Demand in the Middle East for ‘total systems integration’ in C4I reflects a broader interest in developing robust joint operating capabilities.
New cyber threat offers potentially useful tool for militaries
Vulnerabilities in Medium Access Control (MAC) layer protocols can be exploited for undetectable long-range communications using third-party networks in a new technique dubbed Sparrow.
The technique also enables hackers or cyber attackers to leak data from compromised systems, said Reza Soosahabi, a researcher and engineer at US-based Keysight Technologies who discovered this novel method of data exfiltration.
Soosahabi explained to Shephard how Sparrow works: ‘This vulnerability is the result of having unprotected broadcast signals in MAC layer procedures that can be implicitly controlled by anonymous user devices.’
A MAC layer protocol is responsible for moving data packets from one network to another via …
More from Digital Battlespace
Rheinmetall is buying a 25.1% stake in 4iG and setting up a JV in Hungary to drive its digitisation plans.
The Norwegian Defence Materiel Agency is looking to exploit public and private 5G networks and has conducted trials involving a 5G network aboard a trailer as well as the use of gunshot detection systems and drones.
Northrop Grumman has proven JADC2 connectivity capabilities in support of FVL networking.
Finnish-Swedish industry collaboration helps AESA radar to detect low-flying missiles and UAVs, says Saab.
USAF aims to use small satellite bus beyond equatorial geosynchronous orbit.