24 avril 2018 | International, Aérospatial, C4ISR

High-cost satellites remain vulnerable to low-cost threats

By:

WASHINGTON ― Despite advances in satellite technology, many of the U.S. military's most expensive and necessary assets remain vulnerable to jamming from inexpensive tools, according to a new report from the CSIS Aerospace Security Project.

“The technology needed to jam many types of satellite signals is commercially available and relatively inexpensive,” the report reads. Other electronic threats such as spoofing, which attempts to trick receivers into believing manipulated data from an attacker is real, also offer low cost options to adversaries who hope to interfere with satellite connectivity. These kinds of attacks can disrupt communications or position, navigation and timing techniques.

The report, released April 12 and titled “Space Threat Assessment 2018,” notes that while United States near-peer adversaries have made strides in more advanced kinetic weapons, such as direct ascent anti-satellite weapons, jamming technology also is seen as critical. For example, “China has made the development and deployment of satellite jamming systems a high priority,” according to the authors, Todd Harrison, Kaitlyn Johnson and Thomas Roberts.

Another near-peer, Russia, has displayed jamming and spoofing capabilities in the ongoing conflicts in Ukraine and Syria in the last several years. The report said the use of Russian technology in these conflicts “demonstrate[s] that Russia retains advanced electronic attack capabilities, despite some analysts' claims that Russia's ability to jam and spoof satellites has declined since 1991.”

But the threat from jamming and spoofing attacks goes beyond near-peers. Iran and North Korea, so-called rogue states, also have demonstrated the capability and willingness to interfere with satellite communications and GPS signals, according to the report.

And the ability to jam and spoof signals is likely to spread. The report notes once a jammer or spoofer is developed, “it is relatively inexpensive to produce and deploy in large numbers and can be proliferated to other state and non-state actors.”

But the United States is not sitting by idly. The Air Force's Advanced Energy High Frequency satellites, reserved for secure communication, “incorporate a high degree of protection against jamming, spoofing, and other forms of electronic attack,” according to the report.

The U.S. is also preparing troops to operate in GPS-denied environments. In January, the Defense Department jammed GPS-signals in western states so pilots could train in environments that will likely come to characterize combat in the age of electronic warfare.

https://www.defensenews.com/digital-show-dailies/space-symposium/2018/04/16/high-cost-satellites-remain-vulnerable-to-low-cost-threats/

Sur le même sujet

  • How the Defense Digital Service revamped Army cyber training

    2 décembre 2019 | International, C4ISR, Sécurité

    How the Defense Digital Service revamped Army cyber training

    Earlier this year, the Defense Digital Service — the Pentagon's cadre of coders and hackers performing a short stint in government — finished the second phase of a pilot program to streamline cyber training for the Army. The Army wanted to streamline two phases of cyber training: the Joint Cyber Analytics Course, or JCAC, which takes 27 weeks in Pensacola, Florida, and provides basic cyber training for joint forces that have no prior experience in cyber; and the more tactical training that happens at Fort Gordon in Georgia. Combined, the two phases take a minimum of 36 weeks. To accomplish this, the Defense Digital Service, working with the Army Cyber Center of Excellence and a private vendor, built a course to conduct training in three months — everything a cyberwarrior needed to know from JCAC, said Clair Koroma, a bureaucracy hacker at DDS. Phase two — which combines tactics involving hardware, offensive and defensive cyber, and networking — takes seven months. It excluded the classified course, Koroma added. At this point, she said, DDS has transitioned all of its materials to the Cyber School, which will pick up the third phase of the pilot training, though DDS will still be available for assistance. “The plan is that eventually the 17Cs, [who execute offensive and defensive cyberspace operations], will come to Fort Gordon on inception and do their entry and mid-level training at Gordon. They will run this as the course for those soldiers,” she said. Koroma said success of the pilot will be measured from the operational world — evaluating the skill sets of the soldiers that graduate from the pilot program and comparing them to prior classes. Thus far, she added, no graduates from the pilot program have been overwhelmed in operations. Students during the second pilot were also evaluated by senior leaders within the Army cyber community and commands where they might be assigned during their final project and presentation. Students needed to identify issues on the network and conduct an outbrief to these leaders. “Senior leaders then got an opportunity to ask them questions,” Koroma said. “Every single person who was in that presentation said that they were impressed by the delivery of the students and the quality of the presentation that the students gave.” In fact, Koroma said, there are two students she's aware of whose orders were changed at the conclusion of training because leaders who attended the presentation wanted them on their team. https://www.fifthdomain.com/dod/army/2019/11/29/how-defense-digital-service-revamped-army-cyber-training/

  • Technical briefing and media availability on An Act to Amend the National Defence Act and Other Acts

    20 mars 2024 | International, Terrestre

    Technical briefing and media availability on An Act to Amend the National Defence Act and Other Acts

    Media are invited to a virtual briefing by senior government officials with the Department of National Defence and the Canadian Armed Forces (DND/CAF) regarding An Act to Amend the National Defence Act and Other Acts. The briefing will be not for attribution and not for broadcast.

  • Anduril debuts Bolt, loitering munition on contract with Marine Corps

    10 octobre 2024 | International, Naval, C4ISR

    Anduril debuts Bolt, loitering munition on contract with Marine Corps

    The drone comes in two forms, one capable of surveillance operations and another that can directly strike targets.

Toutes les nouvelles