Sign-up to receive weekly Defense email updates with news, commentary, photos, videos and more!
Focusing on the critical interplay of programs, policy, funding and operations to provide integrated intelligence and global perspective to defense and government leaders worldwide.
Aerospace Daily & Defense Report is relied upon for the latest, critical intelligence on programs, budgets and policies in defense, as well as military and civil space.
Unmanned Horizons is a dedicated section of AviationWeek.com's defense coverage of unmanned systems.
Access news, blog posts, videos, photos and other exclusive unmanned systems-related defense content.
Aviation Week is proud to announce its new Innovation Special Topic page supported by Booz Allen Hamilton.
Check out articles, white papers, interactive features and more related to aviation, aerospace and defense innovation.
Brought to you by:
There is a debate in the Pentagon about where electronic warfare ends and cyberwarfare begins. Those most immersed in the subjects say there is no line, just a continuum that dates back decades to the 1970s when air defense systems were being spoofed by EW pods on fighters.“Cyber is the message,” says a veteran electronic attack specialist who was also involved in developing radars for the F-15, F-16 and F-35. “Then you need a conveyance – an electromagnetic signal – to get it into the target system.An example is the EC-130 Compass Call electronic attack aircraft when it is “spoofing” enemy air defense systems by offering up false targets, sometimes thousands of them.“I’m putting a cyber-signal into the emission that makes the target [sensor] think the signal is something else – perhaps a group of approaching aircraft,” the specialist says. “Cyber is what happens when the spoofing signal gets to the receiver of the target network. That receiver may see false signals or it may provide an access port that you can get information out of [with malware].”As EW has developed into cyberwarfare, “We have taken down networks by contaminating and flooding them until they are useless,” he says. “Compass Call did it by using an emitted signal and accessing through an aperture [usually through an antenna on the target system].”The only thing new about cyberattack is the Internet venue, researchers say. The difference in the approach to penetrating is that instead of using an emitted signal, it is through “some fool plugging in an infected thumb drive, using a contaminated disc or leaving an access port open,” the specialist says. “If a network on the Internet gets access to a network that is not on the Internet, suddenly you have a gateway” that can be exploited by hackers and malware.
ar99, cyber, EW
Copyright © 2013, Aviation Week, a division of McGraw Hill Financial.