Electronic Weapons: The Wireless Hack Makes The Big Time

Archives

March 10, 2015: If hacking weren’t enough of a problem there’s a new and more devastating version coming into use; wireless hacking. Actually, this sort of thing has been around for a long time. But it’s common for new military (and commercial) technologies to take decades to mature. Thus television, radar, lasers, microprocessors and all manner of other technologies existed in more primitive form decades before they became common and widely used. Another new military technology is approaching breakout into the big time and this is wireless hacking. Not just for jamming or corrupting electronic devices wirelessly but even taking control of enemy devices.

This sort of thing has been in use for several decades in Electronic Warfare Pods carried by aircraft. These pods carry electronics that detect enemy radars and other electronic signals hitting the aircraft, identifies them and then sends “false returns” to confuse the enemy. Radar works by bouncing electromagnetic energy off a distant object then interpreting the signals that bounce back to the large dish most radars have. Radar has been available in a useful form since the 1930s but even back then it was known, in theory, how to deceive a radar by broadcasting back “false returns”. After World War II such “false return” devices began appearing and continue to get better.

Deceiving radar was part of a trend in wireless hacking that took advantage of the growing use of wireless signals for the transmission of all sorts of information. In response to this it has become more common to encrypt these signals. The user is still vulnerable if the enemy gets access to the users decryption codes, which allow one to read the encrypted date. In some cases it is possible to crack (decipher) encryption quickly enough to read the data. In addition to sending false data, hackers can now insert malware (hacker software) in the enemy wireless receiver systems and there do all sorts of mischief (stealing data or interfering with the operation of the device).

Since the 1980s there have been rumors that wireless hacking has actually been used. To be most effective details of wireless hacking capabilities must be kept secret. Israel is believed to have developed military technology in this area by the 1970s and used it for espionage as well as for disabling enemy electronics in combat. The U.S. is also believed to have some of this stuff, either developed independently or in cooperation with the Israelis. Russia is known to have developed some advanced theoretical ideas in this area but apparently was never able to develop the necessary hardware and software to make it work.

But now after decades of work and some small successes it has become possible to use wireless hacking on a larger scale for a wider range of attacks. This includes hacking of wireless control signals sent to space satellites. It’s not just the maturation of the technology but the proliferation, since the 1990s, of users of wireless transmission of data and command and control signals. Thus there are a lot more targets now and much better weapons available to hit many of those targets.

 


Article Archive

Electronic Weapons: Current 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close