advanced-menu-icon

ATSEP Use Cases: Impact of Power Source Errors due to Sensitivity in ATC

Air Traffic Control (ATC) is an essential element of the aviation industry, ensuring the safety and efficiency of aircraft movements. ATC is responsible for managing airspace, directing aircraft movements, and providing critical information to pilots. The smooth functioning of ATC heavily relies on reliable and accurate communication systems. However, various factors can lead to errors in the communication systems, including power source errors. In this article, we will explore the impact of power source errors due to sensitivity in ATC.

Read the blog

Cybersecurity in ATM : Investigating Windows Logs in Incident Response

The keys to successful incident response equate to having the proper people, processes, and tools in place to act decisively when an incident occurs, which is a recurring theme in our incident response articles. Without proper logging occurring ahead of time, which is a large part of the picture for security operations and incident response, teams, it will make it difficult to prove how long a threat actor was in an environment, and depending on the lack of logs, could be very difficult to provide analysis on activities taken by the threat actors or insider threats depending on the case scenario.

Read the blog

Electronic Warfare: Range Gate Pull Off - MTD-based Countermeasures in FreeScopes (Video)

This article introduces an enhanced radar filter designed for training, with features for detecting range deception, incorporating moving target detection and target association for improved accuracy.

Read the blog

Cybersecurity in ATM: Investigations Using Firewall Logs

This article sheds light on Firewall Logs in incident investigations. We explore key behaviors and patterns for effective threat detection

Read the blog

ATSEP Use Cases: Navigating Clear Skies: Unveiling the Impact of Transmitter Errors due to Stagger in Air Traffic Control

Air Traffic Control (ATC) is a critical component of aviation, responsible for managing and directing the movement of aircraft. Effective communication between ATC and pilots is essential for safe and efficient air traffic management. However, errors in communication can have serious consequences, including incidents and accidents. One type of communication error that can occur is Transmitter Errors due to Stagger. This article will explore the impact of these errors on ATC and discuss steps that can be taken to prevent them.

Read the blog

Electronic Warfare: Range Gate Pull Off - Clutter-Map & MTI-based Countermeasures in FreeScopes (Video)

In this article we show a video on RGPO-counter-measures enhanced by an MIT and by a Cluttermap in a comparison. We conducted the RGPO with SkySim and the Electronic Warfare extension. The electronic counter-countermeasures are part of the FreeScopes Library.

Read the blog

Setting Radar Frame Rate and Antenna Rotation Speed in the SkySim Technical Radar Simulator (Video)

SkySim provides simple settings for ATSEP and military radar qualification. Inhouse and distance learning are possible. This video shows in a short scene how to configure radar rotation speed and frame rate. Once set, it will change for all concurrently learning students.

Read the blog

ATSEP Use Cases: Impact of Processing Issues due to Resolution Errors in ATC

In the field of air traffic control (ATC), ensuring the accuracy and precision of systems and equipment is of utmost importance. However, even with the most advanced technology and well-trained personnel, errors can still occur. One type of error that can significantly impact the performance of ATC systems is processing errors due to resolution. In this article, we will define processing errors due to resolution, discuss their impact on ATC, and explore steps that can be taken to prevent and rectify these errors.

Read the blog

Cybersecurity in ATM: Investigating Cyber Incidents Using the 2FA Logs

Background

Historically, security teams would advocate for their IT teams and management to approve the implementation of multi-factor authentication in order to reduce the impact of threats such as brute force attacks against passwords, mitigate fall out from phishing emails and other social engineering related attacks. For context, there are multiple methods of implementing two factor authentication, which includes but is not limited to, SMS based, voice and app based. Once an implementation is in place, this will provide security and incident response teams additional protection and more importantly, additional data points to investigate security alerts.

Read the blog