Allow me to get in depth with you. Your background seems to be in power and cabling. The rest are too many things put together without application. The electromagnetic pulse requiring grounding is the same as a house or a light poll needing grounding. Whether one does it or not, it's a choice. The signals in ALL these systems travel on secure tunnels. No signal "leakage" in the electric can compromise the data. Let's be very clear about it because you mixed all these up to make a soup of everything. Milspec is common military specifications. DoD is a department. Can you tell me the difference between the two specs? (LOL, this is where you lost it too).
Your "key exchange process" is also not applicable due to the secure tunnel being used from point A to B. The only time I can see any "cryptography" being used is when emails or messages are being sent. The data is secure due to the tunnel as is, including emails and messages too and MFA reduce the old school "key exchange" as it's done upfront for validation. Lastly, ML and CM and AI.......there is no application here for those. This is a NOC and probably lower end military grade also, meaning it has virtually less than 10% visibility to public. MFA's alone protect a lot of the user access. I don't mind posts when one makes sense, but this was a soup made out of everything and that's wrong information being provided to look cool. Something our Indian friends do a lot.
Yaar I have to take your bait because the likelihood is you are some techy perhaps a mid level, maybe given a VP title in some firm - likely not even a tech firm. I say this with respect because I often see this "holier than thou" attitude with techies - who have not for one day worked in the space I am talking about. Or for too long get a pass because they sound too smart to everyone and their uncle. Until the day they open their mouth in front of people who build core tech in the space they want to sound smart in.
Watched on the sidelines of enough dinners where techies try and talk mil space technology. I get a kick out of it when I ask them to explain what they seem to be spouting. Then the reverses and miscues make for hilarious moments.
Mil Spec - is just short for military specification and is a general term we use when we define products that comply with a mil issued standard (usually meant to drive interoperability, security standards, and baseline compliance around environmental conditions). Militaries all over the world set standards that they want their vendors to deliver. So a commercial product has to conform to a Mil Spec standard if they want to be able to sell their wares. DoD sets it own standards and publishes a few, but many of those standards remain in the TS world. Also there are a tons of other entities like NIST that also define standards (european have done a good job of late as well). The landscape is massive with lots of overlap and confusion. So when I say milspec and DoD I am speaking about standards that are generally applied within the mil space.
I am not in elec/power field and the fact that you will say power has little to do with the data plain or there is no underlying data leakage from power speaks to your limitation in this overall space (that we call Cyber-Kinetic). I stated above and even stated "first hand" validation. That should have been enough for you to get the drift and walk away with some semblance of respect before spouting that I dont know what I am talking about. Why do you think hardened briefing/secure centers are faraday cages and have power terminated within the footprint of the room? Power lines are a great source of espionage/data leakage and has been for some time. What do you think first world embassies are doing? Throwing lawn parties in Islamabad.
Your entire paragraph on crypto had me almost fall off the chair. I should have taken that as a red flag, and not entertained any further discussion, but today I was in bit of a teaching mode. How do you think secure tunnels are established between two points. So in a key exchange process for stream ciphers (even block) in the mil spec space we use mil standards/processes for key exchanges that are well defined (OTAR using DH is a good example). Their application is not of the commercial approach like IKE (for VPNs) etc., and the approach is very different. In the mil space they can be a broad set of choices and often rotational (re-keying) to keep things difficult to intercept, not to mention some static systems are often initiated at a secure site (central) for eventual downstream distribution (my preferred method for highly secured comms channels). I am not keen on over the air distribution even though algorithmically it is almost impossible to break (but they get broken into all the time due to weakness in applied methods or eventual cryptanalysis). To establish Secure tunnels you have to establish some cryptographic exchange (something only the two parties know). There are too many approaches here to use, so I will not expand on those. But what I will say is crytographic systems in milspace are used all the time - not only for emails or messages. Telemetry of system, components, communications etc etc,., through a multitude of carry plains like SW, MW, Wireless standards, Mil Specific Cellular (there are too many connect mediums to expand here), and each lends itself to a certain type of crypto cihper, and applied method depending on the type and speed of information. This is a very interesting space.
Lastly you are going to tell me that for 20 years building formulations and systems that leverage ML (AI) and CM for large data ingestion (system and human contextual) and threat analysis was in my mind of fanciful thinking. So yes Operations Center are fusion centers. They fuse together copious amounts of data and telemetry information processed through all sort of analysis. In the old days DSP and other electronic analysis was primarily applied (because that was the type of data - still happens today but more automated). Nowadays the applications for analysis includes correlation of multiple seemingly disconnected data archetypes, processed through computation (often statistical) models and of late learned(ing) systems for threat correlation and effective triggers for an operation center to act. Infact Ops centers themselves will go out of date, as decision making and processing is moving to the edge. And decision will be made in real-time by edge AI systems applying rules, learned and fine tuned through ML/AI work. The world is moving to AI based fleet/forces management and active threat detection and battlefield decisions by computers, so where historically HQ/Centralized Ops centers helped provide decision criteria, now move entirely to the edge at blazing speeds. Modern warfare will be fast, smart, exacting and deadly.
In Pakistan especially in the cyber-kinetic world the decision makers knowledge gap is so large that even their imagination fails them. And what they don't understand they don't value to their own determent. Which is why I have always said that PAF is the group that has a better handle on this as opposed to other services (but that too is weak), and it takes a good AVM with little ego to say "I dont get it, but I realize this is important", so "go at it and show me results". That sort of mindset is rare but critical.
Little knowledge is dangerous my friend. So please keep you day job looking good in the commercial space and at dinners with friends and their older uncles from banking.
How is this for depth?