Editor’s note: This is the first open press item we recall that discusses China’s use of GPS jamming against US forces. GPS jamming and spoofing are often classified as “electronic warfare” by US officials instead of “cyber warfare.” We don’t understand why that is since jamming and spoofing can neutralize end use devices, cut off IT pathways, and can introduce false data into a variety of systems. Detecting and deterring GPS jamming and spoofing could be quick wins for cyber warriors.
It is also interesting to note that, even if US forces were to jam GPS and China’s satellite navigation and timing system, BeiDou, the Chinese have a high power, difficult to disrupt terrestrial system, called Loran, they could still rely upon (Russia and Iran have Loran systems also). The US abandoned Loran in 2010 in favor of relying entirely on GPS – though there is a growing movement to establish an improved eLoran system. Until that happens the US will be at a competitive disadvantage relative to these nations which may not always have our best interests at heart.
CRUNCH NETWORK
Cybersecurity is threatening America’s military supremacy
Posted by Paul Martini
The sparsely populated Spratly Islands, a collection of hundreds of islands and reefs spread over roughly 165,000 square miles in the South China Sea, are very quickly becoming the center of one of the most contentious international disputes between world powers since the fall of the Soviet Union.
Alarmingly, the use of cyber attacks in this dispute suggests we might already be in the midst of a new Cold War playing out in cyberspace — where America’s advantage is not as clear as it is with conventional armies and navies.
The Spratly Islands are of economic and strategic importance. All of the countries in the region — including China, Vietnam and the Philippines — have made competing territorial claims to the region. In recent years, China has become increasingly aggressive in its claim, rapidly building artificial islands while also conducting military operations in the area.
Beyond this conventional military build up, however, are complex and brazen cyber attacks by China that are leaving America and its allies increasingly concerned.
While these “nuisance” attacks — and continued cyber espionage by China — are serious, targeted Chinese cyber attacks designed to impact America’s physical military systems in the South China Sea are the most substantial evidence that we may be on the brink of a more tangible cyber threat to American military power.
The challenge is that the capabilities and sophistication of state-sponsored and non-state hackers are increasing exponentially.
China appears to be moving forward with plans to use electronic attacks designed to either disrupt or take control of American drones. With reports that the Chinese attempted to interfere with U.S. military drones at least once in recent years, the country has shown a willingness to use GPS jamming to prevent U.S. aircraft from conducting surveillance missions in the Spratly Islands.
That 2015 instance appears to fit China’s public posturing on the ways it says it could use electronic GPS jamming to disrupt U.S. drone networks. One 2013 report in the Chinese journal Aerospace Electronic Warfare notes in technical detail how its military can “use network warfare to attack and even control America’s network” by disrupting the connection between satellites and aircraft.
This sort of GPS jamming could be the largest electronic threat to the U.S. drone program. In fact, it has been widely speculated that Iran used a similar GPS “spoofing” technique to take control of a U.S. surveillance drone in 2011.
PNT is the quiet backbone of everything but too many leaders still don’t see the risk.
But you do. You understand the systems, the dependencies, the failure chains. That insight is rare — and it’s exactly what your country needs right now. Contact your government leaders and industry decision-makers and tell them resilient PNT isn’t a feature — it’s the foundation everything else depends on.
Image: AB3.Army on Youtube - The town of Lyman in Ukraine draped with fiber optic cable from both Ukrainian and Russian FPV drones. What's new: An interesting article about drone warfare, and how the U.S. is asking something from Ukraine, a bit of a reversal in the...
Image: Shutterstock What's new: A report that multiple companies are offering governments the ability to geolocate Starlink terminals. Why it's important: Security concerns - an adversary could target, kidnap, kill, etc. users. Privacy concerns - user location data...
Image: Shutterstock What's new: An interesting form of autonomous navigation based on nature. Why it's important: Autonomous systems have an important place in an overall PNT architecture. For some applications they are the best/only method. This system uses just 42...
Image: RNT Foundation What's new: Draft updated PNT cyber guidance from NIST. They are seeking public comment and input. Why it's important: PNT and cyber are well intertwined. PNT is an essential tech infrastructure so protecting it from malicious cyber effects is...
Image: Shutterstock What's new: A webinar featuring our colleague Matt Shirley. Matt is a professional port pilot and has some interesting insights on maritime reliance on GPS/GNSS, how things could go wrong without resilient PNT, and how things could go better with...