Analyzing the challenges and threats of the cyber electronics field

Document Type : Original Article

Authors

1 Assistant professor of Imam Hossein University

2 Associate Professor of the Higher National Defense University

3 A graduate of the National Defense University

4 Doctoral student of,suppreme National Defense University

Abstract

The expansion of cyber space in the electromagnetic spectrum and the emergence of guided, autonomous, Standoff and intelligent weapons such as UAVs (Unmanned aerial vehicle), USVs (Unmanned surface vehicles), UUV (Unmanned underwater vehicle), MAV (Micro air vehicle requirements) and other Remotely control equipment, along with command and control and decision support technologies such as cloud computing technologies, Battlefield Internet of Things, Big data, 5G, SCADA and Starlink technologies have greatly varied the battlefield environment and expanded in civilian areas. The intertwining of the cyberspace and the electromagnetic environment has created a new space called "cyberelectronics or cyberelectromagnetism)" which is able to influence all capitals of other domains (physical and cyber) in a short period of time. In such a situation, if the possibility of surprise was not out of mind until yesterday, it has become a concrete example with the cowardly assassination of the IRGC Quds Force commander and then the assassination of Martyr Fakhrizadeh with remote control weapons. The first step to deal with cyber-electronic attacks is to recognize the challenges and threats in this area, which reduces and to some extent eliminates the level of surprise. Therefore, the question of this research is, what are the challenges and threats in the field of cyberelectronics? In this research, by studying the documents of the countries with the name and the available articles and by using the MaxQuda tool with a meta-composite approach, four challenging and threatening categories have been extracted, respectively "technology", "fundamental", "integration" and "operational forces".

Keywords


  • فهرست منابع و مآخذ

     

    الف. منابع فارسی

     

    • آذرپی، بهمن (1385). جنگ‌های آینده. فصلنامه علوم و فنون نظامی، 2(5)، 126-114.
    • امیرصوفی، حشمت‌اله(1392). پدافند غیرعامل امن‌ترین راه برای ایستادگی در برابر دسیسه‌های دشمن. همایش آموزشی پدافند غیرعامل با رویکرد دفاع سایبری، سمنان
    • حسنلو، خسرو(1396). اصول جنگ در عصر ناهمگونی‌ها. فصلنامه مطالعات دفاعی استراتژیک، 15(70)،178-151
    • حیدری، کیومرث و عبدی، فریدون(1391). جنگ‌های آینده و مشخصات آن با تحلیلی بر دیدگاه برخی صاحب‌نظران نظامی غرب. فصلنامه علمی-پژوهشی مدیریت نظامی، 12(48)، 76-43
    • شهبازی ‌سلطانی، محمد و صواتیان، سیاوش(1396). شناسایی ویژگی­های معرف مدیر جهادی به روش فراترکیب. فصلنامه علمی - پژوهشی مدیریت اسلامی،52(1)، 230-199
    • فرح بخت، احمدرضا، و دهقانی، مهدی. (1398). همگرایی جنگ الکترونیک و جنگ سایبری و الزامات اجرای آن در سازمان های نظامی. فصلنامه امنیت ملی، 9(31 )، 199-219.

     

     

    ب. منابع انگلیسی

     

    • Askin, O., Irmak, R., & Avsever, M. (2015, May). Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare. In Cyber Sensing 2015 (Vol. 9458, pp. 83-89). SPIE.
    • AU Department of Defence. Science & Technology. (2016). Cyber and Electronic Warfare Division Strategic Plan 2016-2021
    • Bommakanti, K. (2019). Electronic and Cyber Warfare: A Comparative Analysis of the PLA and the Indian Army. ORF Occasional Paper, 203.
    • Choi, S., Cho, J., & Kwon, O. J. (2020). A Study on Battle Damage Assessment of Electronic Warfare associated with Cyber Warfare. Journal of Internet Computing and Services, 21(1), 201-210.
    • Cole, H. T. (2014). Warfare in the Electromagnetic Spectrum and Cyberspace: United States Air Force Cyber/Electromagnetic Warfare Command Construct. Air War College, Air University Maxwell AFB United States.
    • Cox, J., Bennett, D., Lathrop, S., Walls, C., LaClair, J., Tracy, C., & Esquibel, J. (2019). The Friction Points, Operational Goals, and Research Opportunities of Electronic Warfare and Cyber Convergence. The Cyber Defense Review, 4(2), 81-102.
    • Du Plessis, W. P. (2014, August). Software-defined radio (SDR) as a mechanism for exploring cyber-electronic warfare (EW) collaboration. In 2014 Information Security for South Africa (pp. 1-6). IEEE.
    • Haig, Z. (2015). Electronic warfare in cyberspace. Security and Defence Quarterly, 7(2), 22-35.
    • Henselmann, G., & Lehto, M. (2019, July). Where Cyber Meets the Electromagnetic Spectrum. In ECCWS 2019 18th European Conference on Cyber Warfare and Security (p. 209). Academic Conferences and publishing limited.
    • Kim, S., Kim, S., Park, B. J., Jeong, U. S., Choo, H., Yun, J., & Kim, J. (2021). Cyber Electronic Warfare Technologies and Development Directions. The Journal of Korean Institute of Electromagnetic Engineering and Science, 32(2), 119-126.
    • Leite Junior, W. C., de Moraes, C. C., de Albuquerque, C. E., Machado, R. C. S., & de Sá, A. O. (2021). A triggering mechanism for cyber-attacks in naval sensors and systems. Sensors, 21(9), 3195.
    • Mallick, P. K. (2021). The PLA’s Cyber Warfare Capabilities and India’s Options. The Future of War in South Asia: Innovation, Technology and Organisation, 54.
    • McCrory, D. (2020). Russian Electronic Warfare, Cyber and Information Operations in Ukraine: Implications for NATO and Security in the Baltic States. The RUSI Journal, 165(7), 34-44.
    • Murray, G., Johnstone, M. N., & Valli, C. (2017). The convergence of IT and OT in critical infrastructure.
    • NATO STANDARD, AJP-3.20, (2020). ALLIED JOINT DOCTRINE FOR CYBERSPACE OPERATIONS
    • PVSM, L. G. D. R. P., & AVSM, V. (2017). CYBER ELECTRONIC WARFARE: THE MOTHER OF NON-KINETIC THREATS. Impact of Future Technologies on Warfare, 1.
    • RAND Corporation. (2013). REDEFINING INFORMATION WARFARE BOUNDARIES FOR AN ARMY IN A WIRELESS WORLD
    • Stouffer, K., Scarfone, K. (2013). Guide to Industrial Control Systems(ICS) Security. U.S. Department of Commerce
    • Soesanto, S. (2021). A Digital Army: Synergies on the Battlefield and the Development of Cyber-Electromagnetic Activities (CEMA). CSS Cyberdefense Reports.
    • UK Ministry of Defence. (2017). Future Force Concept. Development, Concepts and Doctrine Centre. Joint Doctrine Note 1/17.
    • UK Ministry of Defence. (2018). Cyber and Electromagnetic Activities. Development, Concepts and Doctrine Centre. Joint Doctrine Note 1/18
    • S. Department of the Army Headquarters. (2014). Cyber Electromagnetic Activities. Field Manual No. 3-38(FM 3-38).
    • S. Department of the Army Headquarters, (2018). The U.S. Army Concept for Cyberspace and Electronic Warfare Operations (2025-2040).
    • S. Department of the Army Headquarters. (2021). CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE. Field Manual No. 3-12(FM 3-12)
    • L. Do, L. Fillatre, I. Nikiforov and P. Willett. (May 2017). Security of SCADA systems against cyber–physical attacks, in IEEE Aerospace and Electronic Systems Magazine, vol. 32, no. 5, pp. 28-45
    • Yasar, N., Yasar, F. M., & Topcu, Y. (2012, May). Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield. In Cyber Sensing 2012 (Vol. 8408, pp. 151-159). SPIE.

     

    ج. منابع عبری

    • גיל ברעם ואופיר בראל(2020). לוחמת מידע בין המעצמות במאה ה־