Jamming and spoofing

Jamming and spoofing

image provided by pixabay

False GPS signals are surging near conflict zones, deceiving onboard plane systems, and complicating the work of airline pilots. Disruptive issues on planes (like a...
Image provided by pixabay

The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges. The satellites orbiting Earth are crucial for...
cyber security. image by pixabay

A series of robberies in Minneapolis led police to believe that burglars are using WiFi jammers to block off security system signals from reaching...
image provided by pixabay

Chinese researchers have reportedly developed a new “game-changer” military surveillance technology- an AI-enabled signal intelligence device. South China Morning Post reports that with this technology,...
image provided by pixabay

Raytheon announced that its Counter-Electronic High-Power Microwave Extended-Range Air Base Defense (CHIMERA) has completed a three-week field test in which it managed to fry...
image provided by pixabay

Scientists from China claim to have developed a new high-speed kinetic energy weapon that could shake apart a tank. What’s more, the new 20...
image provided by pixabay

Electronic warfare is said to be the next big frontier, and this new Chinese multi-target weapon design might be revolutionary. Researchers at the Southeast University...
image provided by pixabay

Ukraine’s Homegrown Kamikaze Drones The Ukrainian Army has acquired a UAV that can target strategic sites in Russian territory. The AQ 400 Scythe drone...
echo-dot. image by pixabay

Privacy preserving methods are becoming increasingly important in enhancing consumer privacy and security as voice technologies become part of daily life. Consumers use voice...
AI. image by pixabay

In uncontrolled environments, secure communications can be jeopardized by RF signals that are almost impossible to manually find and identify in real-time. New technology...
Cloud. image by pixabay

The US Army is preparing for the multi-domain battlefield. This year, the Army’s multi-domain task forces will serve as primary testbeds for the service’s...
Satellite. image by pixabay

An allegedly "cognitive" radio frequency system was launched into space, not more than 2 weeks ago. As part of the Pentagon Space Test Program,...
Photo illus. US DoD

The US Air Force is integrating a new GPS simulator for weapons testing under electronic warfare — jamming — environments. The move is part...
Photo illus. gps geospatial by PIXABAY

GNSS spoofing has become a growing security threat. This type of attack is a malicious attempt to alter a user's global navigation satellite system...

The modern battlefield depends on the electromagnetic domain for sensing, communications, and navigation. Protecting them has become mission-critical for success in combat.  Israel Aerospace Industries...
photo illus. satellite by Pixabay

The proliferation of electronic devices designed to interfere with Global Positioning System signals is a problem for the Pentagon and for many industries that...
Photo illus. drone - by PIKIST

By Or Shalom In recent years, the threat of unmanned aerial vehicles on critical infrastructures and vessels has been a growing security challenge. The use...
fighter aircraft

A new autonomous aircraft could become the next-generation of drones that accompany manned planes into battle. Northrop Grumman has unveiled the stealthy jet Model...
anti-jamming

Missions and lives depend on warfighters' ability to find their way in unfamiliar and unpredictable territory. A new GPS receiver receives the new M-code...

Defining the Problem The modern battlefield is characterized by a proliferation of sensors and threats to friendly forces in terms of quantity, range, and integration....

Airspace management will become considerably more complex with the entrance to service of more and more unmanned aerial systems, creating new safety and security...
EW

M-Code is a new anti-spoofing, anti-jamming GPS signal designated for military use. With adversaries trying to jam and spoof signals to disrupt forces and...