidhirkGowda
 

Similaire à E bomb (19)

thee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptxthee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptx
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.
 
Electronic bomb
Electronic bombElectronic bomb
Electronic bomb
 
e-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdfe-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdf
 
E BOMB
E BOMBE BOMB
E BOMB
 
e bomb. ppt
e bomb. ppte bomb. ppt
e bomb. ppt
 
60.pptx
60.pptx60.pptx
60.pptx
 
Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)
 
Emb
EmbEmb
Emb
 
EMC and HFPQ for industrial networks - Jos Knockaert, UGent and Peter Thomas...
EMC and HFPQ for industrial networks -  Jos Knockaert, UGent and Peter Thomas...EMC and HFPQ for industrial networks -  Jos Knockaert, UGent and Peter Thomas...
EMC and HFPQ for industrial networks - Jos Knockaert, UGent and Peter Thomas...
 
EMC for Networks - Peter Thomas, Control Specialists and Jos Knockaert, UGent
EMC for Networks - Peter Thomas, Control Specialists and Jos Knockaert, UGentEMC for Networks - Peter Thomas, Control Specialists and Jos Knockaert, UGent
EMC for Networks - Peter Thomas, Control Specialists and Jos Knockaert, UGent
 
Lightning Protection Considerations for Wired Systems
Lightning Protection Considerations for Wired SystemsLightning Protection Considerations for Wired Systems
Lightning Protection Considerations for Wired Systems
 
Vicky
VickyVicky
Vicky
 
The influence of EMF (electro magnetic field) on data center
The influence of EMF (electro magnetic field) on data centerThe influence of EMF (electro magnetic field) on data center
The influence of EMF (electro magnetic field) on data center
 
Lightning Discharge and Fundamentals of lightning Protection
Lightning Discharge and Fundamentals of lightning ProtectionLightning Discharge and Fundamentals of lightning Protection
Lightning Discharge and Fundamentals of lightning Protection
 
Lightning and surge transfer to systems presentation by jmv lps
Lightning and surge  transfer to systems presentation by jmv lpsLightning and surge  transfer to systems presentation by jmv lps
Lightning and surge transfer to systems presentation by jmv lps
 
Hybrid battery +solar pv grid tie power project presentation by jmv lps
Hybrid battery +solar pv grid tie power project presentation by jmv lpsHybrid battery +solar pv grid tie power project presentation by jmv lps
Hybrid battery +solar pv grid tie power project presentation by jmv lps
 

Dernier

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

E bomb

  • 1. THE E-BOMB : A WEAPON OF ELECTRICAL MASS DESTRUCTION By : Awanish Kumar Singh 10104EN059 Critic: Jeetendra Kumar Meena 10104EN075
  • 2. INTRODUCTION:     Future warfare campaigns will require more suitable weapons to achieve shock effect over large target sets with small attacking forces. Electromagnetic bombs (E-bombs) can perform such a role Developed by Dr Carlo Kopp, Associate Fellow AIAA and freelance Defense Analyst. It can destroy Power Grids, Electronics and Communication System along an entire coast but spare human and other living species.
  • 3. E-BOMB TECHNOLOGY BASE: Power source : Battery, Capacitor bank  Explosively pumped Flux Compression Generator (FCG).  High Power Microwave Device  Antenna 
  • 4.
  • 5.
  • 6. FCG :   FCG can produce tens of Mega Joules in tens to hundreds of microseconds. Peak current of an FCG is 100X that of a typical lightning stroke.
  • 7. FCG INTERNALS:     Armature - copper tube / fast explosive Stator - helical heavy wire coil Initiator - plane wave explosive lense Jacket - prevents disintegration due magnetic forces
  • 8.
  • 9. FCG OPERATION: A switch connects the capacitors to the stator which provides starting current  A fuse mechanism ignites the explosive material.  As the explosion makes its way through the cylinder, the cylinder comes in contact with the stator winding. This creates a short circuit, cutting the stator off from its power supply.  The moving short circuit compresses the magnetic field, generating an intense electromagnetic burst. 
  • 10.
  • 11. HIGH POWER MICROWAVE (HPM) DEVICES: The fundamental idea behind the HPM is to amplify the resulting electromagnetic burst into high power microwave (e.g. Vircator, Klystrons, Magnetrons etc)
  • 12. DAMAGE MECHANISMS:  Low frequency pulses produced by FCG create high voltage spikes on fixed wiring infrastructure  Microwave radiation from HPM devices can couple directly through ventilation grilles, gaps between panels, poor interface shielding - producing a spatial standing wave inside the equipment cavity
  • 13. COUPLING MODES: Front Door Coupling through antennas.  Destroys RF semiconductor devices in transmitters and receivers Back Door Coupling through power/data cabling, telephone wiring  Destroys exposed semiconductor devices
  • 14. EXAMPLE SCENARIO:  10 Giga Watt 5 GHz HPM E-bomb initiated at several hundred meters altitude  Footprint has diameter of 400 - 500 meters with field strengths of kilovolts/meter
  • 15. DEFENCE AGAINST E-BOMBS:      convert computer rooms in to Faraday cages use optical fibers for data isolate power feeds with transient arrestors use electromagnetic “air lock” shielding must be comprehensive
  • 16.
  • 17. MILITARY APPLICATIONS OF THE E-BOMB 1) Electronic Combat: The objective is to paralyse the opponent’s C3S and ADS as quickly as possible 2) Strategic Warfare: Implemented according to Warden’s Five Ring model 3) Punitive Missions: The E-bomb is a useful punitive weapon as it can cause much economic and military damage with no loss of civilian life
  • 18. ADVANTAGES: Not lethal to humans  Negligible collateral damage  High tempo campaigns become easy due to the powerful “shock” effect of using a WEMD  No mass media coverage of bombing casualties (broadcast equipts destroyed) 
  • 19. LIMITATIONS:  Means of implementing E-Bombs are difficult.  Means of delivery constrain the accuracy of weapon.  Atmospheric propagation of waves.  Difficult kill assessment.
  • 20. CONCLUSIONS:    E-bomb is a Weapon of Electric Mass Destruction. E-bombs are a non-lethal weapon The critical issues for the next decade are the deployment of E-bombs and the hardening of fundamental infrastructure
  • 21. REFERENCES:  The Electromagnetic Bomb - a Weapon of Electrical Mass Destruction by Carlo Kopp, Defence Analyst (1997) http://www.airpower.maxwell.af.mil/airchronicles/cc/apje mp.html  E-Bomb – FAQ by Carlo Kopp (2012) http://www.ausairpower.net/E-Bomb-FAQ.html  How E-Bombs Work by Tom Harris http://science.howstuffworks.com/e-bomb.htm  E- Bomb by Jim Wilson and Edwin Herder http://www.radiobergen.org/terrorism/e_bomb.htm