24 avril 2018 | International, Aérospatial, C4ISR

High-cost satellites remain vulnerable to low-cost threats

By:

WASHINGTON ― Despite advances in satellite technology, many of the U.S. military's most expensive and necessary assets remain vulnerable to jamming from inexpensive tools, according to a new report from the CSIS Aerospace Security Project.

“The technology needed to jam many types of satellite signals is commercially available and relatively inexpensive,” the report reads. Other electronic threats such as spoofing, which attempts to trick receivers into believing manipulated data from an attacker is real, also offer low cost options to adversaries who hope to interfere with satellite connectivity. These kinds of attacks can disrupt communications or position, navigation and timing techniques.

The report, released April 12 and titled “Space Threat Assessment 2018,” notes that while United States near-peer adversaries have made strides in more advanced kinetic weapons, such as direct ascent anti-satellite weapons, jamming technology also is seen as critical. For example, “China has made the development and deployment of satellite jamming systems a high priority,” according to the authors, Todd Harrison, Kaitlyn Johnson and Thomas Roberts.

Another near-peer, Russia, has displayed jamming and spoofing capabilities in the ongoing conflicts in Ukraine and Syria in the last several years. The report said the use of Russian technology in these conflicts “demonstrate[s] that Russia retains advanced electronic attack capabilities, despite some analysts' claims that Russia's ability to jam and spoof satellites has declined since 1991.”

But the threat from jamming and spoofing attacks goes beyond near-peers. Iran and North Korea, so-called rogue states, also have demonstrated the capability and willingness to interfere with satellite communications and GPS signals, according to the report.

And the ability to jam and spoof signals is likely to spread. The report notes once a jammer or spoofer is developed, “it is relatively inexpensive to produce and deploy in large numbers and can be proliferated to other state and non-state actors.”

But the United States is not sitting by idly. The Air Force's Advanced Energy High Frequency satellites, reserved for secure communication, “incorporate a high degree of protection against jamming, spoofing, and other forms of electronic attack,” according to the report.

The U.S. is also preparing troops to operate in GPS-denied environments. In January, the Defense Department jammed GPS-signals in western states so pilots could train in environments that will likely come to characterize combat in the age of electronic warfare.

https://www.defensenews.com/digital-show-dailies/space-symposium/2018/04/16/high-cost-satellites-remain-vulnerable-to-low-cost-threats/

Sur le même sujet

  • U.S. Army Starts Structures Demo For FLRAA, FARA Upgrades  | Aviation Week Network

    22 avril 2021 | International, Aérospatial

    U.S. Army Starts Structures Demo For FLRAA, FARA Upgrades | Aviation Week Network

    A solicitation for the Adaptive Resilient Engineered Structures program, published on April 20 by the Aviation Applied Technology Directorate, calls for technologies that could be demonstrated in a relevant operational environment—or a Technology Readiness Level of 6—between fiscal 2023 and 2026. 

  • Q&A: Maxar execs discuss US Army simulation, Project Maven

    5 juin 2023 | International, C4ISR

    Q&A: Maxar execs discuss US Army simulation, Project Maven

    C4ISRNET reporters interviewed a pair of Maxar Technologies leaders on the sidelines of the GEOINT Symposium in St. Louis.

  • How Army network modernization efforts ensure equipment works with allies

    6 août 2020 | International, C4ISR

    How Army network modernization efforts ensure equipment works with allies

    Andrew Eversden A critical piece of the U.S. Army's network modernization push is ensuring its systems work with allies. In future battles, the Army will not fight alone; it will be joined by coalition partners, as well as other U.S. services. As the Army moves to improve its integrated tactical network, it must ensure that its network tools work with coalition and service partners The Army recently completed a critical design review of Capability Set '21 a set of new network tools that will be delivered to soldiers next year. The service is in the first phase of procuring the new capabilities. A “key factor” involved in delivery to soldiers at the battalion level and below is a move to a 75 percent “secure but unclassified” network that provides improved communication between coalition partners, said Col. Garth Winterle, project manager for tactical radios at the Army's Program Executive Office Command, Control, Communications-Tactical. “We're moving off of an all-secret network to one that's a lot more flexible and actually encourages coalition interoperability,” Winterle said. One opportunity to test interoperability was Defender Europe 2020, which was meant to be one of the largest European exercises involving both the U.S. Army and NATO allies, but had to be scaled down due to the coronavirus pandemic. Still, the Army was able to test interoperability There were a series of pre-Defender Europe exercises to assess capabilities “to inform future network design,” according to Justine Ruggio, director of communications for the Network Cross-Functional Team at Army Futures Command. These assessments included several pieces of Capability Set '21, including communications exercises and validation exercises with the Army's fielded Command Post Computing Environment software, Tactical Server Infrastructure and Commercial Coalition Equipment “to enable the use of the Mission Partner Environment, which allowed all participants to share classified information during the exercise, including the Polish and U.K.,” Ruggio said. During the pre-Defender Europe tests, “we were able to bridge the Polish and U.K. unit into an integrated command structure using our secret releasable network and create that common command-and-control picture,” Col. Lesley Kipling, the mission command lead and Army National Guard liaison officer to the Network CFT, said in an interview with C4ISRNET. Secret but releasable information is classified at the secret level and can be released to certain coalition partners who have sufficient clearance from their home country. An exercise scheduled for next year, called Warfighter 21-4, will allow for additional interoperability assessments with U.K. and French forces. According to Ruggio, one focus area will be on interoperability using the Network CFT's DevOps model to iterate the Command Post Computing Environment, continue to assess Commercial Coalition Equipment and evaluate the Mission Partner Environment. The event will be aligned with Capability Set '23, the next iteration of network tools. Kipling added that the cross-functional team and its partners are “continuing” to work on policies and training for properly connecting to a coalition network “so that it's not learning on the fly, but that these procedures and policies are codified in a way that they can be standardized and any user can execute whenever they're put in a situation,” she said. Brig. Gen. Joseph Papenfus, chief Information officer and deputy chief of staff of the G6 of U.S. Army Europe, said that the scaled-back nature of Defender Europe did affect network interoperability testing because soldiers were unable to come over from the United States. That means that U.S. Army Europe will focus heavily on European partners during the smaller exercises, Papenfus said, including validating network integration and establishing a secret but releasable network with NATO. “Every opportunity that we have to see how a piece of equipment works within the larger set of the network, we take advantage of that,” Ruggio said. https://www.c4isrnet.com/yahoo-syndication/2020/07/29/how-army-network-modernization-efforts-ensure-equipment-works-with-allies

Toutes les nouvelles