Where Cyber Meets the Electromagnetic Spectrum
Henselmann, G., & Lehto, M. (2019). Where Cyber Meets the Electromagnetic Spectrum. In T. Cruz, & P. Simoes (Eds.), ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security (pp. 209-218). Academic Conferences International. Proceedings of the European conference on information warfare and security.
© The Author(s) 2019
Cyber linked with Information Technology, computers and the internet are the most commonly understood potential threats that everybody is aware of nowadays. In the case of National Cyber Strategy most efforts are given to these potential battlefields and threats. But is it enough to stay with these paradigms? Cyber warfare will look for utmost effects for chaos and misalignment of economy and therefore we cannot exclude the facts, that there is a potential threat also possible in the cut volumes between the information technology, the electromagnetic spectrum and its linked infrastructure and processes. We understand the technology for mobile telecommunications and data transfer, as the providers and linked business models are transparent and an open source and therefore a potential threat in the sense of cyber-attacks. All these services are based on the message transfer in the Electromagnetic Spectrum (EMS). It will be more challenging to enter in secured networks and modern data communication protected by encrypted and secured data links, hardened equipment and architecture. But as those systems, like the avionics and communication subsystems in airborne vehicles and commercial aircrafts are highly interlinked and interoperable based on data networks, it will be necessary to understand the architecture and weaknesses in detail. Of course, these principles are not fixed only to the airborne platforms and relevant applications; you may find the same technical pandemics in data transmission and data engineering in the physics of any data transfer chain, like satellite communication, radio transmission links. The paper will discuss the technical background in principle and identify potential weaknesses in aviation electromagnetic spectrum. We propose measures for attention and the implementation of relevant procedures and quality in order to overcome bottlenecks and grey area dull which helps the opponents to weaken society and open a sideshow for conflicts introduced by “simple cyber threat handling”. © 2019, Curran Associates Inc. All rights reserved. ...
PublisherAcademic Conferences International
Parent publication ISBN978-1-912764-28-0
ConferenceEuropean Conference on Cyber Warfare and Security
Is part of publicationECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security
Publication in research information system
MetadataShow full item record
Showing items with similar title or keywords.
Lehto, Martti; Henselmann, Gerhard (Academic Conferences International, 2020)Cyber warfare, information warfare, electronic warfare, command and control warfare, spectrum warfare. Those are only some of the names by which researchers and military experts describe their offensive and defensive ...
Lehto, Martti (Cyberwatch Finland Oy, 2019)Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, ...
Blackledge, Jonathan (University of Jyväskylä, 2010)
Abdi Mahmoudaliloo, Younes (University of Jyväskylä, 2016)
Sakildien, M.; Tarvainen, Olli; Kronholm, Risto; Izotov, I.; Skalyga, V.; Kalvas, Taneli; Jones, P.; Koivisto, H. (AIP Publishing LLC, 2018)The balance between warm and hot (>1 keV) electron density and their losses from the magnetic confinement system of an Electron Cyclotron Resonance Ion Source (ECRIS) plasma is considered to be one of the main factors ...