Electronic warfare – the next evolution of Cybersecurity
Duga-1, an over-the-horizon radar station, close to Chernobyl

Electronic warfare – the next evolution of Cybersecurity

Electronic warfare is not a new concept, with countries using tactics like jamming an enemy’s communications, radars, and other systems going as far back as the previous century. However, it has evolved to encompass cyber warfare, making it a far more dangerous threat.?Unlike traditional weapons, cyber weapons can move much faster and do not have the limitations of borders or distances, making public targets much easier to attack.

READ THE FULL ARTICLE ON BACKBONE.IO

The use of cyberattacks to damage and disrupt the enemy’s digital capabilities is now a key strategic advantage, which is being actively used by combatants both off and on the battlefield. Using these attacks both help combatants in the field and also helps in disrupting and weakening the infrastructure of the enemy, making them more susceptible to attacks.

Nation states have also fully embraced this new trend and are actively using it for disruption, espionage, and even spreading their propaganda to influence media and public perception as we will see in this article.

What is electronic warfare?

The use of electromagnetic energy to manage the electromagnetic spectrum (EMS) in order to prevent an adversary from using it or to gain an advantage is known as electronic warfare (EW). All electromagnetic spectrum frequencies, from radio waves to gamma rays, make up the EMS.

  • Electronic assault (EA)
  • Electronic protection (EP)
  • Electronic support (ES)

are the three main tactics utilized in electronic warfare.

Using electromagnetic radiation to interfere with or impair an adversary’s electronic systems is known as an electronic attack (EA). Among these options is jamming, which is transmitting signals on the same frequency as the adversary’s radar or communications devices in order to block them or create errors.

...

READ THE FULL ARTICLE ON BACKBONE.IO

要查看或添加评论,请登录

BACKBONE的更多文章

社区洞察

其他会员也浏览了