The existing threat by criminal (intentional) use of electromagnetic tools is discussed. Reported Intentional Electromagnetic Interference (IEMI) attacks and similar incidents will be analyzed and discussed in regard to aspects like motivation and technical skills of the culprits, characteristics of the generated IEMI environment as well as effects on the target systems. Concluding common characteristics will lead to a discussion of the technological challenge of recognition and identification of an IEMI attack as well as backtracking of observed malfunction
and destructions to an external IEMI environment