By Jeff Zacuto, Senior Director, Commercial Marketing
The chilling uncertainty of “Leave the World Behind,” the Netflix smash hit where a seemingly idyllic family vacation unravels amidst the shadows of an unknown crisis, has left many of us wondering, “How far from fiction is this?”
SPOILER ALERT: This post might change your perspective about the nature of modern warfare. It also contains spoilers about the movie. If you haven’t seen it yet, but you’re planning on seeing it, you should continue reading anyway.
- Can the control systems of a tanker ship be manipulated, potentially leading to a dangerous collision with the shoreline? Yes, it absolutely can. Cyber researchers in 2017 discovered that the configuration of certain ships’ satellite antenna systems could leave them wide open to attacks that could change the ship’s GPS coordinates or brick the navigation system by uploading new firmware.
- Can hackers infiltrate the security of Tesla’s global fleet, causing autopilots to malfunction and resulting in car accidents? Yep, they can do that too. In 2020, cybersecurity company Regulus Cyber successfully hacked a Tesla, using Autopilot to drive it off the road, and even causing it to stop and attempt to make a turn in the middle of a highway.
- Can a commercial aircraft, sitting on a runway, fall victim to a remote hack? Here too, the answer is 100% yes. In 2017 a team of government, industry, and academic researchers successfully demonstrated a remote, non-cooperative penetration of a Boeing 757’s systems in a non-laboratory setting, effectively establishing a persistent presence on the aircraft’s systems.
As unsettling as these scenarios may be, they are the reality of the cyber and electronic warfare (EW) landscape we live in today, which has major implications for our nation’s critical defense and transportation infrastructures.
The Reality of Electronic Warfare
“Leave the World Behind” focuses on the unsettling reality of modern cyber threats, with the distinction between “traditional” cyber and electronic warfare (EW) left ambiguous — adding to the suspense while also highlighting the complexity of modern warfare. The movie isn’t clear as to the exact means, or multiple methods used, but it’s important to understand the differences between “traditional” cyber warfare and EW.
- “Traditional” cyber warfare manipulates and exploits computer systems, networks, and information. It involves activities such as hacking, spreading malware, and conducting cyber espionage.
- EW is the ability to manipulate the electromagnetic spectrum — radio, infrared, or radar signals — to deny, degrade, disrupt, destroy, and deceive an adversary and their ability to use these signals.
EW isn’t new. Its roots trace back to the Boer War (1899-1902) in present-day South Africa. The British used searchlights to bounce Morse code signals off clouds, and in response, the Boers used their own searchlights to jam the British signals. During World War II, the British used jamming devices to trick German radars, and the Cold War saw both sides engage in intense electronic espionage and counterintelligence.
Today, EW extends to the wires and circuits that underpin our daily lives. The commercial airliners soaring across continents, the trains we take to work, the energy plants that power our homes, and the weapons systems that keep our nation protected are all at risk. And, with the growing use of Artificial Intelligence (AI), EW will likely become increasingly sophisticated and accessible, such that even non-state actors could potentially wield potent EW tools, making the cyber battlefield more complex and unpredictable than ever.
Fiction vs. Reality: Drawing Parallels Between the Movie and the Real World
How real is “Leave the World Behind?” Its narrative is grounded in the reality of modern cyber threats. And the sudden breakdown of technology and communication eerily echoes real-world events of cyberattacks on critical infrastructures. Let’s look at major plot points to determine how much of the film is FUD:
- Tesla Takeovers: In 2017, a hacker exploited vulnerabilities in Tesla’s servers to gain control over the automaker’s entire fleet. And in 2021, researchers demonstrated a zero-click exploit that a bad actor could carry out remotely from a drone to take control of Tesla infotainment systems.
- Tracking Trickery: Recent GPS spoofing incidents over Iraq and Iran have led to significant navigational failures in commercial and business jets. And, in one severe case, a business jet nearly entered Iranian airspace after losing GPS navigation and signals on the pilot’s iPad devices.
- Telecoms Turmoil: A Russian cyberattack that knocked out service to half of Ukraine, damaged IT systems, and left millions without critical alerts. And at the onset of the Russia-Ukraine war, Russian intelligence disrupted Internet communications through ViaSat by knocking out satellite modems.
- Terawatt Troubles: ONE Gas Inc. in Tulsa, Oklahoma, suffered an advanced malware attack capable of compromising its operational system in 2020. And in 2023, A significant cyberattack in Denmark enabled Russian hackers to access the country’s decentralized power grid.
These real-world incidents, reminiscent of scenes from “Leave the World Behind,” underscore the pressing need for heightened cybersecurity measures to protect our nation’s critical infrastructure. They remind us that what was once perceived as fiction is now an uncomfortable reality.
Electronic Warfare in the Defense Sector
Electronic warfare (EW) is a crucial component that enables armed forces to disrupt or manipulate enemy communication and weapon systems, playing a vital role in gaining a strategic advantage. But the use of Radio Frequency (RF) technologies in EW means that any industry employing these technologies is potentially vulnerable to cyber-kinetic or cyber-physical attacks, including the United States Defense sector.
Recent examples of EW highlight its timeliness and importance in the modern theater. In November, Ukraine faced sophisticated Russian electronic warfare tactics that included jamming communications and radar systems, severely impacting Ukraine’s military effectiveness. The Russian forces used EW to create confusion and disrupt the coordination of troops, showcasing the decisive role of EW in modern warfare.
Conversely, the United States isn’t just a potential target of EW but also a proactive user. In fact, the U.S. military has been developing ambitious electronic attack concepts aimed at enhancing its ability to conduct offensive EW operations, indicating a recognition of the importance of dominating the electromagnetic spectrum in military confrontations.
These examples underscore the nature of EW in contemporary conflicts: countries like the United States are both potential victims and active users. This dual role highlights the importance of continually evolving EW strategies and technologies to maintain a strategic edge in modern warfare. Today, the tactics, techniques, and procedures used to conduct electronic warfare are quite sophisticated:
- Electronic Warfare and Radar Systems: EW techniques are vital in neutralizing enemy radar systems. Jamming tactics can significantly impair the enemy’s ability to detect and track, diminishing their defense and surveillance capabilities.
- Drones on the EW Frontlines: GPS spoofing can cause drones to deviate from their intended paths, affecting mission outcomes. Laser interference and other directed energy techniques can impair drones’ sensory equipment, rendering them less effective or inoperative in crucial scenarios.
- Securing Communication in the EW Era: Secure communication is critical for coordinated military operations, and the risk of intercepting and manipulating encrypted messages is a real challenge. Edge computing in contested environments reduces reliance on central systems, enhances response times, and aids in maintaining decision dominance amidst the complexities of EW.
- Counter-Electronic Warfare Measures: Defense strategies against EW threats have evolved to include detecting and neutralizing enemy EW efforts and implementing advanced technologies like radar hardening and frequency hopping. These measures are crucial for maintaining communication security and operational integrity against complex EW threats.
The landscape of EW is rapidly evolving, demanding adaptive and sophisticated strategies to safeguard military operations and civilian infrastructure. The integration of EW tactics in modern warfare highlights the need for ongoing research, development, and implementation of effective countermeasures to ensure operational success and protect against potential threats.
Impact on Critical Transportation Infrastructure
Beyond military engagements, EW threats extend to civilian lives, threatening infrastructure like power grids, communication networks, and transportation systems. The vulnerability of these systems to EW has significant implications for civilian safety and national security, necessitating protective strategies that can address the risks effectively.
- Enhanced Threats to Airlines: GPS spoofing can mislead pilots and disrupt flight paths, posing risks to safety. Radar jamming creates blind spots in airspace surveillance, potentially causing aircraft to stray into restricted or contested zones and raising security and safety concerns.
- Broader Risks to Ground and Maritime Transport: EW can undermine the precision and reliability of rail communication and signaling systems, resulting in delayed responses to emergencies, accidents, or inefficient routing. EW can also isolate vessels in maritime transport by jamming ship-to-shore communications, increasing the risk of piracy or severe navigational errors.
- Global Economic Impact: An EW attack can cause operational disruptions, leading to downtime, loss of productivity, and significant financial losses. The ripple effects of an attack could extend to our global, intricately linked supply chains, causing a domino effect on market availability.
Crucially, we can’t understate the potential human cost of EW attacks, which extend beyond immediate physical dangers. In our technology-reliant world, an EW attack carries the risk of triggering widespread panic and chaos. These attacks could severely disrupt critical emergency services, evacuation procedures, and rescue operations, intensifying the physical and psychological harm they could cause to the public.
Another unique consequence of EW attacks is the psychological toll on operators who become victims of debilitating stress when navigation and communication systems become unreliable, outcomes become uncertain. The strain of these situations hampers an operator’s ability to manage and trust their equipment, compounding the risks and consequences.
Preparing for the Future: Embracing Technology, Enhancing Defense
While the potential consequences of electronic warfare are sobering, “Leave the World Behind” also reminds us of human resourcefulness and the power of collaboration. By acknowledging the vulnerabilities, leveraging technological advancements, and fostering a culture of cyber awareness, we can turn the tide against EW threats.
Our future is not preordained.
Through collective action and innovative solutions, we can ensure that our critical infrastructure remains secure, and our interconnected world thrives, and doesn’t succumb to the silent weapons of the Gray Zone. A multi-faceted approach is essential to get us there:
- Make strategic cybersecurity investments now: Organizations should prioritize robust cybersecurity tooling and procedures including regular updates and audits that can adapt to evolving threats.
- Encourage inter-sector collaboration: Private sectors, government agencies, and international governing bodies must partner to enhance collective security and response capabilities.
- Develop a cyber-skilled workforce: Invest in cyber education and training programs that cultivate a workforce familiar with cybersecurity best practices and electronic warfare countermeasures.
- Foster public awareness and preparedness: Educate the public about the risks of electronic warfare and promote best practices in cybersecurity among private citizens and businesses.
- Embrace global cooperation and policy frameworks: Work towards international cooperation to establish norms and agreements on EW usage and implement frameworks guiding cybersecurity measures that can mitigate threats to lives and property.
By encouraging the responsible use of technology, and prioritizing cybersecurity, we can build a future where the benefits of connectivity outweigh the perils of electronic warfare. We must commit to these principles and actions to ensure the world can endure these complex digital challenges.
Learn more at railyard.shift5.io/leavetheworldbehind.