Pillar A: CybersecurityA17

Cyber-Electronic Warfare

Converged cyber and EW, spectrum security, GPS/GNSS spoofing, RF attacks, EMP hardening.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Cyber-Electronic Warfare.

What is Cyber-Electronic Warfare?

Cyber-electronic warfare represents the convergence of traditional electronic warfare (EW) — which has operated in the electromagnetic spectrum for decades — with modern cyber operations. As military and civilian systems become increasingly software-defined and networked, the boundary between attacking a system through its network interface versus its radio frequency (RF) interface has blurred, creating a unified cyber-electromagnetic domain that demands integrated offensive and defensive capabilities.

Electronic warfare encompasses electronic attack (jamming, spoofing), electronic protection (anti-jam, frequency hopping), and electronic support (signal intelligence, spectrum monitoring). When combined with cyber operations, adversaries can chain RF-based attacks with network exploitation — for example, spoofing GPS signals to manipulate autonomous vehicles, jamming communications to force fallback to less secure channels, or exploiting software-defined radios to gain network access through wireless interfaces.

GPS spoofing has emerged as a particularly impactful threat, affecting aviation, maritime navigation, financial system timing, and military operations. The proliferation of software-defined radio (SDR) platforms has dramatically lowered the cost and skill barrier for RF attacks, while the growing dependence on satellite communications, 5G networks, and wireless IoT creates an ever-expanding RF attack surface.

Why it matters

As warfare and critical infrastructure become increasingly dependent on the electromagnetic spectrum, the convergence of cyber and electronic warfare creates threats that neither discipline can address alone. Understanding this intersection is critical for national security and critical infrastructure protection.

Cyber-electronic warfare sits at the intersection of cybersecurity, signals intelligence, and military operations. It extends the cyber threat model to include the physical electromagnetic spectrum, requiring professionals who understand both networking and RF fundamentals.

Key topics

Electronic warfare fundamentals (EA, EP, ES)
Cyber/EW convergence and unified operations
GPS spoofing and anti-spoofing countermeasures
RF jamming techniques and resilience
Software-Defined Radio (SDR) security applications
Spectrum monitoring and signal analysis
Satellite communication (SATCOM) security
Wireless protocol exploitation (Wi-Fi, Bluetooth, 5G)
Directed energy weapons and electromagnetic pulse (EMP)
Military cyber-electromagnetic activities (CEMA)

Standards and frameworks

Curated resources

Authoritative sources we ground Cyber-Electronic Warfare questions in — frameworks, research, guides, and tools.

Education and certifications

More in Cybersecurity

Test what you know about Cyber-Electronic Warfare

42 questions available. Beginner to expert questions, scored against the global leaderboard.