The Battlefield is Evolving

The Increased Threat of Cyber Attack Affects Strategic Decision Making

As technologies continue to advance and become more deeply ingrained in modern life, threats of a crippling cyber attack or electronic warfare (EW) become increasingly probable. In an attempt to mitigate these risks, the Colombian national government (represented by the Ministry of Information Technology), the Higher War School in Colombia, and ITM Consulting Company joined forces to explore the role simulation plays in understanding, preparing for, and combating cyber attacks.

To build electronic warfare scenarios, the organizations needed a tool that could create and model elements vulnerable to cyber attacks, such as radar systems, military and civilian entities, and communication systems; they chose MAK’s VR-Forces simulation software tool for the job. VR-Forces not only allowed them to create scenarios to play out different threats in different environments but also gave them the freedom to redesign the User Interface (UI) to match specific scenario needs. The group conducted three major cyber attack scenarios, which they are using to create response strategies.

In the first scenario, VR-Forces simulated two aircraft teams, where the red team was given a mission to use scanners and jammers to alter the frequency on the blue team’s radar systems; doing this enabled the red team to use attack aircraft to undermine the blue team’s defense system (see Figure 1).

Figure 1: Illustration of a Radar Attack
Figure 1: Illustration of a Radar Attack

The second scenario uses VR-Forces to simulate an electronic warfare attack on the Colombian oil infrastructure, a victim of frequent terrorist attacks. In this exercise, the red team was instructed to alter the readings on specific valves on a pipeline to ignite fires. Additionally, attacks on the blue team’s surveillance systems (unmanned aircraft) set out to deter the blue team’s response (see Figure 2).

Figure 2: Cyber Attack on a Colombian Oil Infrastructure
Figure 2: Cyber Attack on a Colombian Oil Infrastructure

A third scenario highlights the danger to the civilian population if the turbines in a hydroelectric plant are compromised through a cyber attack. The red team in this situation instigates drastic variations in water levels at the plant that in turn disrupt the power and energy generated to the nearby town. The power and energy disruptions bring about detrimental consequences for the simulated town (see Figure 3).

fig 3
Figure 3: Cyber Attack on the Colombian Critical Infrastructure

The exercises using VR-Forces have contributed to research and development efforts led by the Department of Telematics ESDEGUE, and in particular its line of research in Cybersecurity and Cyber Defense.

"What we were able to do with VR-Forces allowed us to lead the research process for the modeling and simulation of Electronic Warfare and Cybernetics; it is through this research that we learn how to best describe the behavior of different cyber attacks and EW tactics to determine scenarios, trends, and courses of action with excellent results,” says Colonel Martha Liliana Sanchez Lozano, the Official Colombian Air Force Chief of Telematics and Program Coordinator of Cybersecurity and Cyber Defense at the Higher War School.
 
Want to learn more? Have a look at the VR-Forces page for more information. interested in seeing a demonstration?

ST Engineering

ST Engineering

Save
Cookies user prefences
We use cookies to ensure you to get the best experience on our website. If you decline the use of cookies, this website may not function as expected.
Accept all
Decline all
Essential
These cookies are needed to make the website work correctly. You can not disable them.
Support
Assists delivery of support services to customers
Accept
Vimeo
Supports video display through the content delivery network
Accept
mak.com
Session cookie - required for user logins to work correctly
Accept
Analytics
Tools used to analyze the data to measure the effectiveness of a website and to understand how it works.
Google Analytics
Aggregated user information key used to identify website use trends
Accept
Decline
Marketing
Keys used to analyze data to measure the effectiveness of third party marketing efforts and inbound network traffic.
Google
Advertising key used to track the efficacy of targeted marketing efforts
Accept
Decline