Cyber-Electronic Warfare
Converged cyber and EW, spectrum security, GPS/GNSS spoofing, RF attacks, EMP hardening.
What is Cyber-Electronic Warfare?
Cyber-electronic warfare represents the convergence of traditional electronic warfare (EW) — which has operated in the electromagnetic spectrum for decades — with modern cyber operations. As military and civilian systems become increasingly software-defined and networked, the boundary between attacking a system through its network interface versus its radio frequency (RF) interface has blurred, creating a unified cyber-electromagnetic domain that demands integrated offensive and defensive capabilities.
Electronic warfare encompasses electronic attack (jamming, spoofing), electronic protection (anti-jam, frequency hopping), and electronic support (signal intelligence, spectrum monitoring). When combined with cyber operations, adversaries can chain RF-based attacks with network exploitation — for example, spoofing GPS signals to manipulate autonomous vehicles, jamming communications to force fallback to less secure channels, or exploiting software-defined radios to gain network access through wireless interfaces.
GPS spoofing has emerged as a particularly impactful threat, affecting aviation, maritime navigation, financial system timing, and military operations. The proliferation of software-defined radio (SDR) platforms has dramatically lowered the cost and skill barrier for RF attacks, while the growing dependence on satellite communications, 5G networks, and wireless IoT creates an ever-expanding RF attack surface.
Why it matters
As warfare and critical infrastructure become increasingly dependent on the electromagnetic spectrum, the convergence of cyber and electronic warfare creates threats that neither discipline can address alone. Understanding this intersection is critical for national security and critical infrastructure protection.
Cyber-electronic warfare sits at the intersection of cybersecurity, signals intelligence, and military operations. It extends the cyber threat model to include the physical electromagnetic spectrum, requiring professionals who understand both networking and RF fundamentals.
Build, Connect & Operate
Build and run the systems — apps, cloud, data, networks, OT, AI infra, supply chain, quantum engineering.
Other domains in this layer
Key topics
Standards and frameworks
Curated resources
Authoritative sources we ground Cyber-Electronic Warfare questions in — frameworks, research, guides, and tools.
DoD Cyber Strategy (2023)
Defend forward, persistent engagement, building partner capacity. Context for military cyber operations questions.
Tallinn Manual 2.0 — International Law on Cyber Operations
Expert analysis of how international law applies to cyber operations. Sovereignty, use of force, law of armed conflict in cyberspace. The primary reference for legal/policy questions in cyber warfare.
DoD Joint Publication 3-12 — Cyberspace Operations
Joint doctrine for cyberspace operations: offensive/defensive cyberspace operations, DoDIN ops, command relationships. The U.S. military's authoritative cyber doctrine.
CISA Positioning, Navigation, and Timing (PNT) Services
Federal guidance on protecting GPS/GNSS-dependent infrastructure from spoofing and jamming. Resilient PNT executive order context, sector-specific resilience profiles.
NSA Cybersecurity Advisories
NSA technical guidance on nation-state TTPs, hardening guidance for high-value targets, and joint advisories with CISA/FBI. Useful for advanced cyber-EW and military-adjacent questions.
Education and certifications
More in Cybersecurity
Test what you know about Cyber-Electronic Warfare
42 questions available. Beginner to expert questions, scored against the global leaderboard.