17 Jan CEMA and the competitive edge
Matthew Hunt, Head of Sales (Land Communications), Thales UK, looks at Cyber and Electro Magnetic Activities (CEMA) and its role on the battlefield.
Ask anyone for the first words that spring to mind at the mention of ‘cyberspace’ and they will likely say some variety of: computers, networks, information and data. Whole virtual worlds, accessible in an instant. The pervasiveness of cyberspace – so ingrained in our devices, our relationships, our day-to-day – has implications for the modern military environment. In the Future Character of Conflict, the Development, Concepts and Doctrine Centre (DCDC) described the 2014 joint battlespace as “congested, clustered, contested, connected and constrained”. Nearly 10 years on and those 5Cs are more relevant – and challenging – than ever. The frontline is now increasingly digital.
The evolving threat: IEDs to CEMA
From smartphones and Personal Role Radios, to drones and the controllers with which to operate them, today’s dismounted soldiers and operational units are trialling and deploying more integrated technologies than ever before. However, smartphone messages can be intercepted. Radio signals get detected and tracked. Controllers can be hacked.
More connected soldier systems present greater ‘attack surface’ opportunities to expose vulnerabilities and exploit the data therein, with Cyber and Electro Magnetic Activities (CEMA) increasingly supplementing improvised threats to become a mainstay of the modern battlespace. CEMA is intentional in its objectives, targeted in its approach, and is as dangerous for individual soldiers as it is to whole countries. Attacks are often aimed at a nation’s operational technology and critical infrastructure, with commonplace, ubiquitous connected technologies, such as CCTV systems and Wi-Fi routers, often being targeted.
CEMA has three pillars:
1. Effect: What can I do to impact the
2. Protect: What can I do to stop the
enemy affecting me?
3. Understand: How can I find out what
the enemy is intending to do?
The three pillars coalesce to form one overarching objective: Operational Advantage.
CEMA is all about gaining a competitive edge. It’s about disrupting OODA loops so the adversary has to play on your terms. Maybe that’s by making an enemy behave in a way they don’t want to through jamming their network. Or it might be a case of making them believe that your 10 radio signatures are actually 100 soldiers defending an outpost – forcing them by deception to where you want them to be.
It can be argued as to whether deception is CEMA or good old fashioned electronic warfare (EW), but it doesn’t really matter, as the boundaries blur and overlap with today’s equipment being capable of delivering more than one effect. At its core, CEMA is about exerting power and influence over someone else via electronic means to come out on top. CEMA is a testament to how technology has given us the means to relentlessly chase this competitive edge.
Where once we used our eyes to survey from a ship, we saw further by climbing up a mast. Then we got a telescope. Then we got radar. In every case, we are trying to stay ahead of our adversaries. What we are trying to do has not changed. Technology has given us the ability to see further and therefore given us the tactical advantage needed.
From technological frontiers to the digital frontline
CEMA is complex and multi-faceted by its very nature. Soldiers must protect themselves and their unit, which depends on the interoperable, interchangeable and harmonised set-up of every system involved to increase mission survivability and streamline operations. They must harden equipment against offensive CEMA from an enemy, and they must do all this while responding with CEMA effects of their own. CEMA is not the preserve of large systems operated at the brigade level, but it is also accessible and effective in the hands of the soldier. How might this be put into practice? An assault team can use on-the-soldier equipment in a CEMA attack to disrupt Wi-Fi-connected security cameras, rendering them ‘blind’.
This would be an electronic attack with a cyber effect on real-world equipment. Now, imagine that same equipment used by a four-man observation post to frequency scan and identify the presence of electronic signatures in a nearby wood. By integrating other technologies, they will be able to understand not only the frequency on which someone is transmitting but also its power and the specific radio signature. This means they will be able to make better-educated inferences around who precisely is in that wood – conventional forces, reserves, special forces as well as which nationality – and decide on the best next steps. CEMA and EW are, however, two-sided.
While the observation post may have decided not to hang around once the electronic signatures of 4,000 adversaries have been identified, can they be sure their adversary isn’t using electronic deception to make a small handful of soldiers look like a brigade?
Conducting CEMA effectively – whether to Protect, Affect or Understand – relies upon soldiers having access to the latest, most reliable and most relevant technologies. However a lack of software-defined hardware means capabilities can’t be continuously adapted and updated to meet the pace of the evolving threat while maintaining their own security protection measures. And a lack of interoperability spells bad news for soldiers who need their kit to work as one. If a soldier can’t use their CEMA systems and radios at the same time, then their situational awareness plummets.
If their CEMA systems can’t protect them from things going bang without stopping the exchange of data with the rest of the team, then orders and situational awareness could get lost. And if the squad’s electromagnetic signals can’t coincide amidst a congested spectrum – especially while trying to fend off jamming and interception by an enemy – then the entire operation becomes compromised and the tactical advantage is handed over.
A competitive edge for soldiers
Traditional methods won’t cut it if we are to drive the necessary digital transformation that will allow for more integrated, unified and relevant technologies on the battlefield. It’s why the Army Warfighting Experiment (AWE), conducted yearly, is so valuable in exploring new ways to develop, deliver and deploy new and advanced capabilities. AWE is all about experimentation: showing, not telling; learning by doing; failing fast; closing down what’s not working and fostering what is.
AWE 2023’s theme, ‘Blunt and Dislocate’, asks: how do you stop the enemy’s advance and make them scatter? It’s up to the industry to explore an answer; define the problem and design a solution that will give soldiers an enduring advantage on the battlefield.