CAN YOU HEAR ME NOW? THE VULNERABILITY OF CELLULAR AND SMARTPHONE USE ON THE BATTLEFIELD

Download
Author
Eshelman, Erich
Date
2020-06Advisor
Maness, Ryan
Second Reader
Tsolis, Kristen
Metadata
Show full item recordAbstract
Enemies of the United States of America seek new asymmetric means to counter the strength of the American military. The rise in the use of cellular and smartphones around the globe has created new threats for military forces. This thesis shows cellular and smartphones are a medium for dissemination of propaganda and cyberspace exploitation, and thus are a focus for operational security concerns. The 2014 Russian invasion of Crimea and the subsequent occupation of Eastern Ukraine presents an excellent case study to examine the vulnerabilities of these devices. The war in Ukraine shows the use of text messages to spread propaganda, the manipulation of a Ukrainian fire support Android Application to give away the location of its user to the enemy, and the dangers of OPSEC violations through social media posts to give away important military information. This thesis also examined the future threats to these vulnerable devices and their possible effects on the United States. The rise of 5G technology, deepfake videos, and vulnerabilities in the IoT all offer new vectors to attack and exploit American service members. Prescriptive measures the United States can employ through effective training and education are presented to ensure service members know the reason why their phones cannot be used. The thesis suggests this training needs to be applied to the allies and partner forces of the United States as well, to ensure their survival on the modern battlefield.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
Impact of the Telecommunications Act of 1996 and spectrum allocation on cellular telephone technology
Glowacki, Jason P. (Monterey, California. Naval Postgraduate School, 2003-09);From 1983, when the first cellular network was established, to 1992, the wireless industry grew by ten million customers. From 1993 to 2000, the wireless industry grew by 90 million customers. Today, there are more than ... -
VULNERABILITIES TO U.S. WATERWAY INFRASTRUCTURE IMPACTING THE ABILITY TO PROJECT NAVAL POWER
Monson, Alex J. (Monterey, CA; Naval Postgraduate School, 2022-03);This thesis answers the question: What are the core domestic maritime transportation system waterway vulnerabilities for the Carrier Strike Group power projection capabilities of the United States? There is a multitude of ... -
Acquisition System Design Analysis for Improved Cyber Security Performance
Naegle, Brad R. (Monterey, California. Naval Postgraduate School, 2019-04-30); SYM-AM-19-033There is ample evidence that cyber-attacks and cyber warfare are a growing concern for the United States. Our warfighting systems and networks have inherent vulnerabilities and so are targets for cyber adversaries. By ...