Allow me to get in depth with you. Your background seems to be in power and cabling. The rest are too many things put together without application. The electromagnetic pulse requiring grounding is the same as a house or a light poll needing grounding. Whether one does it or not, it's a choice. The signals in ALL these systems travel on secure tunnels. No signal "leakage" in the electric can compromise the data. Let's be very clear about it because you mixed all these up to make a soup of everything. Milspec is common military specifications. DoD is a department. Can you tell me the difference between the two specs? (LOL, this is where you lost it too).Sure i went above my level!! I am throwing all buzzwords and don't understand what they mean. Sorry sir.
But I'll take one stab so show my ignorance on these topics: Highly sensitive operational centers have what is called Transient Electro-Magnetic...(lets leave it at that), for which one of the needs is local grounding. Basically the power coming into your systems needs to be grounded within the structural limits of that area. That standard protects against potential signal leakage through power cables - something that is first hand validated. So I'll leave it at that, since I certainly dont want to just create a false bravado around me knowing anything about this space.
Afterall when I say "MilSpec" or DoD spec, or Hardware Crypto and its weakness in application especially in the key exchange process and ciphers (types), and the challenges for even a developed economy to do that safely, especially for their foreign missions (embassies) / remote locations. As far as NOC (operation centers), operating with ML/CM based triggers to enable large consumption of human/machine contextual data so decision making is faster and more accurate and can find real threats and challenges versus white noise. All of this is mumbo jumbo!!!
What seems to have been built is a monitoring station, not an operations center.
Your "key exchange process" is also not applicable due to the secure tunnel being used from point A to B. The only time I can see any "cryptography" being used is when emails or messages are being sent. The data is secure due to the tunnel as is, including emails and messages too and MFA reduce the old school "key exchange" as it's done upfront for validation. Lastly, ML and CM and AI.......there is no application here for those. This is a NOC and probably lower end military grade also, meaning it has virtually less than 10% visibility to public. MFA's alone protect a lot of the user access. I don't mind posts when one makes sense, but this was a soup made out of everything and that's wrong information being provided to look cool. Something our Indian friends do a lot.