Cyber Electromagnetic Activities Flashcards
Cyber attack types
Denial of service
Exploitation
Misinformation
Cellphones on the battlefield: cellphone tracking: GSM sniffing, WiFi sniffing
denial of service
can either completely shut down a system from communicating or can cause delays to the point where the system is not practical to use; jamming
misinformation
cause mistrust and deteriorate morale, and provide inaccurate information that furthers their interests
exploitation
hacking into systems, sending phony messages, finding GPS coordinates; Essential Elements of Friendly Info (EEFI)
Cellphones on Battlfield
capability to both intercept and direction-find nearly all communications from hand-held cellular devices and tactical radios to Command-level encrypted datalinks;
detect, coordinate, strike
Electromagnetic Spectrum
range of all possible electromagnetic radiation: “sweet spot” is VHF, UHF, SHF – SINGARS and cellphones are on VHF
EMS Mitigation Strategies
- Omnidirectional antenna: reduce probability of location being found, use when moving
- Using the lowest power setting for effective coms
- signature amplification: EMS Signature is smaller when antennas are dislocated from unit, harder to detect
- terrain masking: using terrain as barriers to hide radio emissions from adversary exploitation
- emission control: only speak when you need to
directional antennas: better for only needing to contact 1 other unit, use when stationary
PACE Plans
best PACE plan is spectrally diverse, easy to set-up and maintain, and not dependent on civilian sponsorship
Quick Transmission Times
- Ensure all transmission are necessary
- Preplan messages before transmitting them
- Transmit quickly and precisely
- Use equipment capable of data burst transmission
- Use an alternate means of communications
- Use of brevity codes
Communications Jamming Indicators
- Robotic sounds, howling
- Prerecorded sounds playing
- Loss of control of UAS
GPS Jamming
- Loss of GPS signal
- Loss of or incorrect time
- Grid coordinates inaccurate
- Jamming detection warning message
What to do with suspected jamming
- Increasing the transmission power
- Increasing the distance between you and the jammer
- Changing frequency in accordance with the PACE plans
- Using terrain or vehicles to shield friendly antennas from the jamming emanations
- body mass shielding
File JSIR (Jay’Seer) or Joint Spectrum Interference Report
Encase GPS with trash can or put in small hole
Incorporating cyber and EW into Ops
CEMA sections and EW NCOs can assist you in identifying vulnerabilities in your plan and identify Cyber and EW targets that can help your chances of successful execution of your plan
“Effects Based Targeting” 4 D’s
The five effects to request in support of your operation: Deny, Degrade, Disrupt, Destroy, or Manipulate.
Deny - target cannot use spectrum or equipment for a period of time.
Degrade - target cannot use equipment at full capacity
Disrupt - target can intermittently use equipment
Destroy - target is made inoperable
Manipulate - target receives information, such as re-transmitting a tactical order recorded earlier to a subordinate unit at a key time to cause confusion.