A CYBERSECURITY ANALYSIS OF RADIO-FREQUENCY ATTACKS ON AEROSPACE COMMUNICATION SYSTEMS by Nicholas Bradshaw A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Science CAPITOL TECHNOLOGY UNIVERSITY December [Insert Date], 2021 © 2021 by Nicholas Bradshaw ALL RIGHTS RESERVED A CYBERSECURITY ANALYSIS OF RADIO-FREQUENCY ATTACKS ON AEROSPACE COMMUNICATION SYSTEMS Approved: Richard Baker, PhD, Chair Name of Committee Member, Degree, Committee Member Name of Committee Member, Degree, Committee Member Accepted and Signed: ____________________________________________________________ Name of Chair Date ____________________________________________________________ Name of Committee Member Date ____________________________________________________________ Name of Committee Member Date ____________________________________________________________ Ian McAndrew Date Dean, Doctoral Programs Capitol Technology University ABSTRACT Over the past decade, the United States government has been the target of cybersecurity attacks targeting the nation’s critical infrastructure. Regardless of attempts by the government to secure the nation’s assets, significant gaps remain in the aerospace communications domain. Aerospace communication systems support our infrastructure in a multitude of industries such as satellite communications, global navigation, aviation, and national defense. Despite the critical nature of aerospace communication systems, attacks are becoming more frequent and harder to identify due to the decrease in cost of consumer technology and technological advances which enable simplified attack methodologies. This study explores the nature of radio frequency attacks on aerospace systems and collects data from subject matter experts regarding the frequency, quality of available federal guidance, and impact to system confidentiality, integrity, and availability resulting from radio frequency attack incidents. The literature review details the current state of the aerospace communication industry, with emphasis on currently available government resources used throughout the industry. This quantitative descriptive correlational study utilized a cross-sectional survey to reveal that radio frequency attacks on aerospace communication systems are a prevalent threat to system confidentiality, integrity, and available. Using data gathered from participants, information regarding the frequency of radio frequency attacks based upon participant background and years of experience is detailed. Keywords: cybersecurity, aerospace communication systems, radio frequency, radio frequency attack, radio frequency interference, space communications, aviation communications, electronic warfare, radio frequency attack vector, satellite system, aviation system iii DEDICATION I dedicate this dissertation to my family who has provided an endless source of compassion, understanding, and support throughout my educational journey. Without them, this accomplishment would not have been possible. iv ACKNOWLEDGMENT Sir Isaac Newton once wrote, “If I have seen further, it is by standing on the shoulders of giants,” within a letter addressing his knowledge of science in the mid-1670s. This dissertation is no exception, as all within it can be attributed to the successes and failures of those before me. I’d like to acknowledge the multitudes of authors and scientists who I referenced within this text; without them this paper would not have been possible. This dissertation was only possible with support of my family. It was with their neverending willingness to support this effort that I was able to shoulder the weight of my own endeavors. I wish to express my gratitude to my wife, Jordan, who has provided her love and support throughout this entire ordeal, never hesitating to support me during the endless hours of research. I’d like to acknowledge my children, who provided me with the drive and ambition to demonstrate that even the most challenging obstacles can be toppled. Finally, I’d like to acknowledge my mother, who provided the guidance and motivation to embark upon this journey of lifelong learning. I would like to express my gratitude and appreciation to my dissertation chair for the unrelenting support during this study. Dr. Richard Baker provided a wealth guidance and did not hesitate to go out of his own way when asked. Throughout the many iterations of this dissertation, his patience and guidance was greatly appreciated. Lastly, I’d also like to acknowledge the support provided by Dr. McAndrew and the faculty staff at Capitol Technology University throughout the past 3 years. v TABLE OF CONTENTS LIST OF TABLES ........................................................................................................... viii LIST OF FIGURES ........................................................................................................... ix CHAPTER 1: INTRODUCTION ....................................................................................... 1 Background of the Study ................................................................................................................ 2 Significance of the Study ................................................................................................................ 8 Nature of the Study ......................................................................................................................... 9 Research Questions ....................................................................................................................... 10 Conceptual Framework ................................................................................................................. 12 Definitions..................................................................................................................................... 15 Terms and Definitions ............................................................................................................... 15 Assumptions.................................................................................................................................. 16 Scope, limitations, and delimitations ............................................................................................ 18 Chapter Summary ......................................................................................................................... 19 CHAPTER 2: LITERATURE REVIEW .......................................................................... 21 Title Searches ................................................................................................................................ 22 Historical Overview ...................................................................................................................... 23 United States Federal Guidance ................................................................................................ 26 Department of Homeland Security ............................................................................................ 29 RF Attack Characteristics ............................................................................................................. 42 radio frequency Interference Background. ................................................................................ 42 Aerospace Communications System Vulnerabilities. ............................................................... 48 vi Chapter Summary ......................................................................................................................... 57 CHAPTER 3: METHOD .................................................................................................. 59 Research Questions ....................................................................................................................... 63 Hypothesis/Variables .................................................................................................................... 64 Population ..................................................................................................................................... 65 Sampling Theory........................................................................................................................... 66 Sample Size................................................................................................................................... 71 Data Collection ............................................................................................................................. 73 Instrumentation ............................................................................................................................. 75 Reliability...................................................................................................................................... 77 Validity: Internal and External...................................................................................................... 78 Pilot study ..................................................................................................................................... 80 Data Analysis ................................................................................................................................ 80 Chapter Summary ......................................................................................................................... 81 CHAPTER 4: RESULTS .................................................................................................. 83 Pilot Study..................................................................................................................................... 84 Pilot Study Procedures .............................................................................................................. 84 Pilot Results............................................................................................................................... 85 Survey Development ..................................................................................................................... 88 Informed Consent ...................................................................................................................... 88 Survey Questions....................................................................................................................... 89 Data Collection ............................................................................................................................. 91 Findings......................................................................................................................................... 94 vii Assumptions Impact on Data Collection ................................................................................... 94 Quantitative Results .................................................................................................................. 96 Correlative Analysis ................................................................................................................ 106 Correlative Results .................................................................................................................. 115 Chapter Summary ....................................................................................................................... 121 CHAPTER 5: FINDINGS AND RECOMMENDATIONS ........................................... 122 Study Taxonomy ......................................................................................................................... 123 Limitations .................................................................................................................................. 124 Findings and Interpretations ....................................................................................................... 125 Impacts of Radio Frequency Attacks to the CIA of Aerospace Communication Systems ..... 126 Frequency of radio frequency Attacks on Aerospace Communication Systems .................... 128 State of Current US Government Policy ................................................................................. 128 Hypothesis Addressed ............................................................................................................. 129 Research Questions Addressed ............................................................................................... 130 Recommendations for Future Research ...................................................................................... 134 Summary ..................................................................................................................................... 136 REFERENCES ............................................................................................................... 136 APPENDIX A: LITERATURE REVIEW SEARCH ..................................................... 154 APPENDIX B: RESEARCH METHODOLOGY MAP ................................................ 155 APPENDIX C: PARTICIPANT CONSENT FORM ..................................................... 156 APPENDIX D: RESEARCH INSTRUMENT ............................................................... 159 viii LIST OF TABLES Table 1 Department of Homeland Security Cybersecurity Goals ...................................... 36 Table 2 Internal RF Interference Examples ....................................................................... 44 Table 3 External RF Interference Examples ...................................................................... 46 Table 4 Pilot Study Feedback ............................................................................................. 86 Table 5 Survey Question Number and Narrative Mapping .............................................. 107 Table 6 Survey Question Number and Variable Measured Mapping .............................. 108 Table 7 Pearson Product-Moment Correlation Coefficient Descriptive Interpretation ... 109 Table 8 Pearson Product-Moment Correlation Coefficient Measurements ..................... 110 Table 9 Pearson Product-Moment Calculation Confidence Interval................................ 111 Table 10 Fisher’s R-to-Z Transformation Results ........................................................... 113 Table 11 Coefficient of Determination Results ................................................................ 114 Table 12 Coefficient of Alienation Results ...................................................................... 115 Table 13 Correlative Analysis: Years of Experience/CIA Impact ................................... 116 Table 14 Correlative Analysis: Years of Experience/Frequency of RF Attack ............... 117 Table 15 Correlative Analysis: Correlation of CIA Model .............................................. 118 Table 16 Correlative Analysis: Frequency of Attacks and Years of Experience ............. 120 ix LIST OF FIGURES Figure 1. The RF Interference Mitigation Lifecycle. ........................................................ 41 Figure 2. Methods of radio frequency interference through transport mechanisms. ........ 43 Figure 3. Cyber Threats to Space Systems. ...................................................................... 49 Figure 4. Uplink Jamming ................................................................................................ 51 Figure 5. Downlink Jamming. .......................................................................................... 52 Figure 6. Participant Years of Experience Demographic ................................................. 97 Figure 7. Participant industry of experience domain ........................................................ 98 Figure 8. Years of experience Versus Impact to Availability ........................................... 99 Figure 9. Years of Experience Versus Impact to System Integrity................................. 101 Figure 10. Years of Experience Versus Impact to Confidentiality. ................................ 102 Figure 11. Years of Experience Versus Frequency of RF Attack. .................................. 104 Figure 12. Years of Experience Versus Opinion of Government Resources ................. 105 1 CHAPTER 1: INTRODUCTION Critical infrastructure and its concomitant technologies play a critical role in the daily operations of nations around the world. Aerospace communication systems are an essential component of that infrastructure including, defense capabilities for the United States and developed nations (Congressional Research Service, 2020). Unprecedented reliance on critical infrastructure demands strong protective capabilities to defend it from adversaries targeting systems with cyber-attacks (Cybersecurity and Infrastructure Security Agency, 2017). In a 2017 a report titled, Securing Cyber Assets: Addressing Urgent Cyber Threats to Critical Infrastructure, the United States (U.S.) Cybersecurity and Infrastructure Security Agency (CISA) noted that, while the federal government is responsible for protecting United States infrastructure from attacks with economic, public safety and national security ramifications, this role is not well defined in the cyber realm, where costly, sophisticated attacks carry ever more serious potential consequences, outstripping the capabilities of private businesses (CISA, 2017). According to the U.S. Federal Emergency Management Agency, roughly 85 percent of the nation’s critical infrastructure is owned by the private sector, a statistic which suggests that public and private partnerships are required to ensure the operability of the assets (Federal Emergency Management Agency [FEMA], 2011). To defend against new threats, new methods of defense must be created (Bailey, Speelman, Doshi, Cohen, & Wheeler, 2019). This study will investigate radio frequency attack vectors in aerospace communication systems and the application of cybersecurity principals to mitigate them. Chapter one of this study describes the background, nature of study, problem statement, purpose statement, methodology, design, and research questions of this study. The structure of the study is further elaborated on with additional decomposition in Chapter 3. 2 Background of the Study The creation of the United States Space Force (USSF) in December 2019, and its mission in space domain security, embodies actions necessary to defend U.S. interests in an evolving battle landscape (United States Space Force, 2021a). The first seminal document released by the United States Space Force, titled “Space Power Capstone Doctrine,” identifies Cyber Operations as among primary discipline (United States Space Force, 2020a). The immediate need for Space Force Cyber Operations was further reinforced by Deputy Commander Maj. Gen. Stephen Whiting, who, in address to the Advanced Maui Optical and Space Surveillance Technologies (AMOS) Conference, stated that cyber-attacks are the most probable form attacks in space will take (Hitchens, 2020). The doctrine defines three segments of space systems requiring protection: orbital, terrestrial, and link segment (United States Space Force, 2020a). The orbital segment includes the environment and vehicle operation in space. The terrestrial segment is comprised of the support equipment and systems utilized to operate a spacecraft (United States Space Force, 2020a). The link segment of the space system architecture is composed of the Radio Frequency signals in the electromagnetic spectrum used to establish communications between the terrestrial and orbital segments (United States Space Force, 2020a; United States Space Force, 2020b). Aerospace communication systems, some of which span all three segments of space systems, are integral to the critical infrastructure mission of the United States, which encompass satellites, antennas, ground stations, launch stations, and miscellaneous support equipment (United States Space Force, 2020a). Aerospace communication systems may have dependencies on related support capabilities, such as timing and navigation systems supported by the Global Positioning Satellite System (Dave, Choudhary, Shiag, You, & Choo, 2021). Core capabilities to 3 protect national interests of space cyber operations are defined in the Space Power Capstone Doctrine as orbital warfare, space battle management, space electromagnetic warfare, space access and sustainment, engineering/acquisitions, and military intelligence (United States Space Force, 2020a). Cyber Operations, the operational application of cybersecurity, includes methods and practices protecting sensitive data from unauthorized entities (Joint Chiefs of Staff [JCS], 2018a). It is the goal of cybersecurity to defend system data (McGee, 2021). A fundamental concept of cybersecurity is the CIA triad, an abbreviation of Confidentiality, Integrity, and Availability, which categorizes threats to operational capability of information, or operational technology systems (National Institute of Science and Technology, 2020). In the CIA triad, confidentiality represents the assurance that information, whether processed, transmitted, or stored, is protected from unauthorized entities attempting access (National Institute of Science and Technology, 2020). Integrity assures data processed, stored, or transmitted remains unmodified and unaltered without authorization. Availability refers to maintaining availability of information systems without outages caused by system failure or denial of services (National Institute of Science and Technology, 2020, p. 1). Information systems, comprising various components of information technology, are critical to the operation of aerospace systems (Government Accountability Office, 2020). Information technology is defined as equipment or interconnected systems and subsystems used in the “acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information” (National Institute of Science and Technology, 2021b). This definition encompasses disciplines such as software development, business technology systems, network devices, and cybersecurity. 4 As information technology progresses in ability and services, these benefits have been embraced by the aerospace industry to engender new capabilities. These advances, however, come at a cost, and have resulted in vulnerabilities to the success of aerospace operations (Sayler, 2021). One of the most significant vulnerabilities, radio frequency attack, threatens aerospace communication systems via several attack vectors. In a report published by the Government Accountability Office (Government Accountability Office, 2020a), Aviation Cybersecurity: FAA Should Fully Implement Key Practices to Strengthen Its Oversight of Avionics Risks, the GAO identifies with growing concern the evolving cybersecurity threats which put future aerospace systems at increased risk if the United States government does not act to prioritize the establishment of proactive controls to defend against attacks. Aerospace systems are unlike traditional information systems in several ways (Bailey et al., 2019). A typical information technology system involves endpoint devices such as personal computers or servers connected to network devices for communication. These systems are commonly easily scalable, and range in size from a few dozen devices to thousands. The traditional information technology system model supports business functions and fits a variety of user support needs (Boel & Cecez-Kecmanovic, 2015). In contrast, aerospace systems require specialized equipment such as sensors and embedded software to meet mission requirements (Bailey et al., 2019). Aerospace systems also range widely in scope, capability, and size (Pinto, Zeidner, Khire, Banaszuk, & Reeve, 2010). For example, an aerospace system may support commercial aircraft control systems to link pilots to control towers using radio frequency communications (Ragland, 1962). A separate system may provide satellite communications for onboard internet access to traveling passengers (Grace, Daly, Tozer, Burr, & Pearce, 2001). Aerospace systems 5 may use satellite communication channels for telemetry communications a control center as another application of radio frequency communication (Stacey, 2008). System confidentiality, integrity, availability, can all be significantly impacted by threats originating from radio frequency technology (Bailey et al., 2019). As the nature of Aerospace systems becomes more complex, simple solutions for protecting systems become less effective. Complex and layered approaches ensuring system operability are needed to cope with evolving threat landscapes in the operational environment (Bailey et al., 2019). Bailey et al.’s 2019 report for the Center for Policy Strategy, entitled Defending Spacecraft in the Cyber Domain, makes clear, space and cybersecurity policies are not yet in place to address cyber threats to spacecraft by nation-state actors, and standards and governance by government and industry are needed to mitigate the growing risk. The threat landscape of space communications has broadened in scope due to system dependencies and growing sophistication by attackers (Salyer 2021). Systems using Radio Frequency (RF) technology are sensitive to impacts from non-adversarial sources, such as meteorological, in addition to adversarial actors exploiting radio frequency vulnerabilities to impact system performance (Nadeem, Awan, Leitgeb, & Kandus, 2009). Impacts from nonadversarial actors due to radio frequency spectrum cluttering is a known phenomenon which creates confusion when trying to isolate the cause of threats (Nadeem et al., 2009; Baird, 2013). The radio frequency spectrum is governed in the United States by the Department of Commerce’s National Telecommunications and Information Administration (National Telecommunications and Information Administration, 2000) and the Federal Communications Commission (FCC) who work in tandem to oversee spectrum use (National Aeronautics and Space Administration [NASA], 2016). For federal use, the National Telecommunications and 6 Information Administration (NTIA) holds regulatory authority, and for non-federal use, the FCC has regulatory authority (NASA, 2016). International regulation of spectrum use is handled by the International Telecommunication Union (ITU), which ensures compliance with radio regulations. The FCC, NTIA, and ITU work together to ensure the radio frequency spectrum is managed, minimizing instances of impacts from spectrum cluttering inadvertently impacting aerospace systems (NASA, 2016). Adversarial actors are not limited to attacking authorized spectrum set aside by the NTIA or FCC (FAA, 2020). Publicly available maps of radio frequency Spectrum allocation facilitate the development of tools to aid in exploitation of radio frequency vulnerabilities. By allowing public knowledge of what activities are tied to areas of the spectrum, specific frequency spans of interest can be targeted (FAA, 2020). Problem Statement radio frequency attacks have the potential to disable critical infrastructure assets through methods which align with current known cybersecurity attack vectors (NIST, 2020; Bailey et al., 2019). The current lack of cybersecurity mitigation practices in aerospace systems creates an unacceptable risk environment for systems providing critical services to a wide variety of customers (White House, 2018). Therefore, radio frequency attack vectors need to be categorized and addressed with appropriate policies so that commercial and defense organizations can adequately protect them. Purpose of the Dissertation Study Preliminary research on this topic reveals that radio frequency attacks are becoming increasingly common and that security gaps exist in the aerospace communications industry 7 (Lykou, Anagnostopouloum, & Gritzalis, 2018; Wang, Wei, Chen, Tian, Pham, & Shen, 2016; Bailey et al., 2019; Sayler, 2021). The purpose of this quantitative descriptive study is to analyze existing Radio Frequency and cybersecurity threats to aerospace systems to facilitate the development of guidelines ensuring aerospace communication systems are protected from attacks. Quantitative research examines static questions and explores the relationship between two or more variables (Creswell & Guetterman, 2018). This study will use a cross-sectional survey to collect data from industry professionals on radio frequency cybersecurity threats to aerospace communication systems. The specific data sought will be on the frequency and severity of suspected radio frequency attacks, and the applicability of existing cybersecurity policies to address them. Cross-sectional surveys collect data from a single point in time to measure the attitudes, practices, and community needs of a population. Often, cross-sectional surveys are used to “evaluate a program” (Creswell & Guetterman, 2018, p. 388). Statistical analysis can then be performed on data sets to identify any correlation. Correlative factors in this study will reveal the applicability of cybersecurity programs to ensure protection of aerospace communications. Analysis of survey responses will yield correlations between types of aerospace systems, the level of impact to system Confidentiality, Integrity, and Availability, and frequency of radio frequency attacks. The data will then be compared to results reflecting radio frequency attack impacts to the Cybersecurity CIA triad. By identifying the correlation variables, recommendations will identify areas of concern regarding cybersecurity mitigation approaches (Ruel, Wagner, & Gillespie, 2015). 8 Significance of the Study The findings of this study will offer several significant contributions to the cybersecurity and radio frequency systems engineering fields. While radio frequency attacks have been identified as a vulnerability in existing cybersecurity standards and documents such as NIST 800-53 (NIST, 2020), characteristics of the attacks have not been detailed. Furthermore, initial research found that neither current aerospace nor cybersecurity policy is sufficiently robust to meet the challenges associated with risks to aerospace systems (Bailey et al., 2019). In addition to an analysis of scholarly literature regarding radio frequency attack characteristics, this study will provide recommendations for future research which may be used for the development of a framework to respond to radio frequency attacks. The execution of this study will expand the current body of knowledge by providing the following: - An analysis of common radio frequency attacks and their effects on aerospace radio frequency communication systems. This analysis may be used independent of the study to provide higher levels of mission and information assurance to cybersecurity and radio frequency system development efforts. - An assessment of the impacts of various radio frequency attacks on aerospace communication systems to determine the criticality and level of threat. The assessment can be used by the industry to understand the impacts of radio frequency attacks on system confidentiality, availability, and integrity. - A comparison of identified radio frequency attacks to known cybersecurity models. Existing documentation of radio frequency attacks lacks an assessment methodology to facilitate an appropriate respond. 9 - Utilizing the results from the survey, a final recommendation is presented on the applicability of radio frequency attack vectors in relation to cybersecurity practices. Nature of the Study This dissertation will deploy a quantitative methodology with a descriptive research design. The descriptive research design utilizes a cross-sectional survey to measure industry views on whether cybersecurity policy would benefit aerospace radio frequency communication systems. Overview of Research Methodology A quantitative approach was selected to evaluate the relationship between aerospace radio frequency attack vectors and cybersecurity. Quantitative research sets out to test a hypothesis (Crewell & Guetterman 2019). In quantitative research, researchers analyze trends or needs in the field to develop research questions to be answered (Crewell & Guetterman 2019). Tools such as surveys are often used to collect numerical data from a population. The results of the research can then be analyzed to shed light on the research questions (Creswell & Guetterman, 2018). Quantitative research allows for further statistical analysis and is highly generalizable (Salkind, 2018). For the purposes of this study, generalizable results are essential, so data presented can be applied to a broader population. Survey instruments are a scalable method of collecting data through quantitative measures (Ruel et al., 2016). Overview of Research Design A descriptive research design with a cross-sectional survey was selected for use in this study. The advantage of a descriptive quantitative research model is that it “paints a picture” of a research topic (Salkind, 2018, p. 161). Descriptive research differs from comparative or 10 experimental research in that it does not include a control group (Ruel et al., 2016; Salkind, 2018). The purpose of this study is not to test the influence of variables, but instead, to represent the views of subject matter experts on cybersecurity principals in aerospace systems. 1) A quantitative descriptive survey study selection allows evaluation of answers provided by subject matter experts to correlate them to known phenomena (Creswell & Guetterman, 2018; Boudah, 2011). The decision to select a survey as the primary vehicle for research data gathering was evaluated taken with the following considerations in mind: Survey research is relatively easy to verify compared to other research models and can be validated by comparing data gathered to alternative sources (Ruel et al., 2016). 2) The amount of effort required to collect data through surveys is minimal and allows for larger sample sizes (Ruel et al., 2016; Salkind, 2018). 3) Surveys, when administered correctly utilizing best practices, often result in very accurate and detailed results (Salkind, 2018, p. 164). This study will use a cross-sectional survey to explore potential application of cybersecurity principals to aerospace communication systems. Cross-sectional surveys collect data from a single point in time to measure attitudes, practices, and community needs of a population. For the purpose of this study, a single data collection is appropriate to answer the research questions (Crewell & Guetterman 2018). Research Questions Aerospace communication system cybersecurity standards fail to meet the needs of the missions they are designed to protect (Bailey et al, 2019). While there has been increased interest in improving security of information systems and the support networks of aerospace systems, little effort has gone into mitigation of radio frequency attacks (Bailey et al., 2019). In that light, 11 this study will explore four research questions developed to address the problem statement. The focus of the research questions is to further describe the characteristics of radio frequency attacks, and to gather expert views on whether cybersecurity standards would benefit the security of aerospace communication systems. The first research question in this study is: RQ1: Would the implementation of a national standard for the management of radio frequency attacks contribute to the security of aerospace communication system missions? This question seeks to identify if a national standard addressing radio frequency attacks would increase the security of aerospace communications. A literature review will be conducted to analyze existing cybersecurity policies protecting critical infrastructure systems, such as aerospace, to determine if there would be a potential benefit in generating a similar policy for the purpose of radio frequency attack vector mitigation. A survey also will also be conducted among industry professionals to determine their informed views on whether the implementation of a federal policy would be beneficial to the industry. The literature review will provide a foundation of the current state aerospace communications cybersecurity, while the survey will provide an objective assessment on the current views of experts in the field (Salkind, 2018). The second and third research questions for this study will aid in understanding how prevalent and severe radio frequency attacks on aerospace systems are. RQ 2: How often do radio frequency attacks target aerospace systems? RQ3: What is the impact of radio frequency attacks on aerospace systems? The literature review will inform these questions by shedding light on the types and frequency of documented attacks. Common attack methodologies will be identified through publicly available information, such as government reports and commercial data related to 12 aerospace communication system attacks. In addition, survey responses will elicit a better understanding of the impact, severity, and frequency of attacks, from the viewpoint of experts who use radio frequency in the aerospace industry in a variety of applications. This data, when compiled, will be analyzed to determine whether the threat is sufficient to warrant additional resources from federal organizations. RQ4: What is the relationship between radio frequency attacks and cybersecurity attacks among aerospace communication systems? Research question 4 seeks to understand the correlative relationship between radio frequency attacks and their impacts on aerospace communication system Confidentiality, Integrity and Availability. To answer this question, a literature review will be conducted to reveal the nature of cybersecurity attacks, the current communications security methodology for radio frequency communications, and conceptual frameworks such as the CIA triad model to better understand how existing frameworks may be applied to aerospace radio frequency communication systems. Cybersecurity principles and fundamentals, and existing aerospace security communication standards will be included in the review. Understanding existing cybersecurity controls and whether they were adequate in addressing past radio frequency attacks will be prioritized. This will be complemented by survey participant responses on their informed view on whether current government resources are adequate for the security of aerospace system communications. Conceptual Framework Three government publications were used to develop the conceptual framework for the research of this study: 13 1. The National Security Strategy for Aviation Security of the United States of America (Department of Homeland Security, 2007) highlights the increasing reliance on the radio frequency spectrum and the concerning reality that it is easily degraded by adversaries attempting to impact aviation operations. Due to the critical nature of aerospace assets, vulnerabilities threatening their operations can be considered a national security threat. The National Security Strategy identifies radio frequency dependency, among other vulnerabilities, as a threat. 2. The Government Accountability Office (2018) published the High Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation. The development and execution of a comprehensive cybersecurity strategy is identified as a major need for both federal and private critical infrastructure in this document. This publication served as the foundation for the primary research question, “would the implementation of a national standard for the management of radio frequency attacks contribute to the security of aerospace communication system missions?” Given that aerospace communications are a critical infrastructure asset of the United States, the development of a comprehensive cybersecurity strategy is a potential approach for mitigating the increasing threat of radio frequency attacks. 3. The Department of Homeland Security (DHS) Cybersecurity Strategy Guide (2018) identifies the telecommunication industry as one of the critical infrastructure areas needing improvement in the areas of risk identification, vulnerability reduction, threat reduction, and mitigation. In the telecommunication industry, satellite communications and aerospace communications are two critical domains within the purview of the Department of Homeland Security. This publication provides an increased emphasis on 14 critical infrastructure needing diverse and new approaches to mitigate attacks. For this research, radio frequency attacks were chosen as the threat under study. The concepts derived from the three publications provide a foundation for the literature review and survey to investigate the current body of knowledge and to collect data from subject matter experts on radio frequency threats to aerospace communication systems. Two dependent variables were selected based on the publications which form the foundation of the conceptual framework. Aerospace communication systems can range in purpose and architecture, which implies that respondents could provide vastly different answers to the survey questions depending on the type of system with which they were most experienced (Bailey et al., 2019). Therefore, participant aerospace communication system background was identified as a dependent variable for measurement. Number of years of experience of participants was chosen as a dependent variable. The primary purpose of this study is not to test the influence of variables for cause and effect , but instead, to represent the views of subject matter experts on cybersecurity principals in aerospace systems. Surveys allow the collection of many responses covering a wide variety of research questions (Ruel et al., 2016; Creswell & Guetterman, 2018). Respondents completing a survey may have anonymity using a flexible online survey instrument (Ruel et al., 2016). The ease in accessibility, anonymity, and scalability enables surveys to reach larger audiences than alternative research methods (Ruel et al., 2016; Gorvine, Rosengren, Stein, & Biolsi, 2018). A survey allows for the assessment of data with quantitative measurements which can then be generalized to the larger field of aerospace communications (Ruel et al., 2016). 15 Definitions Terms and Definitions The following terms are used throughout this study and are defined for purposes of this research: Aerospace: “Earth’s envelope of air and the space above it, the two considered as a single realm for activity in the flight of air vehicles and in the launching, guidance, control of ballistic missiles, earth satellites, dirigible space vehicles, and the like” (Tomsic & Eastlake, 1998). Aerospace Communications System: Any communication system used in aerospace applications for the support or operation of an aerospace system (Sacchi, Jamalipour & Ruiggieri, 2011). Critical space vehicle functions: “Vehicle functions necessary to “ensure intended operations, positive control, and retention of custody. The failure or compromise of critical space vehicle functions could result in the space vehicle not responding to authorized commands, loss of critical capability, or responding to unauthorized commands” (DHS, 2007). radio frequency Communications: Radio-frequency waves are electrical waves of repeating peaks and valleys propagating through free space. The pattern of a radio-wave signal before it repeats itself is known as a cycle, and the number of times that it repeats per second itself is known as the frequency. Radio-frequency is measured using the Hz unit. Communications equipment such as receivers and transmitters convey data using radiofrequency signals (Manning, 2021). 16 radio frequency Attack: An attack which uses radio frequency as a method of impacting system performance, or the effects of it, to result in a degradation to the operational capabilities of an information system (Quisquater & David, 2005). Satellite Communications: Communication systems which use radio frequency to communicate either directly to space vehicles to receive bus telemetry or transmit commands, or to provide communication from two or more terminals on Earth (Kodheli, Lagunas, Maturo, Sharma, Shankar, Montoya, & Goussetis, 2021). Space System: A system which “typically has three segments: a ground control network, a space vehicle, and a user or mission network. These systems include Government national security space systems, Government civil space systems, and private space systems” (White House, 2020). Space Vehicle: the section of a space system which operates entirely in space. Specific examples of space vehicles include space launch vehicle sections, spacecraft, satellites, and peripheral space hardware (White House, 2020). Assumptions To conduct a study, researchers must make assumptions based on the nature and design of their research topic (Salkind, 2018). Assumptions have the potential to insert bias and influence a study (Salkind, 2018). Therefore, it is essential to recognize researcher or participant bias, assumptions, or beliefs (Corbin & Strauss, 2015). Several assumptions are made regarding this study. However, to ensure internal validity, assumptions will be kept to a minimum and the study will be conducted as objectively as possible to ensure no bias or influence arise. The research will assume that participants of the survey answer the survey in good faith – without intent to answer questions incorrectly or to negatively influence results. Due to the 17 professional nature of the population, it is assumed that participants answer with integrity. Research results will be reviewed for any intentional sabotage and results will be cross referenced with separate samples to ensure accuracy. Results deemed incorrect with intent will be removed from the final data collection. The study assumes the researcher can acquire an adequate number of responses to the survey to form a conclusive analysis. Surveys are most effective when many respondents participate (Ruel et al., 2016). This researcher intends to exhaust the available avenues of communication to acquire adequate survey participation. The research assumes data, publications and communication provided by the White House, GAO, DHS, FCC, and related federal authorities are an accurate depiction of U.S. policy and are accurate and trustworthy. In addition, this study depends on the interpretation of these sources to form the research design, conduct a literature review, design a survey instrument, analyze data, and draw conclusions. The research assumes that publicly available information correctly represents the industry climate and attitude towards radio frequency attack vectors on aerospace systems. Given the sensitive nature of the topic, it is expected that there will be limitations on what information is publicly available. The researcher will use publicly available policies and publications, rather than sensitive data of existing systems to describe the types of radio frequency attack vectors. The final assumption is that the subjects who complete the survey have prior experience in the aerospace communications field. By design, the survey will be limited to industry specific LinkedIn and Facebook groups. Individuals without experience in the aerospace communication field will be asked to cease participation in the introduction material and survey. 18 Demographic questions in the survey will further ensure appropriate levels of experience and knowledge. Scope, limitations, and delimitations This study will utilize a quantitative descriptive cross-sectional survey to reveal correlations in cybersecurity attack vectors and aerospace system radio frequency attack vectors. This study will be limited in scope by information available from aerospace industry stakeholders. Radio Frequency attack types and types of aerospace communication systems mentioned will be described using publicly available information. As a result, references in this study will be unclassified in nature, derived from publications, or found in reports or guidance released to the public. Systems and attack vectors resulting from communication systems dependent upon radio frequency technology are generally unclassified, however, mitigations and existing vulnerabilities on operational systems are often considered classified. Information specific to time, events, or systems in operation are considered classified if it jeopardizes operations. Therefore, this study will not address individual vulnerabilities on systems or precise methodologies of how attacks are performed. This study will be limited in size due to the specific nature of the material under research. Aerospace systems using radio frequency for communication are only a small subset of technologies supporting aerospace operations. Participation will be limited to professionals familiar with aerospace radio frequency communication systems to ensure capture of relevant data. According to Salkind (2016), it is important to select the largest possible sample size to determine the most accurate results. The limited population under study may result in a limited sample size. 19 Delimitations are the characteristics limiting the scope of a study (Theofanidis, Dimitrios & Fountouki, Antigoni, 2019). Researchers are required to define these boundaries to clearly demonstrate an understanding of the scope of the research (Simon and Goes, 2011). This study is delimited by two boundaries. First, this study will not attempt to establish a new policy or framework to address radio frequency attacks on aerospace systems. Instead, the purpose of this research is to better understand the characteristics of radio frequency attacks, and the use of cybersecurity methodology as a possible mitigation strategy. The development of detailed security controls or guidance for mitigation of these threats is reserved for future research. Secondly, this study will not explore the technical characteristics of radio frequency attacks and aerospace systems. Individual technologies exploited by radio frequency attackers will not be investigated, as this study is focused on research surrounding evaluation of cybersecurity impacts to aerospace communications based on feedback from experts, rather than the mitigation of threats. Research exploring the implementation of security controls to mitigate radio frequency attacks on aerospace systems is reserved for future efforts. Chapter Summary radio frequency communications are an important part of our nation’s critical infrastructure. The increasing reliance on radio frequency communications and easy availability of technology facilitating radio frequency attacks have generated a need for a coordinated response to how such attack vectors are approached (GAO, 2020a). Aerospace systems, often considered among the most critical infrastructure in the nation, require secure and reliable radio frequency communications to operate safely (DHS, 2018). Lack of federal guidance and direction currently puts both government owned systems and private entities at risk of attack potentially critically impacting success of aerospace missions 20 (Bailey et al., 2019). To gain knowledge on possible mitigation strategies to secure aerospace systems, quantitative data needs to be gathered to understand the current baseline of industry knowledge and to describe possible solutions which can mitigate the threats. A thorough literature review will be completed in addition to a cross-sectional survey to understand the history and context of radio frequency attacks on aerospace systems. The literature review will describe the current state of cybersecurity measures regarding aerospace communication system and a description of attack methodologies. The literature review will also provide a foundation for survey questions to answer the research questions mentioned in this section. The relationship between radio frequency attacks and cybersecurity policy has not been thoroughly explored (Bailey et al., 2019). To fill this gap, this study will utilize a descriptive quantitative research design to collect subject matter expert opinions regarding the characteristics, frequency, and applicability of a cybersecurity strategy on various aerospace communication systems. Specifically, this study was driven by the idea of using existing cybersecurity practices and methodologies to address radio frequency attack vectors on aerospace systems. Chapter 2 will present a review of pertinent scholarly literature, white papers, and industry reports to provide context and content for the study as well as a foundation for the survey instrument. 21 CHAPTER 2: LITERATURE REVIEW A literature review is a substantial and thorough review of the previous work conducted on a topic (Creswell & Guetterman, 2016; Salkind, 2018). The purpose of the literature review is to provide background and explain how the study fits into the larger body of knowledge. The literature review aids in the detailing the existing gaps of knowledge which provide context for the research instrument utilized in the study (Gorvine et al., 2018). This study explores radio frequency attack vectors of aerospace communication systems, and the application of cybersecurity principals to mitigate them. This literature review presents a summary of current pertinent scholarly literature, government publications, and industry thought on radio frequency attacks on aerospace systems and existing mitigation approaches. Throughout the course of this literature review, the three domains (RF Threat Analysis, Aerospace System Communications, and Policy/Guidance) were divided into additional subcategories for clarity. For example, Aerospace System Communications was decomposed into further composites such as aviation, satellite, unmanned aerial vehicles, and aerial electronic warfare. Appendix A: Literature Review Search documents and provides a summation of the scope and description of literature which was reviewed during this study including all references reviewed, not just those cited in this study. The literature review began with an in-depth investigation of current United States government publications and standards to develop a thorough understanding of the nation’s approach to the cybersecurity of aerospace systems. Investigating the current climate of cybersecurity in the federal regulatory body of knowledge will reveal key concepts applicable to development of the survey instrument, research questions, and findings. As detailed in Chapter 1, several government publications inspired the conceptual framework for this study, as the 22 cybersecurity methodologies and risk vectors therein were relevant to the development of the survey questionnaire. Title Searches Resources reviewed during this study were sourced from the following online databases: SAGE Journals, ProQuest, EBSCO Host, Google Scholar, ACM Digital Library, IEEE Xplore, White House Office of Science and Technology, NIST, and Science Direct. For each of the databases, a baseline search methodology was followed to ensure a thorough search. The search terminology included: radio frequency attacks, aerospace radio frequency attack, wireless industrial cybersecurity threats, industrial radio frequency cybersecurity, wireless aerospace cybersecurity attack, radio frequency vulnerabilities, space radio frequency attacks, radio frequency attack vectors, radio frequency threats on Federal information systems, space electronic warfare, aerospace electronic warfare, aerospace system attacks, cybersecurity attack methodology, and aerospace system design. In addition to the use of sources identified by querying the resource databases, citation chaining (Cribbin, 2011) provided additional sources which did not initially arise in search results. Identifying relevant information in other key material such as dissertations or studies provided an avenue to generate additional references. Aerospace systems using radio frequency technology range in terminology depending on domain. In the communications domain, aerospace systems such as SATCOM, Line-Of-Sight, and broadcast systems use specific terminology applicable to their domain. Similarly, domains such as electronic warfare also use radio frequency technology, with specific terms relevant to the applications of systems in the domain. For clarification on the differences between terms 23 within the separate domains of aerospace systems, please review the Definition of Terms in Chapter 1 for further elaboration. Historical Overview radio frequency communications is a form of telecommunication which utilizes electrical signals to communicate data through open space (NASA, 2021). While radio frequency technology has existed since the early 1900s (Sarkar, Banerjee, & Bose, 2006) in applications such as communications, RADAR, and navigation (National Telecommunications and Information Administration, 2000), threats targeting the technology have increased exponentially in recent years (Dave et al., 2021). The increase in threat frequency and impact can be partially attributed to increased supply of readily available radio frequency interference capable devices (Dave et al., 2021; GAO, 2020a). radio frequency, which was once reserved only for large government organizations with resources to invest in large-scale systems, is now a key feature of many commercial electrical products capable of exploiting radio frequency applications through radiation, conduction, or other means. The FCC provides an allocation table which is used to reserve the frequency bands between 9 kHz and 275 GHz for radio frequency applications (FCC, 2021; National Academies of Science, Engineering, and Medicine, 2015). Commercial products are tested to demonstrate compliance with FCC and adversaries have been observed modifying commercial equipment to utilize as an offensive tool to impact the Confidentiality, Integrity, and Availability of legitimate resources (Riahi Manesh & Kaabouch, 2017). Devices capable of deliberately emitting malicious interference are available to purchase online for a low cost (National Security Strategy for Aviation Security of the United States of America, 2007). In addition to increase in availability and decrease in cost, the technology has 24 also seen a vast decrease in operational complexity. As more industries adopt use of the technology to increase innovation, profits, or capabilities, advancements have been made to automate the technology (Yaacoub, Noura, Salman, & Chehab, 2020). The increased level of dependency on radio frequency has resulted in an operational environment with a considerable attack surface (Ukwandu, Farah, Hindy, Atkinson, Tachtatzis, & Bellekens, 2021). Recent growth of rogue states and advancements in technological capabilities of commercial products have left both the commercial industry and the defense industry in a position where federal guidance is necessary to ensure the confidentiality, integrity, and availability of their assets (Bailey et al., 2020). Aerospace communication systems can trace their dependency on radio frequency communications to World War II when Allied and Axis aerial forces used radio communications for air navigation (Foley, 2011). To ensure aerial resources had the most recent intelligence, communicating with moving assets was essential. Radio Frequency systems provided this, without the restraint of cabling or ground infrastructure (Morton, 2019). Radio frequency technology was further utilized in applications such as RADAR, which was deployed during World War II using radio frequency as a method of reconnaissance in the battle landscape (Foley, 2011). The ability to apply radio frequency technology to Aerospace applications was accompanied by new threats jeopardizing operational security of war-fighters (Foley, 2011). Attack methods during this time included both interference or jamming, and spoofing: retaliatory actions by adversaries seen almost immediately (Price, 1989). Hijacking Allied force frequencies during WWII was the first example of operational radio frequency system jamming (Price, 2005). Shortly thereafter malefactors deployed spoofing, which provides misinformation to 25 intended targets (Price, 1989). In the decades following, aerospace systems increased their reliance on radio frequency communications in both the aerial and space domains (Price, 1989). Today, radio frequency interference still presents a significant risk to aerospace communication systems. Elbert (2016) states that RFI incidents are among the most serious challenges to radio communication systems, particularly in cases where an attacker is unidentified. Unintentional misconfiguration or malfunction of equipment are common causes of interference; however, it is often difficult to distinguish deliberate versus unintentional interference sources . Therefore, all incidents must be treated as intentional until proven otherwise (Wang et al., 2016). radio frequency communication systems bear concomitant vulnerabilities due to the nature of free-space electromagnetic radio waves, which serve as the vital transportation mechanism (Shing, et al., 2015). Methods of common Radio-frequency attacks include spoofing, Man-in-the Middle, jamming, fuzzing, and repeating (Wang et al., 2016; Bailey et al., 2019). Methods of radio frequency Attacks are further detailed in the radio frequency attack characteristics section of this chapter. Additional attack strategies are constantly evolving as adversaries develop new capabilities. As the Secure Wireless Agile Networks (SWAN) group (Security Wireless Agile Networks, 2021) states, that radio systems “are vulnerable at the ‘air interface’ level, since, by nature, this is an open interface.” Despite these vulnerabilities, use of radio frequency technology has only increased. As a result of the increased levels of adoption, radio frequency communications technology has become a central part of our nation’s defense strategy and critical infrastructure (Baird, 2013). 26 United States Federal Guidance Recent United States government publications detail national positions on Aerospace cybersecurity. Key publications searched for this literature review include the National Security Strategy for Aviation Security of the United States of America (DHS, 2007), Space Policy Directive 5 (SPD-5) Cybersecurity Principals for Space Systems (United States Space Force, 2020b), and the U.S. Department of Homeland Security Cybersecurity Strategy (Department of Homeland Security, 2018). The U.S. position on space cybersecurity is in a transformative state given the establishment of the United States Space Force in 2019, and recent efforts made by Department of Homeland Security’s Critical Infrastructure Security Agency to establish a relationship with the new organization. The literature review is interrogative of current publicly available publications. Space Policy Directive 5 (SPD-5). The fifth directive released by the United States government was released in September 2020. The Space Policy Directive suite was initiated in 2017 when the US government took steps to revise the National Space Policy (USSF, 2020b). SPD-5 established the need for cybersecurity-oriented protective action against potential attack vectors inherent in space systems. As defined in SPD-5 (USSF, 2020b) Space systems enable key functions such as global communications; positioning, navigation, and timing; scientific observation; exploration; weather monitoring; and multiple vital national security applications. Therefore, it is essential to protect space systems from cyber incidents to prevent disruptions to their ability to provide reliable and efficient contributions to the operations of the Nation’s critical infrastructure.” (USSF, 2020b) 27 This directive encompasses most space systems and space support systems reliant on information systems such as computers, network devices, and various endpoints to enable operability throughout the system lifecycle (USSF, 2020b). This classification of system, coined space support systems, is often involved in the processing of scientific data or telemetry on the ground, in facilities supporting operations of space vehicles. Similar to traditional complex information systems, these networks are vulnerable to attacks attempting to disrupt or degrade the level of service provided. A lack of positive control of the space environment could damage the space vehicles themselves (USSF, 2020b). Pertinent to this dissertation, the wireless transmission of data such as command-andcontrol between space vehicles and ground control networks is encompassed in this document (USSF, 2020b). The directive recommends space system owners and operators develop and implement cybersecurity plans for their space systems. Incorporation of controls ensuring successful recovery of space vehicles if positive control is lost is also recommended. The Confidentiality, Integrity, and Availability of space system functions is identified as an area of primary concern for space system owners. The directive goes into further detail to address several domains of space cybersecurity, including: 1) The protection of space vehicles against unauthorized access to functions such as command, telemetry, or control. Potential methods of ensuring this control include implementation of technology such as command-link authentication or encryption. Emphasis is placed on ensuring space vehicles are protected for their complete lifecycle (United States Space Force, 2020). 28 2) The physical protection of security controls designed to reduce physical vulnerabilities which may occur if space support hardware is targeted (United States Space Force, 2020). 3) Layered protection against spoofing and jamming attack vectors. Examples of security controls designed to protect against this threat include the integration of spectrum monitoring software, security driven transmitters and receivers, and encryption technologies ensuring protection of the space vehicle throughout the entire lifecycle (United States Space Force, 2020). 4) Increased protection of ground support systems, operational technology (OT), and information systems in accordance with existing National Institute of Science and Technology Standards such as NIST 800-53R5. Protections taken to ensure operational confidentiality, integrity, and availability include logical and physical protections necessary to meet allocated NIST 800-53R5 security controls. Practices such as patching, malware protection, controlled removable media processes, and information assurance training are all aspects identified by SPD-5 as measures to be protect space systems (United States Space Force, 2020). 5) The integration of existing cybersecurity practices, such as physical monitoring of all support hardware including antennas and ground terminals. In addition, the integration of intrusion detection systems to protect related local and wireless networks is advised (United States Space Force, 2020). 6) Steps to perform risk management of the space system supply chain should be taken and attack vectors such as supplier infiltration, counterfeit parts, or malicious attacks should be addressed (United States Space Force, 2020). 29 The establishment of this directive marks a significant change in the attitude of space cybersecurity (United States Space Force, 2020). SPD-5 identifies current vulnerabilities in space infrastructure and establishes expectations and accountability for the federal government. Prior to this directive, federal information systems were required to comply with FISMA reporting requirements, however, they were not required to implement the National Institute of Science and Technology 800-53 Risk Management Framework (NIST, 2020) on space systems (United States Space Force, 2020). Implementation of formal risk management for critical infrastructure systems varies widely between individual government customers and commercial system owners (NIST, 2020). Due to this gap in security control protocol, government direction for space systems to address the concerns was not previously highlighted (Bailey, 2020). While this publication establishes the need to protect space systems and space support systems, there is no supporting documentation detailing how space system owners will meet the recommended security controls outlined (United States Space Force, 2020). Department of Homeland Security As cybersecurity and radio frequency attacks have becoming increasingly complex, the United States Department of Homeland Security (DHS, 2018) has responded with multiple guidebooks designed to respond to different types of radio frequency attacks. Key Department of Homeland security publications covered in this literature review include: 1) National Security Strategy for Aviation Security of the United States of America (2018) 2) The DHS Cybersecurity Strategy Guide (2018) 3) The DHS CISA Communications Sector-Specific Plan (2015) 4) The DHS CISA radio frequency Interference Best Practices Guidebook (2020) 30 National Security Strategy for Aviation Security of the United States of America. This 2018 publication, which represents the U.S. government position on aviation security and cybersecurity, includes an in-depth analysis of the aviation industry environment. The directive addresses the changing landscape challenging the security of aviation systems. Examples of emerging technology which skirt existing security protocols include unmanned aircraft, radio frequency spectrum-dependent systems, and cybersecurity threats targeting aviation systems. The publication acknowledges that, while aviation systems can be designed to harden them to threats, emerging and future threats to security controls in a volatile landscape must also be considered (DHS, 2018). The aviation directive values the U.S. aviation industry at more than 5% of the Gross Domestic Product (GDP) (DHS, 2018). To protect an industry of such significant value, it is essential to deploy a security-in-depth approach, also known as layering, to security controls. The concept of defense-in-depth is not new to aviation and is seen in many information systems (Bailey, 2020). Security-in-depth can be achieved by layering controls such as physical, logical, and administrative, to result in systems secured by multiple protective measures. In the case of one failure, multiple layers in the model remain operational (DHS, 2018). This approach is seen in many critical infrastructure systems having a wide attack surface or vulnerable to many different categories of attack (CISA, 2016). Aviation saw a significant overhaul in security practices in the aftermath of the terrorist attacks of September 11, 2001, during which domestic flights were grounded until there was assurance the risk level had been mitigated. As a result of this transformative event, security practices in aviation adopted a strict risk mitigation approach (DHS, 2018). In the National 31 Security Strategy, several assumptions are made with this mentality in place, among them that the United States constantly confronts a diverse portfolio of adversaries who continually attempt to exploit the aviation industry for malicious or nefarious purposes (DHS, 2018). Secondly, the policy assumes that while the aviation industry will prosper from the advancement of new and emerging technology, it will also face threats from emerging technologies such as unmanned aerial systems and new attack vectors from increased connectivity (DHS, 2018). The policy assumes that no single mitigation effort is invulnerable to exploitation by adversaries and identifies the collective responsibility of government, private, and public sectors to ensure the protection of aviation assets. Specific recommendations are given to deploy security-in-depth to reduce the likelihood of an attack impacting aviation critical infrastructure (DHS, 2018). The aviation security strategy discusses obstacles and challenges in detail, including the shifting nature of attack vectors and adaptive behavior of adversaries. Insider threats, malicious or reckless use of aviation technology, sophisticated explosives, and transnational criminal adversaries are identified as the greatest threats to aviation (DHS, 2018). According to the national strategy for aviation security guideline, the cyber domain has not been fully exploited. However, cybersecurity attacks are not only being coordinated by rogue organization, but also nation-state actors (DHS, 2018). Given the increased availability of resources against rogue organizations, the vulnerabilities these entities attempt to exploit have seen an increase regarding the variety of attack methodologies (DHS, 2018). However, the guideline highlights the urgency of cybersecurity risk management to ensure the safety and security of the aviation industry. The national strategy for aviation security (DHS, 2018) publication identifies six major threat origins targeting aviation systems including: 32 1) Terrorists – individuals who have demonstrated a clear intent or capability to conduct malicious activity to damage the United States and its global interests. Groups such as ISIS in the Middle East have been documented using aerospace systems such as Unmanned Aerial Vehicles to attack the United States and ally assets (DHS, 2018). Terrorists have been observed adapting their tactics, techniques, and procedures (TTPs) in response to changes in the technological landscape. Given the historical record, the exploitation of radio frequency vectors is a growing threat, not only due to the increase in terrorist activity, but also the increased reliance in our own national assets (DHS, 2018). 2) Nation States – countries or large territories demonstrating deliberate hostile activity toward the United States and its allies (DHS, 2018). While most countries do not openly participate in threatening behavior against the United States, the emergence of aerospace radio frequency technology systems such as UAVs in terrorist organizations hints at the involvement of nation-states behind many attacks. Hostile Nation-States have coordinated large-scale cybersecurity attacks against United States assets and interests. Aimed at gathering intelligence or to observe, Nation-State originating attacks have the potential to disable or damage critical U.S. assets. The National Security Strategy states that offensive cyber capability is a means for advancing objectives, such as military, political, or economic and may constitute a risk to civil aviation due to inadequate de-conflicting civil and military activities such as missile launches, GPS interference or combat support operations (DHS, 2018). Given the increase in radio frequency attacks on systems such as GPS, it is expected that attacks will continue to proliferate. 33 3) Criminals – individuals or organizations conducting illicit activity by proliferating attacks on aviation infrastructure, often with the support of insiders, or in conjunction with terrorist organizations (DHS, 2018). Criminals have historically used cybersecurity attacks to either exploit aviation-related companies for financial gain or to interrupt operations using radio frequency technology. Criminals are active in cyberspace with evolving tactics to circumvent emerging mitigations. The anonymity of cyberspace has made identification of the attackers, their motivations, and capabilities difficult (DHS, 2018). 4) Insider threat – individuals with access to secure or sensitive data who work in the aviation ecosystem, and who are either exploitable or willing to take actions damaging aviation infrastructure (DHS, 2018). Examples of insider threats include airport employees or stakeholders. Internationally, insider threats have been aided attacks orchestrated by organizations such as ISIS and Al-Qaeda (DHS, 2018). 5) Foreign intelligence activities by hostile nation-states and related intelligence agencies who are continuously developing new ways to exploit vulnerabilities in the Aviation Ecosystem (DHS, 2018). This can include exploitation of physical controls or information systems. Foreign intelligence will often explore current aviation technology to identify vulnerabilities such as radio frequency attacks (DHS, 2018). To increase efficiency and maintain productivity, the aviation sector continuously updates its infrastructure with new technology, such as wireless technology, communications and navigation systems, screening equipment, and UAVs operating through radio frequency-based command and control systems (DHS, 2018). These new technologies present new risks which can be exploited by any of the threat actors. As aviation systems continue to transition away 34 from terrestrial navigation systems in favor of space-based systems such as GPS, the increased reliance on radio frequency spectrum is one of the greatest growing threats to the aviation ecosystem. For aviation systems to perform successfully, a broad range of technology including communications, position finding/navigation, timing, and surveillance all perform critical tasks (DHS, 2018). This transition increases the number of attack vectors which adversaries can exploit through purposeful jamming of technology, or through the infiltration of systems to harm data integrity (Scott, 2021, pp. 619-653). radio frequency is foundational to all four domains of traditional aircraft systems including air-to-air, ground-to-air, air-to-ground, and ground-to-ground. As stated by SPD-5, the United States government must take steps to safeguard its use, including physical and technical security measures to prevent interference from jamming or spoofing, and assure authentication and cybersecurity (United States Space Force, 2020; DHS, 2018). As devices for exploitations of radio frequency systems proliferate, the ability of threat actors to target aviation systems increases. The strict interoperability of technology common to the aviation environment is a vulnerability (DHS, 2018). For example, aircraft depend upon GPS to communicate through radio frequency communication channels. This requires a reliable common timing source. Spoofing or jamming of the timing source could disrupt the GPS and communication system channels (Scott, 2021, pp. 619-653). The increased use of unmanned aircraft systems (UAS), capable of autonomous or controlled flight (Spencer, 2018), is an emerging risk affecting the aviation ecosystem. Traditionally used by the military primarily for surveillance since World War I, the primary limiting factors of the utilization of these platforms involved are cost and supply chain 35 supportability (Spencer, 2018). As unmanned aircraft systems increase in capabilities, their use in cyberwarfare has brought the emergence of new attack vectors. Small UAS devices deployed by malefactors can be pre-programmed with flight routines or controlled remotely and have already been used to attack aerospace communication systems (Nichols et al., 2019). DHS Cybersecurity Strategy Guide. This 2018 guide identifies the communications industry as one of the critical infrastructure areas needing improvement in risk identification, vulnerability reduction, threat reduction, and mitigation. Satellite and aerospace communications are domains within the purview of the Department of Homeland Security, whose role is to predict, anticipate, and respond to outages affecting the communication industries and identify vulnerabilities affecting the ability of national leadership to communicate during an event. The Department of Homeland Security Cybersecurity Guide identifies five pillars to protect the nation and its citizens’ interests which define DHS goals and guide their cybersecurity strategy. The Department of Homeland Security cybersecurity goals are: 36 Table 1 Department of Homeland Security Cybersecurity Goals Pillar Goal Detail Pillar I – Risk Goal 1: Assess Evolving Pillar I involves understanding risk Identification Cybersecurity Risks. posture at a national level, allows for the allocation of resources and prioritization of cybersecurity threats. Pillar II – Goal 2: Protect Federal Pillar II addresses vulnerabilities, such Vulnerability Government Information as those which might be exploited by Reduction Systems. radio frequency attack vectors, are Goal 3: Protect Critical addressed in pillar two. It is the DHS’s Infrastructure. goal to mitigate threats on federal information systems, including communications systems. Pillar III – Goal 4: Prevent and Disrupt Pillar III focuses on identification and Threat Criminal Use of Cyberspace. prevention of threats. This section Reduction includes both domestically and international criminals. Pillar IV – Goal 5: Respond Effectively to Pillar IV focuses on the mitigation of Consequence Cyber Incidents. potential consequences from Mitigation cybersecurity attacks. 37 Pillar V – Enable Goal 6: Strengthen the Security Pillar V includes the management of Cybersecurity and Reliability of the Cyber risk through formal risk management. Outcomes Ecosystem The DHS collaborates with international Goal 7: Improve Management partners to foster a proactive approach of Department of Homeland towards the defense of critical Security Cybersecurity infrastructure and national assets. Activities. Note. This table provides a description of the Department of Homeland Security Cybersecurity Goals as defined in the 2018 Cybersecurity Strategy. Adapted from the Cybersecurity Strategy of the United States. Department of Homeland Security, 2018, pp. 7-22 Presidential Policy Directive (PPD) 21: Critical Infrastructure and Resilience. PPD 21, signed in February 2013, provides communication and intent from the federal government. The PPD 21 establishes a call to action to leverage government and commercial partnerships to develop approaches to critical infrastructure risk management (White House, 2013). As a result of PPD 21, CISA set out to establish the National Infrastructure Plan in accordance with the directive CISA (2015). National Infrastructure Protection Plan. Federal and commercial partnering for Critical Infrastructure Security and Resilience was required as part of Presidential Policy Directive 21 (CISA, 2013). Tasked with guiding national efforts, informing decisions, and jointly setting multi-year priorities to be reviewed annually with input from all levels of the critical infrastructure community (CISA, 2013) The National Infrastructure Protection Plan was developed through collaborative information sharing between the DHS and relevant 38 stakeholders. Based on an evaluation of emerging risks, technological capability gaps, resource limitations, and best practices, NIPP’s Call to Action #1 calls to: “(1) Strengthen management of cyber and physical risks to critical infrastructure (2) Build capabilities and coordination for enhanced incident response and recovery (3) Strengthen collaboration across sectors, jurisdictions, and disciplines (4) Enhance effectiveness in resilience decision-making (5) Share information to improve prevention, protection, mitigation, response, and recovery activities.” (CISA, 2013) The DHS CISA Communications Sector-Specific Plan (CSSP). The CSSP is an annex to NIPP’s 2013 Goals and Joint National Priorities and established several objectives for the sector in 2015-2019 (CISA, 2015). These goals included protecting and enhancing critical infrastructure communications, reconstituting communications in cases of disruption to mitigate cascading effects and improving the national security and emergency preparedness (NS/EP) posture with government and private entities to reduce risk. The plan guides the organization’s efforts to provide resiliency, security, informed decisions, risk management practices, and identifies key dependencies on both commercial and federal entities to meet chartered goals (CISA, 2015). CSSP identifies several key sectors including Broadcast, Cable, Satellite, Wireless, and Wireline. Satellite communication is specifically identified as a key component in this guidance (CISA, 2015). The goals of the Communications Sector-Specific Plan risk management framework include: 39 Resilient Infrastructure: protect critical infrastructure to withstand natural or manmade hazards—except for extreme events, such as a long-term outage—with minimal interruption or failure. Diversity: refers to primary and backup communication capabilities not sharing common points of failure, be they physical or logical. Redundancy: Use of multiple communication capability types to sustain operations and eliminate disruption of primary services due to single points of failure. Recoverability: refers to plans to rapidly restore operations in the event of an interruption or failure. (CISA, 2015) To achieve the goals outlined in the plan, CISA strategic framework provides guidance to federal and private critical infrastructure organizations to protect the Nation’s communications infrastructure. NIST Special Publication (SP) 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations NIST 800-53R5 is the most recent revision of the security and privacy controls developed to provide guidance necessary to strengthen and support the Federal Government (NIST, 2020). NIST 800-53R5 is used by both federal and critical infrastructure providers to protect information systems from a wide range of vulnerabilities. The NIST Risk Management Framework 800-53R5 does not specifically include security controls for managing radio frequency attacks, however. Furthermore, while the framework does provide security controls mandating redundant information systems, little information is provided on implementation. In the case of radio frequency vulnerabilities, NIST focuses on security controls regarding wireless 40 network access through protocols such as 802.11x, the IEEE’s standard for the definition of wireless communication mechanisms. No reference is made to aerospace communication systems used as a transport for critical infrastructure (NIST, 2020). radio frequency Interference Best Practices Guidebook. The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) published a radio frequency Interference Best Practices Guidebook in 2020. Prepared in cooperation with the ITU, the guidebook provides information on mitigation and response to radio frequency interference. It is designed to aid public entities to respond to communication network threats such as Radio, LOS, GPS, and broadcast interference, but does not include recommendations for Aerospace systems. The need for the guidebook stems from the continuous presence of threats challenging public voice and data communications (CISA, 2020). The guidebook uses International Telecommunication Union’s (ITU) definition of interference as: “The effect of unwanted energy due to one or a combination of emissions, radiations, or inductions upon reception in a radio communication system, manifested by any performance degradation, misinterpretation, or loss of information which could be extracted in the absence of such unwanted energy.” (2020) Mitigating risks from radio frequency interference is challenging, given the large variety of radio frequency jamming attack vectors, coordinated jamming efforts, and significant implications these have for public safety systems (Wang et al., 2019; CISA, 2020). The guidebook highlights current laws relating to radio frequency interference, and summarizes current efforts related to preparation, awareness, and mitigation of threats. In the guide, DHS 41 CISA provides five steps, referred to as the radio frequency Interference Mitigation Lifecycle for public entities: (1) Recognize, (2) Respond, (3) Report, (4) Resolve, (5) Resilience. These steps are displayed in figure 1. Figure 1. The RF Interference Mitigation Lifecycle, consisting of five steps; Recognize, Respond, Report, Resolve, and Resilience. Reprinted from radio frequency Interference Best Practices Guidebook, by Critical Infrastructure and Security Agency, 2020, p. 12. For the Recognize phase, CISA recommends network operators are informed on and responsible for recognizing radio frequency interference events using reports of equipment malfunctions or disruptions and characterizing any interference using monitoring tools such as a spectrum analyzer (CISA, 2020). During the Response phase, CISA recommends performing immediate mitigation actions singly or in combination, depending on the type of incident. Examples of mitigation activities include transitioning to new communication frequencies, switching to a backup or a redundant means of telecommunication, and physically shielding vulnerable apertures if the source of interference is known (CISA, 2020). Reporting the radio frequency interference to national authorities is recommended to ensure all appropriate data is retained or measured and in case of future legal action. Absent complete reporting, it is 42 extremely difficult for authorities to detail characteristics of an interference event (CISA, 2020). The DHS stresses the importance of Resolving verified radio frequency interference events after reporting is completed. Resolving interference events can be done by increasing education throughout the organization, preparing agencies for future events, and evaluating current infrastructure for persisting vulnerabilities (CISA, 2020). RF Attack Characteristics radio frequency Interference Background. radio frequency Interference (RFI) is a term used to describe a category of threat which degrades of radio frequency performance or capabilities (National Academies of Sciences, Engineering and Medicine, 2015). The radio frequency system availability incidents can commonly be categorized as either malicious or accidental radio frequency interference (CISA, 2020). For the scope of this research, RFI can include interference due to either electromagnetic interference (EMI) or electromagnetic compatibility (EMC) (CISA, 2020; Perez, 2018). Electromagnetic interference (EMI) is any disturbance to a circuit caused by external electromagnetic induction or radiation (Elbert, 2016). Electromagnetic susceptibility may occur due to physical proximity of components and elements to an electronic device or system (Williams, 2016). Electromagnetic compatibility, or EMC, seeks to mitigate unintentional interference caused by electromagnetic energy (Elbert, 2016). In figure 2 below, various paths of EMC coupling are shown. Electromagnetic coupling is the tendency for components in a system to conduct emissions from internal or external actors, which can act as source of interference (Perez, 2018; Williams, 2016). Coupling can present as interference in any of the paths illustrated. All paths are vulnerable to emissions originating from non-shielded components acting as apertures for 43 electromagnetic energy to radiate through free space. External factors such as environment and component material can cause systems to exhibit wide-ranging levels of susceptibility (Perez, 2018; Williams, 2016). Figure 2. Methods of radio frequency interference through transport mechanisms. The figure above displays the possible directions of potential coupling in a simple radio frequency system diagram. Reprinted from Radio Frequency Interference in Communication Systems. Artech House: Elbert, Bruce, p. 4. Electromagnetic interference and compatibility can be categorized into two major domains: emissions vulnerability and susceptibility of system components. Electromagnetic emission vulnerabilities are defined as unintended generation of electromagnetic energy bearing the potential to damage equipment or communications. Susceptibility is the level of impact that a victim may endure while in the presence of malicious or unintended electromagnetic disturbances (Elbert, 2016). The categorization of interference aids system operators in identifying the nature of a threat among all possible causes, be they malicious or unintended (CISA, 2020). The 44 distinction between attacker and misconfigured equipment can be very difficult to establish. For example, a user’s communication channel may read as a jammer from the perspective of a distant end user, due to the low tolerance for error in radio frequency emissions and susceptibility compliance (Elbert, 2016). The International Telecommunications Union (ITU, 2020), a body of over 193 countries, was established in 1865 as part of the United Nations with the purpose of handling issues and topics concerning communication and information technologies. The ITU maintains and releases The Radio Regulations (2020) publication which defines three types of general interference: permissible, accepted, and harmful. Permissible interference is observed or predicted but complies with ITU criteria. Accepted interference is at a higher level but has been agreed upon between two administrations. Harmful interference is of a level that endangers the proper function of radio navigation or other safety services. The International Telecommunications Union identifies two sources of harmful interference: intentional and unintentional. Intentional interference includes jamming or use of unauthorized frequencies. Unintentional jamming may arise from internal sources, resulting from equipment malfunction, or frequency band saturation, which impacts a receiver’s ability to distinguish legitimate carriers (National Academies of Sciences, Engineering and Medicine, 2015; Wang et al., 2016). CISA (2020; Wang et al., 2016) identifies the following sources of internal radio frequency interference: Table 2 Internal RF Interference Examples Internal RF Interference Examples 45 Equipment Interruptions may be caused by new installations of or problem updates to communications technologies. For example, updates to physical infrastructure (e.g., new additions to a tower or relocation of a receiver), as well as upgrades of radio consoles or hubs may cause this kind of internal interference Receiver Interruptions may be caused by “non-linear mixing” of intermodulation external signals inside the receiver. Front-end Interruptions may be caused by inadequate filtering of radio overload equipment, or equipment that needs adjustment. Note. This table provides a breakdown of types of potential internal radio frequency interference events. Copied from “radio frequency Interference Best Practices Guidebook,” by Critical Infrastructure and Security Agency, 2020, p. 2. CISA (2020; Wang et al., 2016) identifies the following sources of external radio frequency interference: 46 Table 3 External RF Interference Examples External RF Interference Examples Co-Channel Caused by more than one transmitter communicating on the same channel due to improper frequency coordination, deteriorating or malfunctioning equipment, or anomalous propagation. Adjacent Caused by a transmitter operating on an adjacent frequency and Channel its energy spilling over into the desired receive channel. Spurious Caused when a transmitter emits on frequencies on which it is Emissions not meant to operate. Natural Caused by natural events such as solar flares, northern lights, Occurrences and other electromagnetic activities. Natural disasters, including hurricanes and floods, can also disrupt and damage RF communications infrastructure. Note. This table provides a breakdown of types of potential external radio frequency interference events. Copied from “radio frequency Interference Best Practices Guidebook,” by Critical Infrastructure and Security Agency, 2020, p. 3. The U.S. Department of Defense has released standards to ensure compliance with electromagnetic emissions and susceptibility levels. These standards include, but are not limited to: 47 1) MIL-STD-461G, Requirements for the Control of Electromagnetic Interference Characteristics of Subsystems and Equipment (DOD, 2015). This standard includes requirements and verification methods to ensure aerospace systems meet a baseline level of performance when exposed to radio frequency energy. Systems compliant with MIL-STD-461G are tested for susceptibility and emissions performance. 2) MIL-STD-464C, Electromagnetic Environmental Effects Requirements for Systems (DOD, 2010). This standard includes requirements focused on radio frequency environmental conditions which may impact or degrade system performance. Verification tests are provided to evaluate system susceptibility or emissions compliance. radio frequency communication systems are limited in terms of power and available bandwidth, therefore proper spectrum management practices must also be considered (MITRE, 2021) The amount of available power and bandwidth are dependent on external factors such as power source or transport mechanism. In the case of SATCOM systems, where satellites are the primary bottleneck, available resources are often very limited. Other system architectures such as Line-of-Sight may be impacted by power availability or visibility (MITRE, 2021). To ensure efficient management of resources, spectrum management, the “analytical, procedural, and policy approach to planning and managing the use of the electromagnetic spectrum” (MITRE, 2021) is required (Elbert, 2016). In cybersecurity terminology, spectrum management can be considered a control mechanism implemented to reduce risks introduced by sources of RFI (Elbert, 2016). Through proper spectrum management 48 practices, the likelihood of unintentional jamming is greatly reduced, and safeguards may be implemented to protect against signal noise, the background energy which can cause interference in a signal environment (Elbert, 2016; Bailey 2019). Aerospace Communications System Vulnerabilities. According to the National Air and Space Intelligence Center (2018), Russia and China consider electronic warfare and offensive cyber to be key assets to maintain military advantage, and actively pursue their development. Electronic warfare includes systems which utilize radio frequency technologies to detect, deny, or deceive adversarial electronic capabilities (United States Army, 2021). Electronic Warfare is a broad discipline, dealing with the defense and weaponization of the electromagnetic spectrum (NASIC, 2018; United States Army, 2021). The United States categorizes radio frequency attacks in the Electronic Warfare domain of cyberspace (United States Army, 2021). FM 3012: Cyberspace Operations and Electromagnetic Warfare, is the field manual for Electromagnetic Warfare and describes the military’s approach towards denying, deceiving, and degrading radio frequency adversaries (United States Army, 2021). To deny, deceive, or degrade space services, attackers may use spoofing, jamming, or command-link replay, the replay of control logic to impact space vehicle capabilities (Martin, 2019). Satellite communications broadcast sensitive data over visible frequencies using radio frequency electromagnetic signals, exposing their channels to adversaries seeking to intercept them (National Air and Space Intelligence Center [NASIC], 2018). Like terrestrial communications, these channels or links are vulnerable to a variety of threats. Figure 3 illustrates segments of a generic satellite communication system and vulnerabilities unique to each of its 4 segments: space, link, user, and ground. 49 In Figure 3, the space segment contains a space domain element in the form of a space vehicle. The user segment consists of the interface between the vehicle and ground support equipment. The ground segment consists of support networks and infrastructure associated with enabling the collection of data from space system. The link segment includes the electromagnetic radio frequency communication link used to transmit data between the ground segment and space segment (NASIC, 2018). Figure 3. Cyber Threats to Space Systems. Reprinted from “Competing in Space,” by the National Air and Space Intelligence Center, (NASIC, 2018) 2018, p. 18. Space segments are particularly vulnerable to radio frequency attack vectors (Manulis et al., 2021). As depicted in figure 3, radio frequency threat vectors on the space segment include command intrusion, payload control, and denial of service. The user segment includes spoofing, 50 Denial-of-Service, and Malware. The link segment, or the segment consisting of the transport between the ground segment and space segment, includes command intrusion, spoofing, and replay as attack vectors. The ground segment is depicted as being vulnerable to hacking, hijacking, and malware. The National Air and Space Intelligence Center (NASIC, 2018; Velkovsky, P., Mohan, J., & Simon, M., 2019) states foreign adversaries may conduct electronic attacks to disrupt, deny, deceive, or degrade space services through uplink or downlink jamming (NASIC, 2018). Uplink jamming is interference with signals from a ground station or terminal to a space vehicle (Velkovsky et al., 2019). This can be accomplished by tuning jammers or interferers to the same frequency as the transmitting system. By directing a signal tuned to the same frequency as the satellite, it is possible to impact the availability of the communications. Often, uplink jamming is considered more difficult as the infrastructure and power to reach the satellite create larger requirements than downlink methods (Velkovsky et al., 2019). Downlink jamming is accomplished by tuning jammers or repeaters at frequencies which a receiver is configured to receive from a space vehicle (Velkovsky et al., 2019). By identifying those frequencies and targeting a ground station, impacts to system availability is possible. Downlink jamming is often more conspicuous, as interference to a downlink terminal must only overpower the strength of a satellite signal on the ground (Velkovsky et al., 2019) Malware can potentially impact a spacecraft through vulnerabilities introduced during the supply chain, which is the process during which components of a system are manufactured, packaged, stored, shipped, and procured. During operations, the space segment may be vulnerable to remote exploits via radio frequency communication vulnerabilities (Unal, 2019). Denial of service is a unique challenge to solve since directed receive antennas must listen to a 51 specific geographic area to receive signals from intended users (Akan & Yazgan, 2020). In Figure 4 below, signals are exchanged between legitimate uplink and downlink earth stations. Highlighted in red, the jamming site displays a third earth station or terminal which is being used to interfere with legitimate signals passing the spacecraft. Figure 4. Uplink Jamming. A graphic representation of the types of signals and actors in a space communication system. Reprinted from “Competing in Space,” by the National Air and Space Intelligence Center, 2018, p. 18. Attacks on user and ground segments are also vulnerable to analogous attack methods. Malicious attackers can, without significant levels of technical expertise, monitor antenna locations for active frequency use (Manulis, Bridges, Harrison, Sekar, & Davis, 2021). Upon identification of target signal characteristics, threat actors can resort to spoofing, denial of service, or replay attacks to exploit the system (National Air and Space Intelligence Center, 2018). Figure 5 depicts a Downlink Jamming scenario: a denial-of-service attack using a 52 localized jammer to prohibit communications from an earth station to its intended target, in this case, a satellite phone. Figure 5. Downlink Jamming. Reprinted from “Competing in Space,” by the National Air and Space Intelligence Center, 2018, p. 18. The Ground Segment Systems Engineering Handbook (Johnson-Roth, Chaudhri, & Tosney, 2016) identifies NIST 800-53R5 as the primary cybersecurity compliance document for protecting ground assets from attacks. However, aerospace communication and satellite system vulnerabilities and are not included in the document (NIST, 2020). NIST explicitly addresses that the 800-53R5 is intended to provide a generalized approach towards security controls. The standard does not provide implementation details for integrating aerospace radio frequency attack mitigations (NIST, 2020). Satellite communication channels are used by critical infrastructure and government entities to provide vital data link over extended distances, or to areas where traditional infrastructure does not exist (DHS, 2018). In the Space Operations Directive JP 3-14, released by 53 the US Joint Chiefs of Staff in 2018 (JCS, 2018b), the importance of satellite communication systems is outlined. Key capabilities of satellite communication systems include: (1) Global Coverage. Collectively, SATCOM systems provide global coverage and can focus capacity to areas of special interest. (2) Real-Time, Over-the-Horizon Transmission of Voice and Data. Like other communications media, most SATCOM systems provide real-time connectivity for both voice and data. (3) Independence from Terrestrial Communications Architecture. Some SATCOM links obviate the need for long terrestrial communications links. (4) Flexibility. Satellite systems enable global coverage and interlinking between frequency bands and systems, and certain systems can provide a relatively low probability of detection (LPD). (5) Support to Mobile Forces. SATCOM systems can provide the communications required by mobile forces operating over wide areas (JCS, 2018). Space Communication Vulnerabilities. Satellite communication service providers are often responsible for leasing sections of bandwidth to commercial and government customers (Kodheli et al., 2021). However, potential attacks on frequencies leased by these service providers are often opaque due to limited insight into customer communications and the challenges associated with detecting interference. This makes a proper response difficult. While service providers are responsible for maintaining a specified availability times with their contracts, few mitigations can be performed in the short available timespan to respond to an attack. Past examples of satellite outages have had wide-reaching effects across many industries (Chicago Tribune, 1998). 54 As identified by the Department of Homeland Security Cybersecurity Strategy report (2018), telecommunication providers, including satellite communications, are classified as Critical Infrastructure (CI). In the case of satellite communications, this encompasses entities such as the national weather service, FEMA, national guard, active-duty military, television, radio, and many others. The loss of availability of these resources would cause immediate and detrimental impacts on much of our technological backbone (Defense Intelligence Agency, 2019). In addition to the increased availability and decreased cost of radio frequency technology, there has been a decrease in complexity as more industries deploy radio frequency to increase innovation, profits, or capabilities, driving an exponential rise in radio frequency attack vector threats (CISA. 2017). CISA’s 2017 report adds that malicious tools, easily purchased online, can be used by lone actors, organized criminals, terrorist groups or nation-states. CISA cites the Stuxnet 2010 attack on Iranian nuclear facilities as an example of the low cost, high impact consequences of advancements in attack methodologies. During the Stuxnet event, USB device used to deploy malware on industrial control systems (ICS) to destroy 984 centrifuges. Significant parallels have been established between SCADA-type systems such as power generation facilities and satellites (Falco, 2020). CISA (CISA, 2017; DHS, 2018) further elaborate on the difficulty of identifying attackers in a cyber war space, and the complexities involved in defending against an unknown attacker. Vulnerabilities in GPS. The concept of Global Satellite Positioning, or GPS, was conceived at Johns Hopkins University merely hours after Sputnik I was launched in Russia. By inspecting the satellite downlink as the craft orbited Earth, two researchers quickly identified the 55 ability to accurately track its position (Simpson, 2000). This was realized by comparing multiple observations of the Doppler Effect from different locations. The Doppler Effect is the shift in frequency of a signal which an observer experiences relative to the source of the original signal (Neipp et al., 2003). This characteristic enables the precise tracking and geolocation of GPS users (Jason et al., 2006).). As a result, DARPA began work on the development of a satellite system called TRANSIT to support the military application of submarine-based missile systems (Danchik & L. Lee, 1990). With the success of this application, future versions of global navigational satellite systems began development (Mai, 2017) As military capabilities of global navigational satellite systems proliferated, competitors to the United States began to invest in the technology as well (Sarkar, Banerjee, & Bose, 2018). Soon, similar systems were seen being tested by the Soviet Union. As foreign nations began using the technology, commercial companies increased their contribution to the value of the GPS industry in the form of new consumer goods (NIST, 2019). In 1983, a Soviet Union aircraft shot down a civilian airliner which strayed into their airspace. This accident may have been avoided, had navigational systems been available to aircraft in the region. In response, the United States announced that GPS would become available for commercial and civilian uses once completed (Sagdeev, 2009), marking a considerable change. Previously, the Department of Defense owned and maintained GPS satellites, with the primary application being defense support. At the time, there had been a requirement that only federally approved applications use GPS. The announcement meant commercial companies could also use and profit from the technology (NIST, 2019). 56 The first GPS system used by consumers was initialized by the US Air Force in 1978. Known as GPS I, it was the first in a series of satellites launched over the next 13 years, eventually growing to 24. Gradually, commercial applications such as telecommunications and aircraft navigation using GPS became available (NIST, 2019). In addition, GPS was adopted as a national defense asset when it was integrated into the Conventional Air Launched Cruise Missile (ALCM). Neilson (2012) noted GPS is easily integrated into existing weapons systems using a “cascaded filter” approach, with the result that 35 GPS enabled missiles were used in the Gulf War conflict in 1991. The availability of this system not only ensured critical defense capabilities, but also provided immensely important commercial critical infrastructure applications for technologies ranging from aircraft navigation to telecommunications (Kepchar, 2017). In 1990, the Gulf War was the first instance of GPS jamming use during an armed confrontation (NIST, 2019; Baird, 2013). The emphasis on GPS has resulted in vulnerabilities to national and commercial assets (Kepchar, 2017). In addition to positional data gathered from GPS signals, the telecommunication and information technology community has developed a reliance on GPS signals as a source of timing from signals generated by spacecraft for navigation (NIST, 2019). Timing is vital for information systems to successfully transmit and receive data to distant ends. Any impact on the integrity of timing has immediate and disastrous implications for information systems depending on it (Betz, 2021). Jafarnia-Jahromi, Broumandan, Nielsen, and Lachapelle (2012) describe in detail spoofing vulnerabilities in GPS implementations, and reviews potential mitigation techniques. GPS spoofing, a relatively recent emerging threat, is the malicious transmission of packets 57 masquerading as legitimate GPS signals by an attacker for the purpose of gathering data or information., In other cases, the malicious message may provide inaccurate data to disable a system (Jafarnia-Jahromi et al., 2012). Recently, North Korea demonstrated technology to simulate and spoof a GPS signal (Westbrook, 2019). Signals were used to disable timing and navigation systems on naval vessels (NIST, 2019). By disabling timing on a target, an attacker can ensure systems relying on it are no longer able to communicate (Kepchar, 2017), and render the navigational system offline, with the target losing its ability to accurately determine position (Westbrook, 2019). This vulnerability is present on a majority of current defense and commercial systems (NIST, 2019). Jamming, another vulnerability impacting GPS systems, (Scott, 2021; Westbrook, 2019) is the transmission of a signal at a particular frequency with the sole intent of disabling communication (Baird, 2013). Classified as a denial-of-service attack by NIST (NIST, 2020), this attack is simple and inexpensive to deploy. Furthermore, such attacks can be launched from miles away (Westbrook, 2019). A third vulnerability of Global Positioning Systems, space missiles, can target satellites or objects in space from the ground. Currently, only a few nations in the world (US, China, India, Russia) have attempted and succeeded in this type of attack. A primary concern in the aerospace industry is that, in a wartime scenario, if an adversary decides to target GPS satellites or ground stations, it is possible to disable their use (Kehler, 2018; Bailey et al., 2019). Chapter Summary This chapter presented a survey of government and scholarly literature on radio frequency vulnerabilities and attacks on aerospace systems including a background on aerospace communication systems, with an emphasis on cybersecurity practices for Radio Frequency attack 58 vectors. Recent federal publications were summarized to establish the current landscape of radio frequency threats. Types of attacks on aerospace systems were presented, including vectors, such as radio frequency interference, jamming, and spoofing, potential threat actors and their motivations, vulnerabilities, and vectors were detailed, proving the need for research on this topic. Scholarly literature on relevant technologies, such as GPS, was investigated to provide an increased understanding of radio frequency attack methods and how they can impact aerospace communication system confidentiality, integrity, and availability. The combination of these data points provides a holistic look at the current body of knowledge and landscape which today’s aerospace communication systems operate under and will inform the survey instrument. The foundation established in the literature review will inform the study and research instrument. Chapter 3 will present research rationale, methodology chosen, and design, and how they will unite to answer the research questions. 59 CHAPTER 3: METHOD The purpose of the study is to explore radio frequency attack vectors associated with aerospace communication systems, and the application of cybersecurity principals to mitigate them by surveying expert opinion on radio frequency threats. Chapter 3 focuses on the research design and study methodology. Research questions are reviewed and details of the hypothesis, variables, population, sampling method, data collection methodology, instrumentation, reliability, procedure, validity, pilot study, and data analysis approach are provided. The study will use a cross-sectional survey with a quantitative descriptive research design to gather survey data from participants. Given the quantitative nature of this research design, the data collection method, a survey, will be distributed to a targeted population to gather meaningful quantitative measurements for statistical analysis. Participants will be screened to ensure appropriate experience and expertise in radio frequency systems. The survey instrument will be tested in a Pilot Study and adjusted as necessary prior to release. Research method and design appropriateness research methodologies are of three types: quantitative, qualitative, and mixed-methods (Patten & Newhart, 2018). Quantitative research uses numerical data to evaluate a subject to answer, assess or test research questions or a hypothesis (Patten & Newhart, 2018). Quantitative studies emphasize reliable measurement tools and allow for further statistical analysis (Salkind, 2018). In addition, the literature review is completed first, to aid in the generation of a research tool such as a survey (Salkind, 2018). Quantitative research is often highly generalizable (Patten & Newhart, 2018). Creswell & Guetterman (2019) identified several different types of quantitative research, such as correlational, experimental, and descriptive. Correlational data uses statistical analysis to provide quantitative measurements using multi-variate comparisons. Experimental studies are 60 utilized to determine to test for cause-and-effect relationships. Descriptive research sets out to describe the characteristics of a phenomenon (Salkind, 2019, p. 20). Qualitative research, by contrast, is usually exploratory in nature and uses interviews, focus groups, or case studies to better understand the nature of an issue (Creswell & Guetterman, 2018). In quantitative research, researchers attempt to answer research questions by addressing why and how questions, capturing a population’s experience of a phenomenon. The literature review in a qualitative study is performed iteratively rather than in advance (Creswell & Guetterman, 2018). While qualitative research may set the foundation for later quantitative research to study ideas, outcomes from qualitative research are often narrative-oriented and have limited generalizability due to the smaller populations (Creswell & Guetterman, 2018; Meyers, 2000). Therefore, the qualitative method was rejected. The third alternative often seen in research is mixed-methods. Mixed-methods research uses both quantitative and qualitative methods to answer research questions which cannot be satisfied with just one methodology (Dawadi, S., Shrestha, S., & Giri, R., 2021). However, as Dawadi, S., Shrestha, S., & Giri, R. mention in their report Mixed-Methods Research: A discussion on its Types, Challenges, and Criticisms (2021), mixed methods may not be practical due to resource limitations. In addition, limitations in merging the qualitative and quantitative methodologies can impact the effectiveness of a study as it can be challenging to accurate relate the findings (Dawadi, S., Shrestha, S., & Giri, R., 2021). Due to the nature of this study, the mixed methods approach was rejected. The quantitative methodology was deemed most appropriate due to the need for concrete data for analysis to generate findings answering the research questions. Responses provided by subject matter experts will enable the capture of data for analysis to reveal details surrounding 61 the phenomenon of radio frequency attacks on aerospace communication. Instrument questions will be designed to generate generalizable results and allow for quantitative interpretation and meaningful findings. A descriptive research design was selected for use in this study. Descriptive research “paints a picture” of the research topic (Salkind, 2018, p. 161). It differs from comparative or experimental research in that it does not include a control group (Drummond, K. & MurpheyReyes, A., 2018). The purpose of the survey is not to test the influence of variables, but to gather expert views from experienced aerospace system cybersecurity principals familiar with radio frequency interference. A quantitative descriptive survey design allows for the collection and evaluation of responses provided by subject matter experts to correlate them to known phenomena (Drummond, K. & Murphey-Reyes, A., 2018). Creswell & Guetterman (2019) describe four methods of survey research: instrument, population sampling, interviews, and questionnaires. In this study, instrumentation and population sampling will be used. Instrumentation includes the use of tools such as surveys to collect data. Population sampling involves the collection of a subset, or sample, of a population to draw generalizable results for a greater population (Creswell & Guetterman, 2018). An online survey tool will serve as the instrument for data collection during in the study. A survey allows for the collection and assessment of qualitative, measurable data which can then be generalized to the larger field of aerospace communications (Salkind, 2018). Online surveys provide the additional benefit of ease of accessibility which traditional in-person surveys do not have, thereby increasing the potential number of participants (Salkind, 2018). The survey will be administered using Survey Monkey, a third-party survey service (Regmi et al., 2016). According to Nagalakhmi and Trivedi (2015), online survey tools including 62 SurveyMonkey are suitable for academic research since collected data collected can be exported for further analysis and translation. Survey questions will be uploaded to the instrument tool and accessed through a direct link to the survey webpage hosted on the third-party site. A cross-section survey approach will be used to collect demographic information and other data from participants. Cross-sectional surveys consist of only one data collection cycle and collect participant opinion from a single point in time (Creswell & Guetterman, 2018; Raul et al., 2016). This is most suitable since the survey seeks to identify current views of subject matter experts anonymously. Additional iterations of samples would not be representative of the same population sample. The survey will be designed to administer questions relevant to this research subject and will incorporate information gathered during the literature review. Population sampling will be used during data collection to reduce the margin of error and to increase the level of confidence in the results of research (Creswell & Guetterman, 2018). Population sampling involves the collection of a subset, or sample, of a population to draw generalizable results for a greater population (Creswell & Guetterman, 2018). Due to the nature of online survey instruments, a high-response rate is not expected, as it is typical for surveys to have less than a ten percent completion rate (Saleh & Bista, 2017).Completion rate is the percent of individuals the survey instrument is distributed to who complete the entire survey. Several factors may foster a low response rate, including extended completion time required, personal security settings which may limit the ability of participants to receive a participation request, and lack of response by choice (Saleh & Bista, 2017). 63 Research Questions In chapter one, the four research questions for this study were presented. They were designed to investigate the problem statement, which identifies the lack of a cybersecurity policy or framework to aid in the mitigation of radio frequency attack threats. The literature review shed additional light on some aspects of the study, and specific contributions to the research questions made by it are noted in the discussion below. The research questions for this study are: RQ1. Would the implementation of a national standard for the management of radio frequency attacks contribute to the security of aerospace communication system missions? RQ2. How often do radio frequency attacks target aerospace systems? RQ3. What is the impact of radio frequency attacks on aerospace systems? RQ4. What is the relationship between radio frequency attacks and cybersecurity attacks amongst aerospace communication systems? Due to the wide variety of technical implementations and techniques of radio frequency technology in aerospace systems, it is not the intent of this study to describe or address every possible attack scenario. For example, while the research questions reference aerospace systems, there is no distinction between aerospace platform systems and aerospace support systems. The exact application of radio frequency technology is not limited to one stereotype. This study focuses on radio frequency attack vectors which can be exploited by malicious actors. By surveying industry experts, a collective measurement of industry proficiency and concerns can be gathered. While performing the literature review in chapter two, specific attack vectors and scenarios were identified which aided in focusing the survey questions. By analyzing current 64 United State government publications from entities such as the Government Accountability Office and the Department of Homeland security, specific areas of high concern were identified. Hypothesis/Variables The hypothesis under test for this research study is, radio frequency attack vectors pose a significant threat to the operational capabilities of aerospace systems, and current federal cybersecurity policies fail to protect aerospace communication systems from radio frequency attacks which align to known cybersecurity threats. To address this hypothesis, seven variables were identified to understand the impacts, frequency, and current state of policy regarding radio frequency vulnerabilities on aerospace communication systems. This study will measure and analyze the seven variables using a survey research tool to understand subject matter opinion of the survey questions presented. The seven variables are: participant background industry, years of experience, impact to confidentiality, impact to availability, impact to integrity, frequency of radio frequency attacks, and assessment of the effectiveness of current policy and guidance. The first variable to be measured is the aerospace communication system background of participants. Aerospace communication systems can range in purpose and architecture, which implies that respondents may provide different answers to the survey questions depending on the type of system with which they are most experienced. By analyzing results using this variable, statistical analysis can be performed to identify potentially revelatory trends. The second variable to be measured is the number of years of experience of survey participants in the aerospace communication system industry. This variable will be measured to determine if there is a correlation between experience level and the responses of participants. By analyzing results using this variable, correlations can be identified between the other measured 65 variables to determine if years of experience influenced the perceived threat of radio frequency attack vectors on aerospace communication systems. Responses from participants on radio frequency impacts on system confidentiality, integrity, and availability will account for an additional three of the variables to be measured. The impact level of radio frequency attack vectors on each of the three domains of the CIA triad will be presented as a question during the survey and measured for statistical analysis. The survey intends to avoid the decomposition of Confidentiality, Integrity, or Availability into further granularity, to ensure that respondents can answer confidently and accurately. Participants will be asked to identify the frequency of occurrence of suspected radio frequency attacks on aerospace communication systems. This variable will be collected to determine how often radio frequency attacks were seen on active aerospace communication channels among respondents. This data will then be used to produce correlation coefficients with other variables such as years of experience and domain expertise. The final variable to be measured during the survey will ask participants to evaluate the current level of documentation/policy supporting the defense of aerospace communication systems from radio frequency attack vectors. This question is largely subjective in nature but provides a valuable measurement from industry experts on whether adequate documentation exists. Population A population is the group of potential participants to whom the results of a study may be generalized (Salkind, 2018; Creswell & Guetterman, 2018). Generalizable results can be applied to a wider population having similar characteristics as the study population, regardless of environment or setting (Salkind, 2018, p.85). The population should consist of a “group of 66 individuals who have the same characteristic” (Salkind, 2018, p. 139). Raul et al. (2016) elaborates on the definition of population by differentiating between the target population, also known as the intended population, and the accessible population. The target population represents the complete population from which the sample will be drawn. In other words, this target population is the complete group to which the research is intended to generalize. The accessible population is the specific group of participants measured by the research (Ruel et al., 2016). The definition of accessible population considers constraints possibly limiting inclusion of additional participants, such as native geographical limitations or demographics (Ruel et al., 2016). The target population under study in this research paper will include the population of U. S. aerospace professionals involved with the operation, development, or integration of radio frequency technology on aerospace systems. Given the electronic format of this survey, the accessible population can be further defined as those who were reachable through electronic means on Facebook and LinkedIn. Only participants with appropriate verified experience who are members of aerospace executive groups on Facebook or LinkedIn will be included in the population. Sampling Theory Both Salkind (2017) and Creswell (2019) describe the sample of a population as a subset of the population where the sample’s characteristics can be applied to the greater whole population. The sample for this study will be the population of aerospace professionals who are identified as participants for the survey. The sample includes those with verifiable experience in the aerospace field and who are members of groups representing the population – a subset of the greater population of professionals. 67 There are two sampling strategies described by Ruel et al., (2016) and Salkind (2017): nonprobability sampling and probability sampling. In probability sampling, the likelihood of an individual in a population being selected for sampling in a study is known beforehand. Probability sampling methods “use random chance to select members of the population to be included in the sample. Using probability sampling, researchers are able to ascertain that no bias influenced the selection of random samples” (Ruel et al., 2016, pg 123). For example, in a population of aerospace industry experts, if one quarter of the population works with satellite systems, then there is approximately a 25% chance of selecting a satellite system expert as part of the sample from the greater population. In contrast, nonprobability sampling does not define the number of individuals in the population sampled in advance, and it is therefore impossible to accurately compute the likelihood of a participant being selected (Ruel et al, 2016). Ruel et al. (2016) state the following regarding nonrandom sampling methodologies: Non-random sampling methods do not use randomness or chance to ensure representation in a sample. This means that a whole host of things other than chance may be affecting who is in the sample, and these things may keep the sample from being representative…Thus, despite efforts to represent the population, we can never know with any certainty if the sample does or does not, in fact, represent the population” (pp. 149). According to Salkind (2018), the most frequently used probability sampling procedure is simple random sampling. In a simple random sampling strategy, everyone in the population being sampled has an equal chance of being selected as a participant. There are no variables or factors affecting a person’s selection. The process for simple random sampling consists of first 68 defining the population from which samples will be selected, identifying the members of the population, assigning of numbers to each participant, and then the use of a criterion to select samples from the population (Salkind, 2018). The selection of criteria can be handled in several ways. Salkind (2018, p. 87) identifies the table of random numbers approach as an example of a probabilistic sampling criterion. In this approach, the researcher uses a table consisting of randomly derived numbers, matching the number of participants. By randomly selecting numbers from a matrix, independent of the process during which numbers were assigned to the participants, random selection can be achieved (Salkind, 2018). A second method of probabilistic sampling is systematic sampling (Salkind, 2018, p. 140). To perform systematic sampling, a researcher first determines the total population and selects a sample size. Once selected, a starting point is chosen randomly, and a step size is calculated based on the number of samples to be gathered from the population. Samples are then taken from the population in steps. Systematic sampling is considerably easier than random table sampling, and as a result, is less precise. Depending on the starting point of systematic sampling, the chances of selecting individuals in a sample can be influenced, thus removing the assumption of equal representation in samples (Salkind, 2018, p. 141). Like probability sampling, nonprobability sampling includes several methods to select samples (Salkind, 2018, p. 143). In nonprobability sampling, the likelihood of picking a participant is not known, and therefore, the participants being selected in a sample do not have an equal and independent chance of being selected. One method of nonprobability sampling is convenience sampling (Salkind, 2018, p. 140; Ruel et al. 2016). 69 “Convenience sampling refers to, for example, including a sample of the closest respondents to those administering the survey, such as family, friends, or colleagues. Such samples are known to be subject to several types of bias, including subjectivity; researchers tend to ask people to be part of a survey if they are comfortable asking” (Ruel et al., 2016). Convenience sampling may include bias and is not random, depending on the sampled population. Due to the significant chance of error, this method of sampling is unlikely to produce a truly representative sample of a target population. A second nonprobability sampling method is quota sampling. In quota sampling, samples are first selected using desired characteristics, such as industry background or years of experience. Raul et al. (2016) defines quota sampling as: Convenience sampling with the addition of quotas or limits to the number of people of a particular demographic who can be included in the sample. Often the quotas are used to reflect known properties of the population… This method does at least guarantee that the sample will reflect variation in the population with respect to the variables used to create the quota… Including only participants with the desired characteristics, the study continues until a certain quota has been met. This sampling strategy is not completely random, as potential participants who were not included due to the quota are not considered. (p. 150) The third nonprobability sampling technique considered was purposive sampling, also known as judgmental sampling (Raul et al., 2016, p. 151). Purposive sampling is a unique type of convenience sampling in which participants are chosen based on their background or knowledge of the subject matter under investigation (Raul et al., 2016, p. 151). This is also 70 known as key informant interviewing, a method of research in which the key participants are experts in the field under research. Purposive sampling has several limitations when applied to social media (Raul et al., 2016). For example, due to the configuration of individual social media profiles dictating visible group members on Facebook and LinkedIn, some prospects may be excluded. This can be further compounded when sampling the population as the participants are often not located in the same geographic region (Raul et al., 2016). However, using online research tools provides considerable benefits when using purposive sampling, as it is possible to identify potential experts with greater ease. Like the previous two sampling methods identified, purposive sampling is a nonprobability sampling technique (Raul et al., 2016). This limitation means that sample size cannot be representative of the larger population, which impacts the ability to estimate sampling error or bias. However, given the specialized nature of the information the subject matter experts provide, large samples can still be used to produce high quality data (Raul et al. 2016). Two additional methods of nonprobability sampling were considered during the selection of the methodology: snowball sampling and respondent-driven sampling. Both these methodologies require collection of identifiable participant data (Salkind, 2018; Raul et al, 2016). Given the sensitive nature of the survey, it was determined that the collection of personal data would erode participation. To ensure the highest level of accuracy of results, it was determined that no personal data would be retained, thus eliminating these options. The survey requires respondents have expertise in the field of aerospace system technologies. Thus, the population of this research will include only professionals in the aerospace field. Nonprobability purposive sampling was selected to ensure that only subject 71 matter experts will be included as a participant. Randomness of survey participants is not an influencing factor, due to the nature of the participant population pool and sampling technique (Raul et al., 2016). Prospective participants will be individuals whose experience was validated by an industry-specific group on Facebook or Linked In. Randomness cannot be achieved due to limitations inherent to the inclusive nature of purposive sampling (Ruel et al., 2016). Per the validation procedures of the “Military SATCOM” Facebook group (US Military SATCOM, n.d.), potential members are reviewed through a multi-stage process, whereby current members of the group are required to validate the expertise and vouch that the individual has prior experience in the field of aerospace communications. This common characteristic defines the participant population of this survey. The survey was not released to anyone not validated as an approved member of the group. Sample Size As with any data collection research methodology, it is essential to ensure sample size is sufficient to yield generalizable results (Salkind, 2018, p. 144). By calculating sample size, it is possible to calculate the number of participants required to produce generalizable results. There are several variables influencing calculation of sample size. For example, as population size of a study increases, the number of required samples to maintain an acceptable confidence interval increases in kind (Ryan, 2013). To counter this effect, an increased number of samples is required to represent the increase in population (Salkind, 2018). The same relationship exists when determining margin of error; as the margin of error increases, the accuracy of the results decreases. Conversely, increases in sample size and confidence level increase the level of accuracy for which the sample 72 can be generalized; decreases in sample size and confidence level negatively affect this generalizability. To calculate this, a sample size formula equation (Fink, 2013; Daniel, 2013) was used: 𝑧 2 ∗ 𝑝(1 − 𝑝) 𝑒2 𝑆𝑎𝑚𝑝𝑙𝑒 𝑠𝑖𝑧𝑒 = 2 (𝑧 ∗ 𝑝(1 − 𝑝) 1+ 𝑒 2𝑁 (1) Where N = Population size; p = proportion of population; e = Margin of Error (percentage in decimal form); z = z-score. The sample size formula is tailorable depending on a study’s desired confidence level, population size, and desired margin of error (Fink, 2013; Daniel, 2013). The confidence level is determined by the level of confidence in response accuracy (Crewell & Guetterman 2018). For example, a confidence level of 99% means that the researcher can be 99% certain results are accurate. For this survey, a confidence level of 95% was selected (Ryan, 2013). To insert this selection into the Sample Size formula, the confidence level must be converted to a z-score, which, for a confidence level of 95%, is 2.58. The Altman Z-score is used it statistics to provide a measurement of how far from the mean of a data set a particular measurement is (Altman, 1968). The Z-score was used to calculate the deviation from the mean. The formula for calculating Z-score is: 𝑍 = 𝑥−𝜇 𝜎 (2) Where Z = standard score; x = raw score, 𝜇 = population mean; σ = the population standard deviation. The population size of the study is the total population invited to participate. A total of 8,109 participants were targeted as the population. The survey will continue until the quota 73 sample size is met. The survey assumes a margin of error of 6%, yielding a suggested sample size of 259. The margin of error, also known as confidence interval, heavily influences the size of the sample, and the selection of 6% was determined to be appropriate given the non-linear number of increased samples needed to lower the margin of error. For example, to lower the margin of error to 4% would require an additional 300 respondents in the sample. Data Collection The data collection process will be integral to the execution of the survey. Surveys have the advantage developing an accurate description of the subject under study (Crewell & Guetterman 2019; Salkind, 2018; Ruel et al., 2016). The collected data measurements can effectively be generalized to larger populations. The ability to generalize data benefits not only future research, but also decreases time and cost of future studies (Salkind, 2018). There are two approaches to data collection: longitudinal and cross-sectional. In longitudinal survey data collection, participants are asked to complete the survey questionnaire at different, multiple points in time (Creswell & Guetterman, 2018, p. 388). Researchers use longitudinal studies when the study requires data to be sampled at multiple times, such as a survey evaluating a subject’s understanding of a concept before and after a training session (Creswell & Guetterman, 2018, p. 388). The involvement of participants during multiple sessions results in an increase overhead in cost and time. In addition, survey participants not completing both iterations of the data collection yield incomplete results and must be discarded (Creswell & Guetterman, 2018, p. 388). In cross-sectional surveys, data is collected at a single point in time; there is no need for researchers to follow up for additional iterations of data collection (Creswell & Guetterman, 2018, p. 386). 74 In this study, a cross-sectional survey data collection instrument reduces cost and time spent collecting data (Creswell & Guetterman, 2018, p. 386). In cross-sectional surveys, there is only one period of data collection. Given the large number participants included in the sample (approximately 259), a longitudinal survey would have required, at a minimum, double the amount of data collection time. Given the nature of the study, the research questions, and the scope of the effort, a cross-sectional survey satisfies the research requirements (Creswell & Guetterman, 2018, p. 386). Interviews allow room for descriptive answers, providing detailed responses through oneon-one sessions with participants. Interviews can be formal or informal, allowing for use of multiple platforms depending on the interview goals (Ruel et al., 2016). An advantage of interviews is the detailed description participants provide on the research subject and questions (Salkind, 2018). This detailed description comes with a significant increase in both cost and time. For the interview to succeed, the researcher and interviewee must both allocate the appropriate resources to conduct the interview session. Surveys reduce the amount of effort required by participants (Creswell & Guetterman, 2018; Ruel et al., 2016). While interviews may require a significant amount of time, surveys are brief and restricted to multiple choice (Ruel et al., 2016). A restrictive, closed-question survey allows for answers to be categorized and assigned numeric values. Survey questions are best applied using numerical systems which can be extracted for statistical analysis of trends. In the case of this survey, the Likert scale was chosen due to its ability to confer quantitative values to degrees of opinionated response (Robinson, 2014). For each question on the survey, participants will be asked to quantify their opinion using a set selection of ratings. Respondents will be offered a choice of five measurements to reflect 75 their assessment of a statement. These measurements correspond to a five-point Likert Scale: None (0), Low (1), Moderate (2), High (3), Severe (4) (Likert, 1932). Instrumentation The survey instrument will be designed to provide the highest level of generalizability to the wider aerospace industry by screening participants based on their experience. Confining respondents to those with aerospace systems experience will ensure only validated participants have access to the survey. Limiting responses to people of such expertise allows for a holistic and accurate representation of the current opinion of subject matter experts. As mentioned in the problem statement of this survey, the survey was designed to identify whether the implementation of cybersecurity practices would aid in the security of aerospace systems. Various design types were analyzed to select the most appropriate survey instrument. Raul et al. (2016) describes several survey types such as mail, telephone, group interview, faceto-face, and web-based. Given the sensitive nature of the survey, it was previously determined that personal information would not be collected. In addition, the disparate geographic locations of participants prevent any face-to-face interaction. Given these constraints, it was determined that a web-based survey would provide the highest level of accessibility and participation among participants. Prior to conducting the main study, to receive feedback on survey content, a pilot study will be conducted among five people meeting all the participant criteria. Their recommendations will be tracked, and the final survey will be adjusted to incorporate feedback as necessary, and any criticism will be incorporated into the final survey. The pilot and final surveys will be reviewed by the dissertation committee at Capitol Technology University for approval prior to 76 distribution. Institutional Review Board approval will be obtained before moving forward with data collection. As stated earlier in this section, efforts were made to ensure the most appropriate research tool is used for the data collection phase of the study. To ensure all potential instruments were considered, an analysis of research methodologies was conducted. This analysis included two additional instrumentation methods considered as part of this study: (a) interviews and (b) case study. Interviews were initially considered as a viable option of collecting data and likely would have provided a detailed assessment of the current opinion of select experts in the field. Interviews are inherently prone to bias influence (Aamodt, Brecher, & Kutcher, 2006). Also, it can be difficult to assure participants that their identity and responses are confidential (Salkind, 2018), resulting in omissions or slanted responses. Due to the variables affecting individual participant responses, and the difficulty of contacting many qualified participants in the allotted time, this alternative was rejected. A case study of radio frequency threats on aerospace systems was considered, however, this was rejected due to the sensitive nature of the subject matter. Detailing the process methodology of a realistic radio frequency attack in this study would have likely changed its classification. The description of a radio frequency attack on an aerospace system raises concerns when combined with potential interview data. This limited the possible methods of data collection for the case study. The selected structure and design of the survey instrument for data gathered to be applied to future research and to accurately represent views of the participants. 77 Reliability Reliability in research refers to how repeatable measurements are (Salkind, 2018). Reliability is essential to ensure that the data is dependable and consistent. Salkind (2018) states reliability means “individual scores from an instrument should be nearly the same or stable on repeated administrations of the instrument and that they should be free from sources of measurement error and consistent” (p. 627). To establish reliability, researchers must take steps to minimize random error. Random error can arise either when a respondent guesses a response based on ambiguous wording or directions, or when a respondent inadvertently selects and unintended choice. In such cases, responses do not accurately reflect a true value (Ruel et al., 2016). Survey questions for this study will be designed to ensure reliability, avoiding vague wording or uncommon terms, which risk misinterpretation. To ensure accuracy of responses, participants will be asked to quantify their opinion using a set selection of quantitative ratings. The selectable options were generating using the Likert Scale model (Robinson, 2014). Five selections will be offered to measure subject matter expert opinion on the survey questions. Each measurement will be followed with a brief description to reduce ambiguity. These measurements include: 1) None (no level of impact) 2) Low (some level of impact; barely noticeable) 3) Moderate (moderate level of impact; noticeable frequency or impact) 4) High (high level of impact; significant presence or impact to capabilities) 5) Severe (extremely high level of impact; presence is frequent or complete disables capabilities) 78 By reducing any ambiguity in survey questions and responses, participants are less likely to randomly guess, enhancing the probability that results are consistent and repeatable. Furthermore, validity and reliability share a close relationship; when results are not repeatable, or reliable, they are also not valid (Creswell & Guetterman, 2018, p. 261). While not all repeatable results have validity, reliability is certainly a contributing factor (Raul et al., 2016). Validity: Internal and External Validity can be internal or external. External validity indicates how well a population in a study applies to a wider population, outside the domain of the study but possessing similar characteristics (Creswell & Guetterman, 2018). Internal validity is the degree to which a survey design evaluates the relation of the independent and dependent variables (Chambliss and Schutt, 2013; Raul et al., 2016). To establish external validity, a study must first establish internal validity. Both internal and external validity can be threatened by many factors. (Patino & Ferreira, 2018). To ensure internal validity, researchers must examine the design, structure, and methodology of a study to ensure that there are no threats, such as errors in measurement or bias in the selection of participants, to mar findings of the study (Brewer & Crano, 2014; Raul et al., 2016). During the data analysis portion of this study, variables will be analyzed for any correlation using a proven method of variable correlation known as the Pearson product-moment correlation (Salkind, 2019). An in-depth investigation of the research design will ensure the data collection methodology and analysis is reliable and valid. Internal validity will be enhanced by survey questions informed by expertise gained during the literature review. During the literature review, emphasis was placed on analysis of common radio frequency attacks, cybersecurity methodologies, and existing aerospace 79 cybersecurity practices. The review of federal reports, standards, and frameworks facilitated the identification of the current knowledge gap and influenced wording of survey questions which will be used for data collection. This, combined with adherence to procedural accuracy regarding execution of the survey, suggests the study will have strong internal validity. External validity is the extent to which results of a study are generalizable to, and representative of, the wider population from which the sample was created (Salkind, 2018; Creswell & Poth, 2018). A lack of external validity implies the research cannot be adopted to the field (Creswell & Guetterman, 2018). In this study, external validity will be ensured by limiting the survey to professionals with relevant work experience. The survey questions administered to participants were general in nature and do not identify specific scenarios or systems; thus, external validity is reinforced by ensuring the questions are applicable to a wide scope of relevant conditions. However, external validity will be limited due to the use of nonprobability sampling, which was selected due to the nature of the survey questions and content. While nonprobability sampling does impact the generalizability of results to the external population, the accuracy of results increases with the sample size and quantity of participants (Raul et al., 2016). Raul et al. (2016) and Creswell and Guetterman (2018) state that question format can significantly impact both reliability and validity. Closed-ended questions are often very repeatable, increasing reliability of a survey. However, closed-ended questions limit the ability of respondents to describe an event, potentially reducing validity of results. As Gorvine et al. (2018) state, open-ended questions are often avoided because of the “potential problem of interpreting participant answers, difficulty in summarizing and quantifying responses across participants, and constraints open-ended responses place on potential statistical analyses” (p. 80 168). Open-ended questions will not be used for the collection or interpretation of data and did not influence correlational analysis. Pilot study A pilot study will be conducted among five individuals with appropriate professional experience in the aerospace communications field, chosen from the same pool of participants. Individuals included in the pilot study will meet the same qualifications as full participants. Consistency between the pilot study population and the final survey will ensure feedback provided from the pilot study participants is relevant to the subject matter (Ruel et al., 2016). Data gathered during the pilot study will be used to refine the questionnaire and ensure success of the research instrument but will not be tabulated in the findings. The preliminary analysis of survey responses will allow verification of accuracy and capability of the instrument. This process will reveal potential issues with the survey instrument that have the potential to impact survey results (Gorvine et al., 2018). A detailed description of the pilot study and how it will be conducted is provided in Chapter 4. Data Analysis A correlation coefficient is “a quantified summary of the linear relationship between two continuous variables” (Raul et al, 2016, p. 79). The Pearson Product-moment correlation will be used to measure relationships between variables to reveal correlations. The Pearson productmoment correlation can be calculated using the following formula: 𝑟𝑥𝑦 = 𝑛 ∑ 𝑋𝑌 − ∑ 𝑋 ∑ 𝑌 (3) √[𝑛 ∑ 𝑋 2 − (∑ 𝑋 2 )][𝑛 ∑ 𝑌 2 − (∑ 𝑌 2 )] Where 𝑟𝑥𝑦 = the correlation coefficient between X and Y; ∑ = the summation sign; n = the size of the sample, X = the value of the X variable; Y = the value of the Y variable; XY = the product of X and Y. 81 To interpret the Pearson product-moment correlation, an additional analysis will be performed: the coefficient of determination. The “coefficient of determination is the amount of the variation in the dependent variable that can be predictable from the independent variable” (Salkind, 2018). This allows for estimation of the “amount of variance that can be accounted for in one variable by examining the amount of variance in another variable” (Salkind, 2018, p. 169; Gorvine et al., 2018, p.357). The coefficient of determination can be calculated with the following equation: 𝐶𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡 𝑜𝑓 𝐷𝑒𝑡𝑒𝑟𝑚𝑖𝑛𝑎𝑡𝑖𝑜𝑛 = 𝑟𝑥𝑦 2 (4) Where r is the proportion of the variation which can be explained by the independent variable in relation to the dependent variable (Salkind, 2019). Through the measurement of variance between variables, the coefficient of alienation was also calculated. The coefficient of alienation, or non-determination, is used to determine the amount of variance in the dependent variable which is not explained by the independent variables (Salkind, 2019). The Coefficient of Alienation can be used to determine the potential error of measurements. The coefficient of alienation can be calculated using the following equation: 𝐶𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡 𝑜𝑓 𝐴𝑙𝑖𝑒𝑛𝑎𝑡𝑖𝑜𝑛 = 1 − 𝑟 2 (5) Chapter Summary This chapter presented the rationale for the chosen research design, population, and methodology after a discussion about each available approach. A discussion of issues surrounding bias, and internal and external validity followed, and how this study will ensure generalizable results, with minimal bias and high validity. Details of statistical measurements and analysis to be performed on the collected data was described. 82 A quantitative descriptive study will be used, and a cross-sectional survey will facilitate gathering data on radio frequency attack vectors targeting Aerospace systems from experts to address the research questions. Correlational data of variables from the survey answers will be used to identify trends or variances among responses. Among the survey population, the use of purposive sampling was used to identify participants based upon their background in the field of radio frequency communications. 83 CHAPTER 4: RESULTS The purpose of this study was to explore radio frequency attack vectors associated with aerospace communication systems, and whether the application of cybersecurity principals to mitigate them would be beneficial. To investigate this topic, response data from 133 aerospace industry experts with experience in aerospace communication systems was gathered. The data set included responses from experts in satellite communication, aviation, and support telecommunication. Potential respondents were identified through verified Facebook groups and LinkedIn members with relevant backgrounds. Chapter 4 begins with a detailed description of the structure of the pilot study. This chapter also presents the data collection process and provides a detailed analysis of the gathered survey results. The chapter concludes with a general summary of the findings observed from the correlational analysis. Surveys for participants meeting inclusion criteria were administered through SurveyMonkey, where data was gathered, stored, and organized. Once the data collection period was completed, results were exported and ingested into a Microsoft Excel workbook. Using the Excel Toolpak (Salkind, 2018), descriptive statistics were computed to produce correlational results. Excel was used to perform several calculations such as the Pearson Correlation Coefficient, coefficient of alienation, coefficient of determination, and Fisher’s r-to-z transformation. Graphical representations of data were generated using the IBM SPSS statistical data analysis software. Results were methodically analyzed using descriptive statistics to address the research questions of this study. Pilot Study 84 The researcher collected results from five aerospace industry professionals within the target population to test the survey instrument in the pilot study. Pilot study participants were asked to evaluate the survey for potential issues or areas needing improvement. This enabled refinement of the survey instrument, to improve focus of the survey questions to optimize completion rates, and ensure the survey will yields reliable results. Pilot Study Pilot studies increase the quality and validity of research instruments (Salkind, 2018; Creswell & Guetterman, 2018). Creswell & Guetterman (2018, pp. 399) stated that pilot studies “help determine individuals in the sample are capable of completing the survey and can understand the questions.” Adams & Lawrence (2019), and Ruel et al., (2016) both state that a well-organized pilot study enhance a study’s validity, reliability, and efficacy. They can also uncover significant or critical flaws in the research instrument itself, allowing researchers to mitigate issues prior to conducting the final study (Ruel et al., 2016). Pilot Study Procedures A pilot study collected preliminary data from five aerospace communication system industry experts. Upon completion of the pilot study, results were analyzed, and changes were made to the survey to reflect the concerns of pilot participants. Pilot study responses were excluded from final survey data (Creswell & Guetterman, 2018). The pilot study facilitated confirmation that the survey instrument, a web-based survey tool, was operational and coded appropriately. Throughout the pilot study, research conditions were as similar to actual data collection procedures as possible. Participants were not informed of the questions prior to execution, and no discussion of the content or features of the instrument occurred. Participants were asked to give independent and critical reviews any flaws found in the 85 research instrument. Pilot study group members were contacted directly and asked to participate. Specific measures were taken to ensure integrity of the survey environment was not compromised; respondents were introduced to the survey in the same way the survey population would be. Pilot Results Five pilot study requests were distributed to the survey participant pool. All five were returned with comments and feedback. The pilot study responses and feedback data are summarized in Table 4 below: 86 Table 4 Pilot Study Feedback Pilot Participant Number. Comments Duration 1 Survey questions utilized the phrase, “radio-frequency attack” but did not specify the difference between suspected or confirmed events. Clarification is needed for respondents to answer accurately. 3:59 2 Survey questions made sense and the research seemed valuable. There were a few misleading phrases/typos in the introduction of the survey referencing satellite control. 5:11 3 Survey questions were clear and concise. The introduction portion of the research was very lengthy, it took almost as long to read the introduction/waiver as it did to complete the survey. 4:22 4 Survey questions were clear and concise, it was appreciated that the survey was short. More questions would likely result in fewer responses. It was noticed that the screening question, which asked participants to agree to the introduction/waiver, did not correctly reject participants who answered, “No.” 2:54 5 Slightly concerned regarding the sensitivity of the subject data and likelihood that potential participants would be reluctant to participate due to national security concerns. Highly recommend using LinkedIn as well as the Facebook group due to increased pool of participant backgrounds. 3:43 Note. This table shows feedback from pilot study participants with the corresponding time for survey completion duration. The pilot study identified three flaws requiring correction to finalize the survey. First, the introduction to the survey had several ambiguous phrases that could potentially mislead participants with a satellite background. The specific phrasing issues identified were adjusted to 87 provide clarity and remediate any confusion. The pilot study introduction erroneously referred to satellite command and control as satellite command, which was unfamiliar terminology to a respondent. The introduction section was updated to reflect the correct terminology, “Satellite Command and Control.” Second, for questions relating to the CIA triad, additional description was needed to clarify that term “attack” in the survey refers to both suspected and confirmed radio frequency attacks. The survey questionnaire was updated to include “both suspected and confirmed attacks” wherever the phrase, “radio frequency attack” was mentioned. The pilot study respondent confirmed the change was effective. One pilot study participant attempted to test to see if the survey was viewable using the SurveyMonkey mobile application, where it was found that some of the introduction page text was being truncated, This error resulted in the participant being unable to acknowledge the waiver. The last issue found was remediated by splitting the introduction page into two separate pages, allowing for all the text to be viewable in the mobile application. Previously, the entirety of the introduction was in the first page and the acknowledgement question was asked after selecting a next page dialogue box. By splitting the introduction and waiver text into two pages, the respondent was then able to complete the survey successfully. Last, one pilot study participant noted the possibility that it may be difficult to locate participants using only Facebook, and highly recommended increasing the participant sample sources to include LinkedIn. The cause of this recommendation was rooted the nature of the research questions and the demographics of the SATCOM Facebook group being primarily military. Increasing the social media platform options to LinkedIn also allowed for more visibility by aerospace communication experts outside of the satellite communications field. 88 It should be noted that while a pilot study is very useful for revealing potential issues that may arise during the research process, it is impossible to predict all variables which may influence the outcome of a full survey. Pilot studies cannot predict response rates from the final survey. Raul et al. (2016) state that, “Even if a study has been vetted by a well-designed and successfully executed pilot study, the full-scale study may still suffer from extremely low response rates” (p. 116). Therefore, given the known constraints, the pilot study was conducted without any assumptions as to final survey participation. Survey Development The survey instrument was uploaded into the SurveyMonkey platform. A standard SurveyMonkey subscription was sufficient to support the survey as detailed in Chapter 3. SurveyMonkey includes several features in their toolset to assure Human Subject Research is conducted in accordance with university and IRB practices. Examples of these features include an informed consent page, ability to record the time of acceptance of the informed consent page, and ability to opt out at the end of a survey. Informed Consent Upon opening the survey instrument, participants were presented with an Informed Consent form. The form comprised seven sections offering highlights of the research topic, contact information of this research, details of supporting organization, Capitol Technology University, format of the survey, screening for protected populations, information regarding reward or benefits, and information detailing anonymity practices regarding management of study data. Upon reading the Informed Consent form, participants were asked to select “next” to advance to the next page. 89 The second page of the Informed Consent section included details of any risks and benefits of participating in the study. Participants were provided guidance to back out or cease participation if any noticeable sensitivity to the data collection tool was experienced. Participants were also informed that there would be no financial or significant personal benefits from participating in the survey. A link to SurveyMonkey’s privacy policy was included at the end of the Risk and Benefits of Participating section. Upon reviewing the introduction explaining the purpose, use, and privacy protections involved in the survey design, participants were required to respond “yes” or “no” to a confirmation question. Should participants answer no, they were omitted from the survey and sent to a thank you page. If the participants responded with yes, they were sent to the next page containing the eleven survey questions. Survey Questions All eleven of the survey questions were displayed on the same page, allowing for participants to easily view the length of and progress completing the survey. This was intentional, as it is typical for a significant percentage of survey participants to not complete a survey which requires significant investment (Kost & Rosa, 2018). Advancing through multiple pages requires additional selections and time spent awaiting questions to load. Presenting all information on one-page enabled participants to navigate and complete the survey without unnecessary selections to advance through survey pages. The participation agreement asked respondents to confirm their participation in the survey was voluntary, with no expectation of reward or payment. Four demographic questions followed the participation agreement. The first question asked participants if they were at least 18 years of age. The second demographic question asked 90 participants to verify whether they had experience working with aerospace communication systems that utilized radio frequency technology. During the analysis phase of this study, any participant who answered this question with “No” was removed from the data pool. The third demographic question asked participants to select how many years of experience they had working with aerospace communication systems. There were five possible answers which included no experience, 0-5 years, 6-10 years, 10-15 years, and 15 or more years. Participants who answered this question with the no experience selection were not included in the final data pool for the sample. This demographic question was used later used to correlate answers with industry and years of experience to determine if there were any relevant trends in responses. Following the demographic questions, subsequent questions sought to collect the concrete data needed for analysis. For these questions, a Likert scale was offered to participants to choose among: None (no level of impact), Low (some level of impact; some capabilities are degraded), Moderate (moderate level of impact; noticeable degradation of capabilities of a system), High (high level of impact; significant impact to the capabilities of a system), and Severe (extremely high level of impact; capabilities of a system are no longer possible to maintain). Specific questions are discussed below. Question seven asked participants to evaluate the level of impact radio frequency attacks (suspected or confirmed) have on the availability of aerospace communication systems. Participants were provided a supplemental introductory paragraph to this question defining the terms “impact” and “availability.” Question eight asked participants to identify the level of impact of radio frequency attacks (suspected or confirmed) on the integrity of aerospace communication systems. Participants were again provided a supplemental introductory paragraph to this question defining the terms “impact” and “integrity.” 91 Question nine asked participants to evaluate the level of impact radio frequency attacks (suspected or confirmed) have on the confidentiality of aerospace communication systems. Participants were again provided a supplemental introductory paragraph to this question defining the terms “impact” and “confidentiality.” Question 10 asked participants to estimate the frequency of suspected or confirmed radio frequency attacks on aerospace communication systems. Participants were provided a supplemental sentence defining “frequency” in the context of the question. The Likert scale selections offered for question 10 were: None (incidents have never occurred), Rare (incidents are unlikely to occur), Uncommon (incidents are expected to occur), and Common (incidents will almost always occur). Question 11 asked participants to evaluate current United States government resources and guidance regarding the protection of aerospace communication systems from radio frequency threats, and if they felt prepared to respond to an event. Likert scale responses for this question allowed participants to select between Unsure (no knowledge of relevant resources and guidance), none (there are no resources or guidance which I can use to respond to an event; I am unsure if I am able to respond to an event), good (there is a significant amount of resources and guidance which I can use to respond to an event; I am somewhat prepared to respond to an event), and very good (there is an adequate amount of resources and guidance; I am very prepared to respond to an event). Data Collection This study was designed to garner information from aerospace communication system professionals, the target population. To reach experts in the field, social media sites Facebook and LinkedIn were both used to identify and invite the target population to participate. The primary group targeted was the US Military SATCOM group page on Facebook, which had 92 8,119 members at the time of the study (Facebook, n.d.). The administrative team of the page approved the concept and allowed the researcher to promote on their announcement page and identify prospective respondents on page. Early in the data collection phase it was revealed that the group’s Facebook’s announcement page is not readily visible to members due to which prevented the distribution of the survey to the group. Making it unlikely the membership would be aware of the survey. It was therefore necessary to directly message individuals to provide prospective participants the link to the survey instrument. It was also revealed during this phase that Facebook implements a throttle after a user account contacts 50 individuals. Once the throttle has been activated, it takes approximately 24 hours before the Facebook account can resume using the messenger feature. The throttle heavily impacted this researcher’s ability to collect responses, with the result that only 50 messages per day could be sent, necessitating a two-week timespan of data collection on Facebook. However, this survey was not time-dependent, and therefore the extended data collection period did not impact the results of this study. Facebook direct messages to non-friends are directed to a secondary, less-accessible inbox, reducing the number of prospective respondents who would see the invitation to participate. LinkedIn was also used to identify and validate prospective participants. The researcher targeted the Satellite Group (Satellite Group, n.d.) which is comprised of aerospace communication professionals involved in the area of satellite communications. This researcher reviewed 4,550 accounts in the Satellite group in search of potential participants. LinkedIn organizes group membership starting with the most recently added member and lists members until the oldest continuous member has been reached. Prospects were reviewed on an individual 93 basis and requests for participation were only sent to those with a documented aerospace communication system background. Participation requests were sent individually to 689 members based upon the experience detailed in their profile. LinkedIn allows members of the same group to directly message each other. However, this message is often filtered out due to individual user security settings, resulting in prospective participants not seeing the message. LinkedIn also throttled attempts to collect data through messaging users directly. While LinkedIn’s security protocols are not available publicly, it was found that after approximately 150 direct messages, the site forced a logout of the platform before resuming activity. In addition, a message acknowledged unusual network activity and warned continued excessive messaging could result in a temporary ban. Despite use of a premium LinkedIn account, data collection attempts were throttled. To skirt these controls, approximately 100 messages were sent daily over a ten-day timespan. This survey was not time-dependent and therefore the extended data collection period did not impact the results of this study. Respondent profiles were reviewed on an individual basis and only responses from those with a documented background in the industry were included. A total of 155 survey responses was collected in the survey data sample. Of the 155 total survey responses, 133 were complete in accordance with the survey design and were used during data analysis. The remaining 22 incomplete responses were discarded. Upon the conclusion of the data collection phase, the total number of individuals to whom the survey was distributed was 1,439. Several participants refused to participate due to concerns of sensitivity issues in their work surrounding aerospace communication systems. Several respondents requested access to this dissertation and its results upon completion. 94 As discussed in Chapter 3, with the intended population of 8,109, a confidence level of 95%, and a margin of error of 6%, a sample of 259 participants would be required. Due to limitations of resources and time, the survey was terminated upon reaching a sample of 133 complete responses with a total population of 1,439 participants. Using the sample same size formula consistent with what was used in Chapter 3, this resulted in an updated confidence interval of 8% versus the intended 6% at a confidence level of 95%. Findings Assumptions Impact on Data Collection In Chapter 3, five assumptions were identified due to the nature and context of the study. These assumptions were made to document topics which had the potential to impact the outcome of the study based on the nature and design of the research topic (Salkind, 2018). Assumptions have the potential to insert bias and influence a study (Salkind, 2018). Therefore, it is essential to recognize researcher or participant bias, assumptions, or beliefs (Corbin & Strauss, 2015). The five assumptions identified in Chapter 1 were: 1) The research will assume that participants of the survey answer the survey in good faith – without intent to answer questions incorrectly or to negatively influence results. 2) The study assumes the researcher can acquire an adequate number of responses to the survey to form a conclusive analysis. 3) The research assumes data, publications and communication provided by the White House, GAO, DHS, FCC, and related federal authorities are an accurate depiction of U.S. policy and are accurate and trustworthy. 4) Given the sensitive nature of the topic, it was expected that there would be limitations on what information is publicly available. 95 5) The final assumption is that the subjects who complete the survey have prior experience in the aerospace communications field. While assumptions one and three may have not had an impact on the results of the survey, assumptions two and five both impacted the ability to gather data in large samples sizes. The second assumption assumed that the researcher would be able to acquire an adequate number of responses to form a conclusive analysis. This assumption was proven true due to the difficulty in gathering survey responses via social media platforms, which restricted the ability of this research to disseminate the survey. Through the use of LinkedIn, assumption four limited qualified applicants as it was difficult to identify qualified candidates. As mentioned in the data collection section. due to limitations of resources and time, the survey was terminated upon reaching 133 complete responses with a total sample size of 1,439 participants. Using the sample same size formula consistent with what was used in Chapter 3, this resulted in an updated confidence interval of 8% versus the intended 6%. Surveys are most effective when many respondents participate (Ruel et al., 2016). While all available methods of collecting data from potential survey participants were exhausted, social media platform algorithms impacted the ability to distribute the survey to a large quantity of participants which could be included in the sample frame. Due to a lack of publicly available information, factoring in these limitations by Facebook and LinkedIn was not foreseeable prior to conducting the survey. The fifth assumption was that group members, and therefore respondents completing the survey, would have prior experience in the aerospace communications field. Individuals without experience in the aerospace communication field were asked to cease participation in the research study during the introduction material and survey. This exclusion limited the number of 96 potential respondents more significantly than foreseen. An unexpectedly large number of members in the social media groups did not complete the survey distributed to them, citing that they did not have recent experience in the field. This impacted the data collection and resulted in additional effort to replace them with qualified respondents. Quantitative Results In Chapter 3, the research method presented the structure of the research study to the Institutional Review Board (IRB) in order to obtain approval and begin the study. The results presented in this section reflect measurements taken in accordance with the approved research method. As defined in Chapter 3, survey participants were asked a sequence of closed-ended questions, the results of which were analyzed for correlative indications. Several questions used a Likert scale to garner data using a quantifiable scale which could then be cross-correlated to other survey responses. Following the Quantitative Results section, this chapter will discuss the correlative process in the Correlative Analysis and Correlative Results section. The data presented in this section will be referenced in the subsequent sections of this Chapter. Correlative findings based upon the data presented in this section will be used to develop findings and recommendations presented in Chapter 5. 97 Participant Years of Experience. Figure 6. Participant Years of Experience Demographic breakdown provides a graphical representation of the sample experience using data gathered from the survey. This figure groups the 133 participants by their years of experience. The survey asked respondents to select their range of years of experience working with aerospace communication systems. The purpose of this question was to provide a dependent variable to be used to identify trends or correlations with other variables. This question was presented as: “How many years of experience do you have working with aerospace communication systems?” Only responses from participants who answered all questions were included. Responses to the years of experience question were evenly distributed. Out of the 133 respondents, 9% indicated that they had between 0 and 5 years of experience, 29% indicated that 98 they had between 5 and 10 years of experience, 21% indicated that they had between 10 and 15 years of experience, and 41% indicated that they had more than 15 years of experience. 38% of participants had between 0 and 10 years of experience, while 62% of participants had more than ten years of experience. Participant Industry Background. Figure 7. Participant industry of experience domain breakdown provides a graphical representation of the sample. This figure groups the 133 participants by the industry which best describes their experience in the workplace. The survey asked respondents to select the primary industry in which they gained their experience. Aerospace communication systems may encompass domains such as satellite communications, line of sight, aviation communications, and understanding the may yield deviations. This question was presented as: “Please select the type of aerospace communication 99 system you have experience with. If you have experience with multiple types of aerospace communication systems, select the answer which corresponds with your greatest amount of experience (in years).” Respondents who did not answer all questions were excluded from the survey results. Responses to the participant industry background question distributed throughout among potential responses. Out of the 133 respondents, 71 (53%) indicated that they worked in the Satellite Communications/Control field, 3 (2%) indicated that they worked in the Unmanned Aerial Vehicles field, 10 (8%) indicated that they worked in the Line-of-Sight Communications field, 23 (17%) indicated that they worked in the Aviation Communications field, and 3 (2%) indicated that they worked in a field not described by the answer options. Figure 8. Years of experience Versus Impact to Availability. This bar graph displays a graphical representation of the sample using data gathered from the survey. This figure displays the impact 100 of radio frequency attacks on the Availability of Aerospace Communication Systems aligned with the 133 participants years of experience. Respondents were asked to choose which range most accurately describes the impact level of radio frequency attacks on the Availability of a system. This question was presented as: “What level of impact do radio frequency attacks (suspected or confirmed) have regarding the availability of aerospace communication systems? For this question, “Impact” is defined as a degradation in the capabilities of the aerospace communication system. “Availability” is defined as the reliability of access to data communicating to/from the aerospace communication system.” Participants who did not correctly respond to all questions were excluded from the survey results. Responses to this question provide insight into the impacts of radio frequency attacks on the availability of Aerospace Communication Systems. 29 of the 133 (22%) indicated that radio frequency attacks have a Severe impact to system availability. 42 of the 133 participants (23%) indicated that radio frequency attacks have a High impact to system availability. 27 of the 133 participants (20%) indicated that radio frequency attacks have a Moderate impact to system availability. 25 of the 133 participants (19%), indicated that radio frequency attacks have a Low impact to system availability. One respondent (1%) indicated that radio frequency attacks have no impact to system availability. 101 Years of Experience Versus Impact to System Integrity. Figure 9. Years of Experience Versus Impact to System Integrity. This bar graph displays a graphical representation of the sample using data gathered from the survey. This figure displays the responses addressing the impact of radio frequency attacks on the Integrity of Aerospace Communication Systems aligned with the 133 participants years of experience. The survey asked respondents to the choose the range most accurately describing the impact level of radio frequency attacks on Integrity of a system. This question was presented as: “What level of impact do radio frequency attacks (suspected or confirmed) have regarding the integrity of data on aerospace communication systems? For this question, “Impact” is defined as a degradation in the capabilities of the aerospace communication system. “Integrity” is defined as the consistency and accuracy of data communicating to/from the aerospace communication 102 system.” Responses from individuals who did not answer all questions were excluded from survey results. Responses to this question provide insight into impacts of radio frequency attacks on integrity of Aerospace Communication Systems. 7 of the 133 surveyed participants (5%) indicate that radio frequency attacks have a Severe impact to system integrity. 30 of the 133 participants (23%) indicate that radio frequency attacks have a High impact to system integrity. 41 of 133 participants (31%) indicate radio frequency attacks have a Moderate impact to system integrity. 43 of the 133 participants (32%) indicate radio frequency attacks have a Low impact to system integrity. 12 respondents (9%) indicate that radio frequency attacks have no impact to system integrity. Figure 10. Years of Experience Versus Impact to Confidentiality. This bar graph displays a graphical representation of the sample using data gathered from the survey. This figure displays 103 the responses addressing the impact of radio frequency attacks on the Confidentiality of data in Aerospace Communication Systems aligned with the 133 participants’ years of experience. Respondents were asked which range most accurately describes the impact level of radio frequency attacks on the Confidentiality of a system. This question was presented as: “What level of impact do radio frequency attacks (suspected or confirmed) have regarding the confidentiality of data on aerospace communication systems? For this question, “Impact” is defined as a degradation in the capabilities of the aerospace communication system. “Confidentiality” is defined as the assurance that data being communicated is only accessible by authorized parties.” Responses to this question provide insight into the Confidentiality of system data from radio frequency attacks on Aerospace Communication Systems. 4 of 133 (3%), indicated that radio frequency attacks have a Severe impact to system confidentiality. 15 of 133 (11%) participants indicated that radio frequency attacks have a High impact to system availability. 26 of the 133 (20%) indicate that radio frequency attacks have a Moderate impact to system confidentiality. 49 of the 133 (39%) indicated that radio frequency attacks have a Low impact to system confidentiality. 28 respondents (19%) indicated that radio frequency attacks have no impact to system confidentiality. 104 Figure 11. Years of Experience Versus Frequency of RF Attack. This bar graph displays a graphical representation of the sample using data gathered from the survey. This figure displays responses addressing the frequency of radio frequency attacks on Aerospace Communication Systems aligned with the 133 participants’ years of experience. Respondents were asked to select the range which most accurately describes the frequency of radio frequency attacks on aerospace communication systems. This question was presented as: Regarding Aerospace systems, what is the frequency of suspected or confirmed radio frequency attacks on aerospace communication systems? For this question, “Frequency” is defined as the rate of occurrence that a particular event will take place.” Responses to this question provide insight into the frequency of radio frequency attacks on Aerospace Communication Systems. 4 of the 133 (3%) indicated that radio frequency attacks were best described as common, or extremely likely. 34 of the 133 (26%), indicated that radio 105 frequency attacks are uncommon or expected to occur. 62 of 133 (47%) indicated that radio frequency attacks are rare, or unlikely to occur. 32 of the 133 (24%) indicated that radio frequency attacks have a Low impact to system confidentiality. 5 respondents (4%) indicated that radio frequency attacks never occur. Figure 12. Years of Experience Versus Opinion of Government Resources. This bar graph displays a graphical representation of the sample using data gathered from the survey. This figure displays the responses addressing the frequency of radio frequency attacks on Aerospace Communication Systems aligned with the 133 participants’ years of experience. Respondents were asked which range most accurately describes the quality of current United States government resources and guidance available to protect aerospace systems from radio frequency attacks. This question was presented as: “In your opinion, how would you rate current United States government resources and guidance regarding the protection of aerospace 106 communication systems from radio frequency threats?” Responses from participants who did not complete the entire survey were excluded from results. Participant opinion regarding the available government guidance and resources varied among survey responses. Figure 12 displays survey response by years of experience. 13 respondents (10%) were unsure what documentation exists for radio frequency attack response, 10 respondents (8%) indicated that there are no available resources, 55 participants (41%) responded that there are with either inadequate or no resources, 48 participants (36%) responded that there were adequate or a good number of resources available, and 7 participants (5%) of responded that there were very good resources available. Correlative Analysis The correlational analysis of data involved four calculations. The calculations included the Pearson Product-Moment correlation coefficient, the coefficient of alienation, the coefficient of determination, and Fisher’s R-to-Z transformation. Throughout the following sections, Table 5 ties question number to question narrative. 107 Table 5 Survey Question Number and Narrative Mapping Question Number 1 2 3 4 5 6 7 Question Narrative How many years of experience do you have working with aerospace communication systems? Please select the type of aerospace communication system you have experience with. If you have experience with multiple types of aerospace communication systems, select the answer which corresponds with your greatest amount of experience (in years). What level of impact do radio frequency attacks have regarding the availability of aerospace communication systems? What level of impact do radio frequency attacks have regarding the integrity of data on aerospace communication systems? What level of impact do radio frequency attacks have regarding the confidentiality of data on aerospace communication systems? Regarding Aerospace systems, what is the frequency of radio frequency attacks on aerospace communication systems? In your opinion, how would you rate current United States government resources and guidance regarding the protection of aerospace communication systems from radio frequency threats? Note. This table provides a traceability matrix between the survey question number and the corresponding narrative. The survey questions were used to measure variables for analysis to reveal correlative trends. The mapping of questions to variables is identified in the table 6 below. 108 Table 6 Survey Question Number and Variable Measured Mapping Question Number Variable Measured Participant number of years of experience working with aerospace systems Participant domain of aerospace communication systems (e.g., SATCOM, LOS) 1 2 Participant view of impact of radio frequency attacks on confidentiality of an aerospace communication system Participant view of impact of radio frequency attacks on data integrity of an aerospace communication system Participant view of impact of radio frequency attacks on availability of an aerospace communication system Participant view of frequency of RF attacks on Aerospace communication systems Participant views on adequacy/effectiveness of current policy and guidance regarding Radio Frequency attacks on aerospace communication systems. 3 4 5 6 7 Note. This table provides a mapping of survey question number to the corresponding variable used to address the research questions. Pearson Product-Moment Correlation Coefficient. As identified in Chapter 3, the Pearson product-moment correlation was used to analyze the data gathered using the following formula: 𝒓𝒙𝒚 = 𝑛 ∑ 𝑋𝑌 − ∑ 𝑋 ∑ 𝑌 (4) √[𝑛 ∑ 𝑋 2 − (∑ 𝑋 2 )][𝑛 ∑ 𝑌 2 − (∑ 𝑌 2 )] Where 𝑟𝑥𝑦 = the correlation coefficient between X and Y; ∑ = the summation sign; n = the size of the sample, X = the value of the X variable; Y = the value of the Y variable; XY = the product of X and Y. 109 Correlations of the Pearson Product-Moment correlation coefficient formula range in value from -1 through +1. A positive correlation indicates there is a correlation between two variables, while a negative correlation indicates that there is an inverse relationship between the two variables. Schober, Boer, and Schwarte (2018) provide a conventional approach to interpret correlation coefficients their article, Correlation Coefficients: Appropriate Use and Interpretation. In the table below, possible values of the Pearson Product-Moment calculation are displayed with the interpretation of the value: Table 7 Pearson Product-Moment Correlation Coefficient Descriptive Interpretation Pearson Product-Moment Correlation Coefficient Interpretation 0.00-0.20 Negligible Correlation 0.20-0.39 Weak Correlation 0.4-0.69 Moderate Correlation 0.7-0.89 Strong Correlation 0.9-1.0 Very Strong Correlation Note. This table provides interpretations for the Pearson Product-Moment Correlation Coefficient measurements. The interpretations in Table 8 above provide a categorization to aid in identifying which results are most significant. Schober et al. (2018) acknowledge the difficulty in grouping coefficients using qualitative interpretations by noting that it is capricious to label data measured with a correlation coefficient of 0.19 as weak, while a coefficient of 0.2 would be moderate. The Pearson Product-Moment correlation coefficient measurements from the survey data are displayed in Table 9 below. 110 Table 8 Pearson Product-Moment Correlation Coefficient Measurements Question1 Question2 Question3 Question4 Question5 Question1 Pearson Question6 Question7 .004 .171* .061 .051 .132 -.092 .962 .049 .485 .563 .130 .294 133 133 133 133 133 133 133 .004 1 .206* -.165 .001 .158 -.140 .017 .058 .987 .069 .109 133 133 133 133 133 1 .387** .389** .297** .057 .000 .000 .001 .517 133 133 133 133 1 .565** .122 .155 .000 .161 .075 1 Correlation Sig. (2-tailed) N Question2 Pearson Correlation Sig. (2-tailed) .962 N 133 133 .171* .206* Sig. (2-tailed) .049 .017 N 133 133 133 .061 -.165 .387** Sig. (2-tailed) .485 .058 .000 N 133 133 133 133 133 133 133 .051 .001 .389** .565** 1 .114 .053 Sig. (2-tailed) .563 .987 .000 .000 .191 .544 N 133 133 133 133 133 133 133 .132 .158 .297** .122 .114 1 .015 Sig. (2-tailed) .130 .069 .001 .161 .191 N 133 133 133 133 133 133 133 -.092 -.140 .057 .155 .053 .015 1 Sig. (2-tailed) .294 .109 .517 .075 .544 .867 N 133 133 133 133 133 133 Question3 Pearson Correlation Question4 Pearson Correlation Question5 Pearson Correlation Question6 Pearson Correlation Question7 Pearson .867 Correlation Note. This table displays the resulting Pearson Product-Moment Correlation Coefficients in a matrix format. Correlation is significant at the 0.05 level (2-tailed), noted with an asterisk. Correlation is significant at the 0.01 level (2 tailed), annotated by two asterisks. 133 111 Table 9 Pearson Product-Moment Calculation Confidence Interval 90% Confidence Intervals (2tailed)a Pearson Correlation Sig. (2-tailed) Lower Upper Question1 – Question2 .004 .962 -.139 .147 Question1 – Question3 .171 .049 .029 .307 Question1 – Question4 .061 .485 -.083 .203 Question1 – Question5 .051 .563 -.093 .193 Question1 – Question6 .132 .130 -.011 .270 Question1 – Question7 -.092 .294 -.232 .052 Question2 – Question3 .206 .017 .065 .340 Question2 – Question4 -.165 .058 -.301 -.022 Question2 – Question5 .001 .987 -.142 .145 Question2 – Question6 .158 .069 .015 .295 Question2 – Question7 -.140 .109 -.277 .004 Question3 – Question4 .387 .000 .258 .502 Question3 – Question5 .389 .000 .260 .504 Question3 – Question6 .297 .001 .161 .423 Question3 – Question7 .057 .517 -.087 .198 Question4 – Question5 .565 .000 .459 .655 Question4 – Question6 .122 .161 -.021 .261 Question4 – Question7 .155 .075 .012 .292 Question5 – Question6 .114 .191 -.030 .253 Question5 – Question7 .053 .544 -.091 .195 Question6 – Question7 .015 .867 -.129 .158 Note. This table displays correlation coefficients calculated using the Pearson Product-Moment correlation coefficient formula results when compared to the confidence interval of 90% upper and lower bounds. Fisher’s R-to-Z Transformation. Fisher’s R-to-Z Transformation was applied to the results of the Pearson Correlation Coefficient table to normalize the results of bivariate samples (Salkind, 2007). Fisher’s R-to-Z transformation converts skewed sampling distribution, 112 represented by Pearson’s R, of the correlation coefficient into a normal distribution, represented by Z. Fisher’s transformation was performed to verify results due to the relatively small sample size (Salkind, 2007). The Fisher’s R-to-Z transformation was calculated using results from the Pearson Product-Moment Correlation Coefficient results described in this section to yield confidence intervals of the collected data (Salkind, 2007). Fisher’s r-to-z calculation was utilized to calculate the confidence intervals for r and the delta between the bivariate correlations. The formula is utilized to calculate the significance of the difference between the bivariate correlation coefficients from independent samples. If r1s a greater value than r2, the resulting z product will be positive; If r1 is a smaller value than r2, the resulting z product is negative (Salkind, 2007). The Fisher’s R-To-Z transformation is depicted below: z’ = .5[ln(1 + r) – ln(1 − r)] (5) Where ln is the natural log; z is the Fisher Z score; r is Pearson’s r derived from the Pearson Product-Moment Correlation Coefficient formula (Salkind, 2007). 113 Table 10 Fisher’s R-to-Z Transformation Results Pearson Correlation Fisher’s Z Result Question1 – Question2 .004 .004 Question1 – Question3 .171 .173 Question1 – Question4 .061 .061 Question1 – Question5 .051 0.51 Question1 – Question6 .132 .133 Question1 – Question7 -.092 -.092 Question2 – Question3 .206 .209 Question2 – Question4 -.165 -.167 Question2 – Question5 .001 .001 Question2 – Question6 .158 .159 Question2 – Question7 -.140 -.141 Question3 – Question4 .387 .408 Question3 – Question5 .389 .411 Question3 – Question6 .297 .306 Question3 – Question7 .057 .057 Question4 – Question5 .565 .64 Question4 – Question6 .122 .123 Question4 – Question7 .155 .156 Question5 – Question6 .114 .114 Question5 – Question7 .053 .053 Question6 – Question7 .015 .015 Note. This table displays correlation coefficients calculated using the Pearson Product-Moment correlation coefficient formula results when applied to the Fisher’s R-to-Z transformation. Coefficient of Determination. The Coefficient of Determination table was calculated using results from the Product-Moment Correlation Coefficient results detailed in the previous section. The results of the Coefficient of Determination analysis are displayed in Table 11 below. The Coefficient of Determination “explains the amount of variance accounted for in the 114 relationship between two or more variables” (Salkind, 2018). Using this variable, the amount of change in the independent variable of a correlation may be explained by the change in the correlated value (Salkind, 2018). Table 11 Coefficient of Determination Results Question 1 Question 1 Question 2 Question 3 Question 4 Question 5 Question 6 Question 7 Question 2 Question 3 Question 4 Question 5 Question 6 Question 7 N/A 2.29044E-05 N/A 0.029179427 0.035618184 N/A 0.003572499 0.034548684 0.15017649 0.00256543 N/A 1.99367E-06 0.153825168 0.318971017 N/A 0.017131958 0.017459466 0.095729983 0.018544564 0.014398252 N/A 0.008409751 0.023407066 0.003427731 0.028006777 0.002695998 0.000523579 Note. This table displays the calculated Coefficient of Determination reflecting the results of the survey. Estimation is based on Fisher’s r-to-z transformation. Coefficient of Alienation. The Coefficient of Alienation table was calculated using the results from the Product-Moment Correlation Coefficient results detailed in the previous section. The Coefficient of Alienation is used to describe the amount of unexplained variance in a bivariate correlation coefficient (Salkind, 2018). The results of the Coefficient of Alienation analysis are displayed in Table 12 below. N/A 115 Table 12 Coefficient of Alienation Results Question 1 Question 2 Question 3 Question 1 N/A Question 2 0.999977096 Question 3 0.970820573 0.964381816 N/A Question 4 0.996427501 0.965451316 0.84982351 Question 5 Question 4 Question 5 Question 6 Question 7 N/A N/A 0.99743457 0.999998006 0.846174832 0.681028983 N/A Question 6 0.982868042 0.982540534 0.904270017 0.981455436 0.985601748 N/A Question 7 0.991590249 0.976592934 0.996572269 0.971993223 0.997304002 0.999476421 Note. This table displays the calculated Coefficient of Alienation reflecting the results of the survey. Estimation is based on Fisher’s r-to-z transformation. Correlative Results Years of Experience Correlated to Impact on CIA. The correlative results shown in Table 10, Pearson Product-Moment Calculation Confidence Interval, reveals a slight correlation between years of experience and response to questions regarding the impact on CIA of radio frequency attacks on aerospace communication systems. This can be seen with the key results in Table 13 below: N/A 116 Table 13 Correlative Analysis: Years of Experience/CIA Impact Pearson Product Correlation Variable X Question 1 Pearson Product Correlation Variable Y Question 3 Pearson Correlation Question 1 Question 4 .061 Question 1 Question 5 .051 .171 Note. This table displays correlation between years of experience by industry professionals and the CIA triad model. The greater the positive correlation coefficient, the stronger the correlation between two answers. In this case, Questions 1 and 3 reflect weak positive correlation between years of experience and radio frequency attack impact on the Availability of aerospace communication systems, representing that those with more experience are more likely to say that radio frequency attacks have an impact on System Availability. Questions 1 and 4 reflect an insignificant correlation between years of experience and radio frequency attacks on the Integrity of system Data. Questions 1 and 5 reflect an insignificant correlation between years of experience and radio frequency attacks on the Confidentiality of system data. Denial-of-Service attacks include RF attacks which jam signals, impacting availability of systems. As reviewed in Chapter 2, jamming is one of the greatest threats facing Aerospace communication systems. The correlative data displayed in Table 13 above corresponds with this threat vector. The results show that respondents view the availability of aerospace communication systems as being impacted most by radio frequency attack vectors. 117 Years of Experience Correlated to Frequency of RF Attacks on Aerospace Systems. The correlative results shown in Table 10, Pearson Product-Moment Calculation Confidence Interval, identified a weak positive correlation between years of experience and the frequency of suspected radio frequency on aerospace communication systems. This can be seen in the Pearson Product-Moment Correlation Coefficient breakdown below: Table 14 Correlative Analysis: Years of Experience/Frequency of RF Attack Pearson Product Correlation Variable X Question 1 Pearson Product Correlation Variable Y Question 6 Pearson Correlation .132 Note. This table displays the Pearson Product-Moment correlation coefficients between experience of industry professionals and frequency of radio frequency attacks on Aerospace communication systems. As with the previous results, the greater the positive coefficient, the stronger the correlation between the two answers. In this case, the frequency of RF attacks is deemed greater among aerospace professions with significant experience in the field. Senior members of the aerospace communication system community recognize that RF attacks occur on a frequent basis. Figure 11 displays a graphical representation of the data. Interestingly, the number of aerospace communication professions who selected radio frequency attacks “never” affect aerospace systems was very low, with only 5 individuals stating that radio frequency attacks on aerospace systems do not occur. Responses indicating no occurrence of radio frequency incidents were distributed equally across experience groups. 118 During the literature review, it was revealed that CISA (2017) recognizes cybersecurity attacks are decreasing in complexity and increasing in frequency. Concerningly, CISA (2017) identified in the same report that the telecommunication industry, including aerospace communications as vulnerable critical infrastructure. The correlative results of this study show that radio frequency attacks are occurring, and those with more experience believe they occur more frequently that their less-experienced counterparts. Correlation of CIA Responses. The correlative results shown in Table 10, Pearson Product-Moment Calculation Confidence Interval, identified a positive correlation between the CIA triad pillars and respondent perception of the impact of radio frequency attacks on them. This can be seen in the Pearson Product-Moment correlation coefficient breakdown below: Table 15 Correlative Analysis: Correlation of CIA Model Pearson Product Correlation Variable X Question 3 Pearson Product Correlation Variable Y Question 4 Pearson Correlation Question 3 Question 5 .389 Question 4 Question 5 .565 .387 Note. This table displays the Pearson Product-Moment correlation coefficients results between level of correlation between the CIA model and the frequency of radio frequency attacks on radio frequency attacks. As in previous results, the greater the positive coefficient, the stronger the correlation between the two responses. Regarding table 15, questions 3 and 4 correlate participant responses 119 on the impact of radio-frequency attacks on availability of aerospace communication systems to the impact of radio-frequency attacks on the integrity of data on aerospace communication systems. Questions 3 and 5 correlate participant responses on impact of radio-frequency attacks on availability of aerospace communication systems with the impact of radio-frequency attacks on the confidentiality of data on aerospace communication systems. Questions 4 and 5 correlate participant responses regarding impact of radio-frequency attacks on the integrity of aerospace communication systems to impact of radio-frequency attacks on the confidentiality of data on aerospace communication systems. While all the Pearson Product-Moment correlation coefficients in this table were significant, the correlations between question 4 (integrity) and question 5 (confidentiality) stood out as being moderate. This data reflects participants view that radio frequency attacks have a strong impact on the integrity and confidentiality of a system. Given the positive trend of the correlative responses, it is apparent that aerospace professionals believe that radio frequency attacks impact each domain of the CIA model, justifying the need for cybersecurity guidance and strategy to respond to the radio frequency specific vulnerabilities. Frequency of Radio Frequency Attacks Correlation to Industry Years of Experience. The correlative results shown in Table 16, Correlative Analysis: Frequency of Attacks and Years of Experience, identified a positive correlation between each of the CIA triad pillars when compared to the rate of occurrence of radio frequency attacks. This can be seen in the Pearson Product-Moment Pearson product-moment Correlation breakdown below: 120 Table 16 Correlative Analysis: Frequency of Attacks and Years of Experience Pearson Product Correlation Variable X Question 3 Pearson Product Correlation Variable Y Question 6 Pearson Correlation Question 4 Question 6 .122 Question 5 Question 6 .114 .297 Note. This table displays the Pearson Product-Moment correlation coefficients results between the frequency of radio frequency attacks and the CIA triad. As in previous results, the greater the positive coefficient, the stronger the correlation between the two responses. Regarding Table 16, questions 3 and 6 correlate participant responses on the impact of radio-frequency attacks on availability of aerospace communication systems to the frequency of attacks on aerospace communication systems. A correlation of .297 indicates a weak correlation exists between the availability of aerospace communication systems and the frequency of attacks. A weak correlation was also found between questions 5 and 6, which indicates that respondents found a correlation between the confidentiality of aerospace communication systems and the frequency of attacks. Participant Opinion on Government Guidance. Respondents with more experience were more likely to choose there is inadequate or no government guidance and resources available. Of the individuals with 10 years or more of experience, 44, 33%, indicate that there are inadequate or no resources available. Participants with more than 10 years of experience were less likely to indicate that there was a good or very 121 good, number of resources available. Of the individuals with 10 years or more of experience, 31 respondents, 23%, indicated that there were good or very good resources available. Respondents who had less experience were less likely to select that there are inadequate or no government guidance and resources available. Of the individuals with less than 10 years of experience, 24 respondents, or 18%, indicated that there are inadequate or no resources available. Participants with less than 10 years of experience were more likely to indicate that there was a good or very good, number of resources available. Of the individuals with less than 10 years of experience, 21 respondents, or 16%, indicated that there were good or very good resources available. This factor is largely inconclusive, but potential causes may be that it is either attributed to experts with less experience having more recent training, or in the inverse case, that those with more experience having an increased level of situational awareness regarding the gaps in existing governance. Chapter Summary Chapter 4 presented details and results of a pilot study and subsequent corrections made to the instrument to improve clarity and response rate. Sampling methodology and data collection procedure were detailed. Limitations and assumptions impacting the study were noted. Details of statistical analysis used to process the data to yield correlations were presented in narrative and graphic form. Significant correlations were detailed. Chapter 5 will cover the findings and recommendations of the data represented in this chapter. Details regarding the impacts of the Chapter 1 assumptions will be highlighted, as well as limitations of the survey instrument identified during the data collection period. Recommendations for future research will be provided, as well as a final summary of the research effort. 122 CHAPTER 5: FINDINGS AND RECOMMENDATIONS In July 2002, the Department of Homeland Security published the National Strategy for Homeland Security. It excluded the satellite industry from the list of critical infrastructure, leaving large gaps in national policy for the protection of aerospace communication assets (GAO, 2002). In 2015, the Department of Homeland Security published the Communications Sector-Specific Plan (CSSP), which does name the aerospace industry as vital to the critical infrastructure of the United States. In 2020, the first United States policy for comprehensive cybersecurity of space systems, (SPD-5), was released (United States Space Force, 2020b). SPD5 addresses the growing need for cybersecurity on space systems. The problem statement of this research was designed to address the growing need for improved cybersecurity on aerospace communication systems, with specific emphasis on concerns associated with radio frequency vulnerabilities to radio frequency attacks on critical infrastructure assets, by collecting and analyzing data from industry experts. The ongoing lack of cybersecurity practices designed to mitigate radio frequency vulnerabilities in aerospace systems constitutes an unacceptable risk for systems providing critical services to a wide variety of customers (National Security Strategy for Aviation Security of the United States of America, 2007). The purpose of this research was to analyze industry views on existing radio frequency and cybersecurity threats to provide evidence enabling federal policy makers to develop guidelines ensuring aerospace communication systems are protected from radio frequency attacks by performing a quantitative descriptive study. Quantitative research examines research questions that are static and explore the relationship between two or more variables (Creswell & Guetterman, 2018). 123 This study deployed a cross-sectional survey to collect data from industry professionals regarding radio frequency cybersecurity threats on aerospace communication systems. Specifically sought were views on the frequency of suspected or confirmed radio frequency attacks, severity of radio frequency attacks, and applicability of existing cybersecurity policies to provide policy makers a comprehensive understanding of the criticality of radio frequency attack vectors in the aerospace communication domain. Study Taxonomy As stated by Yazdani, Shirvani. And Heidarpoor (2021), taxonomies are the fundamental building blocks of information architecture used in research for knowledge management. In scientific fields, knowledge is complex and requires detailed taxonomies to manage information. The American philosopher John Dewey once defined knowledge as the acquisition of information, truth, and facts (Dicker, 1972). This study’s research taxonomy was designed to provide effective management of the information as the study progressed through each stage of development. This research used a research taxonomy to provide structure to the scientific method and ensure that information was categorized in accordance with established research practices. In the initial stages of this research effort, a research methodology map was developed detailing the taxonomic research process for the study. The methodology was peer reviewed and approved by the Academic Review Board and Institutional Review Board at Capitol Technology University. Once approved, the study was conducted according to the methodology map to ensure research best practices were followed. The study taxonomy decomposed the study into 6 iterative phases. These steps included research methodology, subject matter literature review, a pilot study, data collection, data 124 analysis, and reporting of results. The research methodology map and concomitant details are included in Appendix B of this dissertation. Limitations Limitations are an inherited part of research processes (Salkind, 2017; Creswell & Guetterman, 2018). They represent weaknesses in a research design which may result in bias towards conclusions. It is therefore essential that a researcher communicate limitations, their effect upon the research, and the steps taken to mitigate them so data being reported is correctly represented (Ross & Zaidi, 2019). This study identified several limitations in Chapter 1 which bore the potential to impact the survey. The first of these limitations focused on a lack of accessible material. Due to the classified nature of cybersecurity attacks on aerospace communication systems and critical infrastructure, this survey was limited by the difficulty deriving publicly available data from publications, reports, or guidance. Information specific to time, events, or systems in operation, or details of current hardware systems in place is often considered classified since it can compromise those systems. Systems and attack vectors in communication systems dependent upon radio frequency technology are generally unclassified, however, mitigation methods and existing vulnerabilities are considered sensitive. This study was limited in size due to the strict requirements of the survey structure, which required that participants have validated experience in the aerospace communication system field). The survey population was sourced from closed, industry-specific groups on Facebook and LinkedIn to identify prospective respondents. Limitations of those platforms reduced the number of prospects reachable. To partially skirt this issue, survey instruments were disseminated up to the permissible limit, 50 per day for Facebook, and 150 per day for LinkedIn. 125 Online survey instruments are known to have a lower response rate than other methods (Saleh & Bista, 2017). This survey realized a response rate of 10.7% with a sample size of 133 participants and a sample frame of 1,439 participants. In Chapter 3, the methodology of the study was defined where which estimated a study population of 8,109, a confidence level of 95%, and a margin of error of 6%, a sample of 259 participants would be required. Due to limitations of resources and time, the survey was terminated upon reaching a sample of 133 complete responses with a total population of 1,439 participants. Using the sample same size formula consistent with what was used in Chapter 3, this resulted in an updated confidence interval of 8% versus the intended 6% at a confidence level of 95%. Findings and Interpretations The study provided insight into the current state of United States federal guidance regarding the state and nature of cybersecurity in the aerospace domain. The literature review revealed that aerospace system cybersecurity has little specialized guidance to address the unique attack vectors associated with radio frequency attacks. In the last decade, the DHS, White House, and associated entities have released numerous documents to characterize the vulnerabilities facing Aerospace systems. The review revealed a lack of pertinent governance associated with the protection of aerospace communication systems from radio frequency threats. While the issue has been highlighted by entities such as the White House and CISA in recent years, little is available on the implementation of the controls. The quantitative descriptive cross-sectional survey collected data from industry experts in effort to further characterize the impacts and frequency of radio frequency attacks on Aerospace systems. This data expands on data publicly released by the United States government with 126 aerospace communication system industry opinion regarding the current state of aerospace systems. Impacts of Radio Frequency Attacks to the CIA of Aerospace Communication Systems The research survey used the Confidentiality, Integrity, and Availability triad cybersecurity classification model to measure subject matter export opinion on impact of radio frequency signal attacks on aerospace communication systems. For each of the three domains of the CIA model, participants were asked to reflect on their professional experience to provide a measurement of the level of impact successful cybersecurity attacks have exploiting vulnerabilities in operational systems. Participant responses showed that the majority of respondents indicated that radio frequency attacks impact aerospace communication systems in all three domains of the CIA triad model. As discussed in Chapter 1I, radio frequency attacks are most often deployed using spoofing and jamming. Attacks impacting data integrity involve the intentional modification of data to result in misinformation, or an inability to establish communications. Interestingly, respondent answers indicate that radio frequency attacks adversely impact aerospace communication systems across all three areas of the CIA model. During the literature review, the dominant attack vector for radio frequency attacks, jamming, was explored. In an aerospace communication system context, jamming is the intentional prevention of communications using radio frequency signals to saturate a specified frequency by use of an emitter. Analogous attacks on traditional information systems are deployed using denial-of-service attack called a Distributed Denial of Service (DdoS) attack, which floods a network. In radio frequency communication systems, attackers flood a particular frequency range with an emitter, preventing successful communication with the intended 127 recipient. In a DdoS attack, an attacker sends a flood of network traffic over a network communication medium, preventing the appropriate messages from transmitting successfully. In Chapter 2, predominant cybersecurity attack vectors, such as spoofing, on radio frequency systems were discussed. A spoofing attack attempts to exploit vulnerabilities in a system by fooling the victim into believing they are communicating with an intended party rather than an attacker. This can deceive the target victim into revealing sensitive information or causing them to act on incorrect information. This attack method has been present in both the traditional information system domain and the Radio Frequency communication domain for decades. The high prevalence of positive responses from respondents regarding confidentiality attacks demonstrates the low level of effectiveness of current attack mitigation methods for protecting operational systems. While traditional information system security controls have been developed to mitigate these threats (NIST, 2020), survey responses on questions surrounding the impact of confidentiality attacks imply that level of protection does not currently exist on aerospace communication systems. Furthermore, the positive correlation between attack frequency and existing supporting policy revealed by participant responses suggests current policy is inadequate. This adds force to the argument that the industry is ill-prepared to respond to threats (Sayler, 2021). Additional research, guidance, and governance is needed from the United States to provide aerospace communication system owners the tools they need to prepare, mitigate, and respond to realized radio frequency centric attacks on their systems. Survey results indicated that the majority of experts believed that radio frequency attacks impacted each pillar of the CIA model. There was a moderate level of correlation between experts with greater years of experience and impacts to system confidentiality, integrity, and 128 availability. Similarly, those who selected a higher frequency rate of radio frequency attacks occurring indicated increased impact to each pillar of the CIA model. Frequency of radio frequency Attacks on Aerospace Communication Systems Question number 6 of the survey instrument measured subject matter opinion regarding the frequency of radio frequency attacks. This question tied directly to the study’s research questions, which set out to evaluate the prevalence of radio frequency attacks on Aerospace Communication Systems. It is difficult to accurately measure perception of subject matter experts regarding the frequency of an attack occurring, as the possibility exists that radio frequency attacks were not identified or mischaracterized. This demonstrates the importance of experience level of the professionals monitoring the communication capabilities, and the importance of applying security controls which can detect abnormal signal characteristics. The study results indicated a slightly positive correlation between years of experience and reported frequency of radio frequency attacks on aerospace systems with a .132 Pearson Correlation. The majority of respondents identified radio frequency attacks were prevalent enough on today’s operational systems to be described as either expected or extremely likely. As technology continues to become more accessible to threat actors, it is likely that the frequency of attacks will only increase. State of Current US Government Policy The survey data of this study indicate that participants were divided regarding the current level of United States governance on radio frequency attack vectors. Those with the most experience indicated a perception that the current level of documentation was inadequate. Inversely, participants with 5-10 years of experience indicated that cybersecurity controls were adequate. This response could reflect changing perceptions of guidance as new professionals are 129 trained on the newly available resources within the past few years, while additional emphasis has also been placed on the cybersecurity of critical infrastructure. This researcher interprets the data as showing that the most experienced respondents, those with greater than 10 years of experience, perceive a need for additional policy and guidance. With the leap of quantum computing, advances in technologies among nation-state attackers, and the simplification in attack methods to impact aerospace communication systems, the defense of our nation’s critical infrastructure has never been more at risk. Cybersecurity controls must now be developed to protect space systems which will be in service for many years. Any lapses in policy now may damage critical infrastructure of the future. Aerospace systems are a part of that critical infrastructure, having been recognized by CISA as one of the key areas of concern in their 2017 report (CISA, 2017). This research recommends that the United States government implement a top-down approach, akin to the approach taken for traditional information system security. The guidance and policies implemented by NIST 800-53R5 has served as a critical template for the nation’s information systems. A similar approach is needed for aerospace critical infrastructure. However, due to the dependency of traditional information systems, the complexity of domain-specific technologies, and the high value impacts incurred in the case of disruption, domain-specific guidance may be required. Hypothesis Addressed The hypothesis of this study was: radio frequency attack vectors pose a significant threat to the operational capabilities of aerospace systems, and current federal cybersecurity policies fail to protect aerospace communication systems from radio frequency attacks which align to known cybersecurity threats. To address this hypothesis, seven variables were identified to 130 understand the impacts, frequency, and current state of policy regarding radio frequency vulnerabilities on aerospace communication systems. The first half of the hypothesis suggested that radio frequency attack vectors pose a significant threat to the operational capabilities of aerospace systems. This hypothesis was proven correct using the survey data collected from industry experts, which identified that radio frequency attacks are not only common, but also impact each domain of the CIA model. The second half of the hypothesis, which suggested that current federal cybersecurity policies fail to protect aerospace communication systems from radio frequency attacks, was inconclusive when analyzing the data. A large magnitude of data found during the literature review identified gaps in the current state of aerospace communication system security guidance, however, survey data from participants was split in responses. Further research is required to understand the variance between responses. The study’s research instrument, a cross-sectional survey administered through SurveyMonkey, was designed to utilize survey questions as a means of collecting data to address the research questions. In the subsequent sections of this chapter, each of the four research questions are addressed in detail. Interpretations of the data presented in Chapter 4 are provided for each of the research questions to address the study’s problem statement. Research Questions Addressed In Chapter 1, the research questions of this study were introduced. These research questions were then framed into the study in Chapter 3, where the structure of the study was defined, and the survey instrument was defined along with the survey questions. The research questions for this study included: 131 1) Would the implementation of a national standard for the management of radio frequency attacks contribute to the security of aerospace communication system missions? 2) How often do radio frequency attacks target aerospace systems? 3) What is the impact of radio frequency attacks on aerospace systems? 4) What is the relationship between radio frequency attacks and cybersecurity attacks amongst aerospace communication systems? Research Question 1. “Would the implementation of a national standard for the management of radio frequency attacks contribute to the security of aerospace communication system missions?” The first research question was directly tied to question 11 in the survey. Question 11 asked participants to evaluate the current United States government resources and guidance regarding the protection of aerospace communication systems from radio frequency threats. To answer the question, a Likert scale offered participants one of five qualitative inputs; unsure (no knowledge of relevant resources and guidance), none (there are no resources or guidance which I can use to respond to an event; I am unsure if I am able to respond to an event), good (there is a significant amount of resources and guidance which I can use to respond to an event; I am somewhat prepared to respond to an event), and very good (there is an adequate amount of resources and guidance; I am very prepared to respond to an event). The Likert scale was chosen due to the correlational properties which can be derived between quantitative values and the respondent’s qualitative answer. This study later used the quantitative values for statistical data analysis Results from the survey were largely inconclusive, with half of respondents indicating that there were existing adequate resources. The literature review conflicted with this data, revealing that the United States as a whole is moving towards addressing cybersecurity controls and guidance for aerospace systems. 132 Research Question 2. “How often do radio frequency attacks target aerospace systems?” Figure 11, Years of Experience versus Frequency of RF Attacks on Aerospace Systems, illustrates responses on frequency of radio frequency attacks on aerospace communication systems among industry experts. A combination of the survey data gathered, and an analysis of the literature review aided in answering this research question. In the literature review, it is apparent that radio frequency attacks are a vulnerability which the United States government can no longer ignore as dependency on space systems grow and attack methodologies simplify. The study’s statistical analysis indicated a correlation between years of experience and reported frequency of radio frequency attacks on aerospace systems with a .132 Pearson Correlation. Most respondents identified that radio frequency attacks were prevalent enough on today’s operational system to be described as either expected or extremely likely. The combined results of the literature review and subject matter opinion makes it apparent that radio frequency attacks are a common threat which adversaries are actively using to disable critical infrastructure capabilities. Research Question 3. “What is the impact of radio frequency attacks on aerospace systems?” To provide an answer for research question three, several questions were included in the survey instrument to collect data from industry experts. To address this research question questions seven through nine were formulated offering participants to signify the level of impact of radio frequency attacks on each domain of the CIA model. The answers for questions seven, eight, and nine used a Likert scale allowing participants to select between five qualitative inputs; None (no level of impact), Low (some level of impact; some capabilities are degraded), Moderate (moderate level of impact; noticeable degradation of capabilities of a system), High 133 (high level of impact; significant impact to the capabilities of a system), and Severe (extremely high level of impact; capabilities of a system are no longer possible to maintain). Notably, very few participant responses indicated that there was no level of threat on aerospace communication systems from radio frequency attacks for all three domains of the CIA triad. Responses for availability trended upwards in impact more when compared with integrity or confidentiality. Integrity provided an overall moderate level of impact while confidentiality results indicated the lowest level of threat from radio frequency attack vectors. For all three of the CIA-oriented questions, there was a significant positive Pearson correlative coefficient between years of service and high impact, implying that the most experienced subject matter experts believe that radio frequency-dependent aerospace systems are more at threat from cybersecurity-oriented attacks. Research Question 4. What is the relationship between radio frequency attacks and cybersecurity attacks amongst aerospace communication systems? Research Question four was addressed during the literature review of this dissertation. Chapter 2 reviewed the existing body of knowledge to analyze existing cybersecurity policy, typically focused on traditional information systems, to understand the characteristics of known attack methodologies. Notably, the attacks identified in the literature review for traditional information systems, mirrored attacks which exist in the radio frequency domain (NIST, 2021a). Furthermore, there was significant research found for the proposal of the utilization of the CIA model for the categorization of radio frequency attack vectors on aerospace communication systems (NIST, 2021a). At the time of writing this dissertation, the United States National Institute of Science and Technology has released the draft form of the publication, “Introduction to Cybersecurity for Commercial Satellite Operations” (2021a). While only a subset of the 134 overall domain of aerospace communication systems, this publication focuses on the cybersecurity of crewless space vehicles. The standard contents show clear intent by the United States government to begin addressing long-awaited commercial sector need for security controls tailored for space vehicles. Table 1 of the standard provides a mapping of radio frequency attack vector to existing NIST 800-53R5 security controls (NIST, 2021a). Recommendations for Future Research The survey results of this quantitative study can be used by aerospace organizations to better understand perceptions of radio frequency threats among industry professionals. The data provides an internal perspective of the state of aerospace communication systems from the standpoint of professionals who operate and respond to threats first-hand. Regardless of the experience level of participant answering the survey tool, there was a significant response when answering questions regarding the impacts of radio frequency attacks on the confidentiality, integrity, and availability of aerospace systems. This study identified that radio frequency based attacks are prevalent on aerospace communication systems and result in significant impacts to the confidentiality, integrity, and availability of the system. Further research may be done on the frequency of each specific vulnerability within the CIA model, adding granularity by providing data on which types of attack methods are most common. Furthermore, as guidance and defensive controls mature, future researchers may choose to repeat this study to determine whether or not radio frequency attacks reduce effectiveness as guidance and defensive controls mature. The results and findings of this survey show that defensive cybersecurity controls are lacking in the aerospace communication industry, revealing a gap in our nation’s ability to protect critical infrastructure. 96 of 133 participants (72%) of this survey reported that radio 135 frequency attacks on aerospace systems were expected to occur. The results of the survey reflected the historical overview detailed in Chapter 2; aerospace communication systems are critically lacking in the necessary defenses to respond to a threat. Responses from participants regarding the state of current guidance inconclusive and did not yield a significant correlation between impact of attacks and state of available guidance. However, the significant impacts of these incidents suggests that controls need to be implemented to mitigate the impact of attacks. Using the data gathered from the historical overview and survey instrument, future researchers may choose to use it as a basis for a cybersecurity framework to address Radio Frequency vulnerabilities. A cybersecurity model blending traditional cybersecurity components of an information system security model with a critical infrastructure security model would aid industries such as aerospace in developing measures to identify or mitigate new threats. The results of this study indicate that commercial and defense aerospace organizations currently lack an adequate level of cybersecurity protective controls when compared to traditional information systems. Cybersecurity models may be used in conjunction with the development aerospace system cybersecurity controls in the areas of confidentiality, integrity, and availability specifically designed to address the unique threats originating from radio frequency attack vectors. The historical overview section of this study categorized several types of radio-frequency attack vectors for aerospace communication systems. The data gathered during the historical overview, reinforced by the research study, can form a foundation for future research to decompose the various types of radio-frequency attacks. Thorough characterization of the threat types and modes may be used in conjunction with applied security controls to provide industry users increased situational awareness when responding and mitigating threats. 136 Summary In this chapter, the research questions which were defined in Chapter 1 were reviewed and addressed. This researcher used the quantitative survey data to support data found in the literature review and expanded upon the previous body of knowledge by reaching out to industry experts to gather data on the impact, frequency, and severity of radio frequency attacks on aerospace communication systems. This study found that industry experts consider radio frequency attacks to be common, of high severity, and data from the results was largely inconclusive when considering the current state of governmental guidance. The findings of this study reinforce what was discussed in the literature review; the United States has a gap in its defenses of critical infrastructure when confronting attacks stemming from radio frequency attack vectors. Furthermore, findings indicate the problem is known, yet cybersecurity policies are lagging when compared with other industries such as traditional information technology system security. This research recommends that the government review the existing publications and guidance for federal aerospace communication systems and address the flaws using a combination of specialized security controls and models developed in conjunction with commercial organizations, with emphasis on the implementation of protective controls. Further research into the implementation of a security framework to address aerospace communication system radio frequency vulnerabilities is a suggested avenue for future research. REFERENCES Aamodt, M., Brecher, E., Kutcher, E., & Bragger, J. (2006). Do structured interviews eliminate bias? A meta-analytic comparison of structured and unstructured interviews. Paper presented at the annual meeting of the Society for Industrial-Organizational Psychology, Dallas Texas. Abstract retrieved from 137 https://www.researchgate.net/publication/308753199_Do_structured_interviews_eliminat e_bias_A_meta-analytic_comparison_of_structured_and_unstructured_interviews Adams, K., & Lawrence, E. (2018). Research Methods, Statistics, and Applications. New York, NY: Sage Publications, Inc. Akan, V., & Yazgan, E. (2020). Antennas for Space Applications: A Review, Advanced Radio Frequency Antennas for Modern Communication and Medical Systems. In Advanced Radio Frequency Antennas for Modern Communication and Medical Systems (pp. 139171). London, UK: IntechOpen Altman, E. I. (1968). Financial ratios, discriminate analysis, and the prediction of corporate bankruptcy. The Journal of Finance, 23(4), 589–609. doi:10.1111/j.15406261.1968.tb00843.x Bailey, B., Speelman, R., Doshi, P., Cohen, N., & Wheeler, W. (2019). Defending Spacecraft in the Cyber Domain. The Aerospace Corporation. Retrieved from The Aerospace Corporation website: https://aerospace.org/sites/default/files/201911/Bailey_DefendingSpacecraft_11052019.pdf Baird, M. A., USAF. (2013). Maintaining Space Situational Awareness and Taking It to the Next Level. Air & Space Power Journal, 27(5), 50–72. Retrieved from Advanced Technologies & Aerospace Collection; ProQuest Central. (1475073677) Betz, J. W. (2020). Fundamentals of Satellite-Based Navigation and Timing. In Position, Navigation, and Timing Technologies in the 21st Century (pp. 43–64). Hoboken, NJ: John Wiley & Sons, Ltd. doi:10.1002/9781119458449.ch2 Berelson, B. (1952). Content analysis in communication research. (p. 220). New York, NY, United States: Free Press. 138 Boell, S. K., & Cecez-Kecmanovic, D. (2015). What is an Information System? 2015 48th Hawaii International Conference on System Sciences, 4959–4968. doi:10.1109/HICSS.2015.587 Boudah, D. (2021). Conducting Educational Research: Guide to Completing a Major Project (By pages 152-177). Thousand Oaks: SAGE Publications, Inc. doi:10.4135/9781483349138 Brewer, M. B., & Crano, W. D. (2014). Research design and issues of validity. In H. T. Reis & C. M. Judd (Eds.), Handbook of research methods in social and personality psychology (pp. 11–26). Cambridge University Press. Censor, D. (1973). The generalized doppler effect and applications. Journal of the Franklin Institute, 295(2), 103–116. doi:10.1016/0016-0032(73)90222-6 Chambliss, D., & Schutt, R. (2016). Making Sense of the Social World: Methods of Investigation (Fifth). Los Angeles, CA, USA: Sage. Retrieved from https://digitalcommons.hamilton.edu/books/30/ Chicago Tribune. (1998). Satellite outage felt by millions. Retrieved from https://www.chicagotribune.com/news/ct-xpm-1998-05-21-9805210138story.html+&cd=1&hl=en&ct=clnk&gl=us Creswell, J. W., & Guetterman, T. C. (2019). Educational research: Planning, conducting, and evaluating quantitative and qualitative research. Harlow, England: Pearson. Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry & research design: Choosing among five approaches. Thousand Oaks: SAGE Publications, Inc. Cribbin, C. (2011). Citation chain aggregation: An interaction model to support citation cycling. Paper presented at the 20th ACM Conference on Information and Knowledge, Glasgow, 139 United Kingdom. Abstract retrieved from https://www.researchgate.net/publication/221615375_Citation_chain_aggregation_An_in teraction_model_to_support_citation_cycling Critical Infrastructure Security Agency. (2013). National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastructure Security and Resilience. Retrieved from https://www.cisa.gov/publication/nipp-2013-partnering-critical-infrastructure-securityand-resilience Critical Infrastructure Security Agency. (2015). Communications Sector-Specific Plan, An Annex to the NIPP 2013. Retrieved from https://www.cisa.gov/sites/default/files/publications/nipp-ssp-communications-2015508.pdf Critical Infrastructure Security Agency. (2016). Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. Retrieved from https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICSCERT_Defense_in_Depth_2016_S508C.pdf Critical Infrastructure Security Agency. (2017). Securing Cyber Assets: Addressing urgent Cyber Threats to Critical Infrastructure. Retrieved 22 August 2021, from https://www.cisa.gov/sites/default/files/publications/niac-securing-cyber-assets-finalreport-508.pdf Critical Infrastructure Security Agency. (2020). Radio Frequency Interference Best Practices Guidebook. Retrieved from https://www.cisa.gov/sites/default/files/publications/safecomncswic_rf_interference_best_practices_guidebook_2.7.20_-_final_508c.pdf 140 Danchik, R., & L. Lee, P. (1990). The navy navigation satellite system (TRANSIT). Johns Hopkins PAPL Technical Digest, 11(1–2), 97–104. Dave, G., Choudhary, G., Sihag, V., You, I., & Choo, K. (2021). Cyber Security Challenges in Aviation Communication, Navigation, and Surveillance. Computers & Security, 102516. doi: 10.1016/j.cose.2021.102516 Dawadi, S., Shrestha, S., & Giri, R. (2021). Mixed-Methods Research: A Discussion on its Types, Challenges, and Criticisms. Journal of Studies in Education, 2, 25–36. Defense Intelligence Agency ). (2019).Security in Space. Retrieved from https://www.dia.mil/Portals/27/Documents/News/Military%20Power%20Publications/Sp ace_Threat_V14_020119_sm.pdf Department of Defense. (2010). Electromagnetic Environmental Effetcs Requirements for Systems. Retrieved from https://www.dau.edu/cop/e3/Pages/Topics/Military%20Specifications%20and%20Standa rds.aspx Department of Defense. (2015). Requirements for the Control of Electromagnetic Interference Characteristics of Subsystems and Equipment. Retrieved from https://www.dau.edu/cop/e3/Pages/Topics/Military%20Specifications%20and%20Standa rds.aspx Department of Homeland Security. (2018). National security strategy for aviation security of the United States of America. Retrieved from https://www.whitehouse.gov/wpcontent/uploads/2019/02/NSAS-Signed.pdf Department of Homeland Security. (2013). Joint National Priorities for Critical Infrastructure and Resilience. Retrieved from https://www.hsdl.org/?abstract&did=821736 141 Department of Homeland Security. (2018). U.S. Department of Homeland Security Cybersecurity Strategy. Retrieved 17 May 2020, from https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf Dicker, G. (1972). John Dewey on the Object of Knowledge. Transactions of the Charles S. Peirce Society, 8(3), 152–166. Drummond, K. E., & Murphy-Reyes, A. (2018). Nutrition research: Concepts and applications. Falco, G. (2020). When Satellites Attack: Satellite-to-Satellite Cyber Attack, Defense and Resilience. Presented at the ASCEND, Online. doi:10.2514/6.2020-4014 Federal Aviation Administration. (2020). Spectrum Engineering & Policy -Radio Frequency Bands Supporting Aviation. Retrieved from https://www.faa.gov/about/office_org/headquarters_offices/ato/service_units/techops/safe ty_ops_support/spec_management/engineering_office/rfb.cfm Federal Communications Commission. (2021). Radio Spectrum Allocation. Retrieved from https://www.fcc.gov/engineering-technology/policy-and-rules-division/general/radiospectrum-allocation Fink, A. (2013). How to conduct surveys: A step-by-step guide (5th ed.) Los Angeles: SAGE. Foley, S. (2011). World War II Technology that Changed Warfare—Radar and Bombsights. Academic Symposium of Undergraduate Scholarship. Retrieved from https://scholarsarchive.jwu.edu/cgi/viewcontent.cgi?article=1011&context=ac_symposiu m Gomez, C. (2015). Cybersecurity of unmanned aircraft systems (UAS). Master’s Thesis. Retrieved from ProQuest Dissertations & Theses Global; Publicly Available Content Database (1750068515). 142 Gorvine, B., Rosengren, K., Stein, L., & Biolsi, K. (2018). Research methods: From theory to practice. Government Accountability Organization. (2002). Critical Infrastructure Protection: Commercial Satellite Security Should Be More Fully Addressed. Retrieved from https://www.govinfo.gov/content/pkg/GAOREPORTS-GAO-02781/html/GAOREPORTS-GAO-02-781.htm Government Accountability Office (GAO). (2018). High Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation. Retrieved 22 April 2020, from https://www.gao.gov/assets/700/693405.pdf Government Accountability Organization. (2020a). Aviation Cybersecurity: FAA Should Fully Implement Key Practices to Strengthen Its Oversight of Avionics Risks. Retrieved from https://www.gao.gov/products/gao-21-86Government Accountability Office. (2020b). FAA Should Fully Implement Key Practices to Strengthen Its Oversight of Avionics Risks. Retrieved from https://www.gao.gov/assets/gao-21-86.pdf Grace, D., Daly, N.E., Tozer, T.C., Burr, A.G. and Pearce, D.A.J. (2001), Providing multimedia communications services from high altitude platforms. Int. J. Satell. Commun., 19: 559580. doi:10.1002/sat.698 Hitchens, T., “Cyber Attack Most Likely Space Threat: Maj. Gen. Whiting,” BreakingDefense.com, 2020. International Telecommunications Union (ITU). (2017). Terms and definitions. Retrieved from https://life.itu.int/radioclub/rr/frr.htm International Telecommunications Union (ITU). (2020). Radio Regulations. Retrieved from https://www.itu.int/pub/R-REG-RR-2020 143 Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques. International Journal of Navigation and Observation, 2012, 127072. doi:10.1155/2012/127072 Jason, Z., Zhang, K., Grenfell, R., & Deakin, R. (2006). Short Note: On the Relativistic Doppler Effect for Precise Velocity Determination using GPS. Journal of Geodesy, 80, 104–110. doi:10.1007/s00190-006-0038-8 Javaid, A. Y. (2015). Cyber Security Threat Analysis and Attack Simulation for Unmanned Aerial Vehicle Network (Doctoral Dissertation). Retrieved from ProQuest Dissertations & Theses Global (1840157048). Johnson-Roth, G., Chaudhri, G., & Tosney, W. (2016). Ground Segment Systems Engineering Handbook (Technical Report No. AD1067478). Retrieved from https://apps.dtic.mil/sti/citations/AD1067478Joint Chief of Staff. (2018a). Cyberspace Operations. Retrieved from https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf Joint Chief of Staff. (2018b). Space Operations. Retrieved from https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_14ch1.pdf?ver=qmkgYPy KBvsIZyrnswSMCg%3D%3D Kepchar, K. (2016). CYBERSECURITY & CRITICAL INFRASTRUCTURE - ARE WE MISSING THE OBVIOUS? INSIGHT, 19, 54–58. doi:10.1002/inst.12129 Kodheli, O., Lagunas, E., Maturo, N., Sharma, S. K., Shankar, B., Montoya, J. F. M., … Goussetis, G. (2021). Satellite Communications in the New Space Era: A Survey and Future Challenges. IEEE Communications Surveys and Tutorials, 23(1), 70–109. doi:10.1109/COMST.2020.3028247 144 Kolbe, R. H., & Burnett, M. S. (1991). Content-analysis research: An examination of applications with directives for improving research reliability and objectivity. Journal of Consumer Research, 18(2), 243–250. doi:10.1086/209256 Kost, R. G., & de Rosa, J. C. (2018). Impact of survey length and compensation on validity, reliability, and sample characteristics for Ultrashort-, Short-, and Long-Research Participant Perception Surveys. Journal of Clinical and Translational Science, 2(1), 31– 37. PubMed (30393572). doi:10.1017/cts.2018.18 Likert, R. (1932). A technique for the measurement of attitudes. Archives of Psychology, 22 140, 55–55. Scott, L. (2021). "Interference," in Position, Navigation, and Timing Technologies in the 21st Century: Integrated Satellite Navigation, Sensor Systems, and Civil Applications, IEEE, 2021, pp.619-653, doi: 10.1002/9781119458449.ch24. Lykou, G., Anagnostopoulou, A., & Gritzalis, D. (2018). Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls. Sensors (Basel, Switzerland), 19(1), 19. doi:10.3390/s19010019 Mai, Thuy. (2017). Global Positioning System History. Retrieved from https://www.nasa.gov/directorates/heo/scan/communications/policy/GPS_History.html Manning, C. (2021) What are radio waves? Retrieved from https://www.nasa.gov/directorates/heo/scan/communications/outreach/funfacts/what_are_ radio_waves Manulis, M., Bridges, C. P., Harrison, R., Sekar, V., & Davis, A. (2021). Cyber security in New Space. International Journal of Information Security, 20(3), 287–311. doi:10.1007/s10207-020-00503-w 145 McGee, W. (2021). Improve Cybersecurity for Information System Defense. Spotlight on the Coast Guard, 147. United States Naval Institute. Retrieved from https://www.usni.org/magazines/proceedings/2021/august/improve-cybersecurityinformation-system-defense MITRE. (2021). Radio Frequency Spectrum Management. Retrieved from https://www.mitre.org/publications/systems-engineering-guide/enterpriseengineering/enterprise-technology-information-and-infrastructure/radio-frequencyspectrum-management# Morton, T. (2019). LINGUISTS GET THEIR WINGS. Air Power History, 66(3), 21–28. JSTOR. doi:10.2307/26802350 Myers, M. (2000). Qualitative Research and the Generalizability Question: Standing Firm with Proteus. The Qualitative Report, 4(3), -. doi:10.46743/2160-3715/2000.2925 Nadeem, K., Awan, S., Leitgeb, M., & Kandus, G. (2009). Weather effects on hybrid FSO/RF communication link. IEEE Journal on Selected Areas in Communications, 27(9), 1687– 1697. doi:10.1109/JSAC.2009.091218 National Academies of Sciences, Engineering and Medicine. (2015). A Strategy for Active Remote Sensing Amid Increased Demand for Radio Spectrum. Washington, DC: The National Academies Press. National Aeronautics and Space Administration (NASA). (1965). Dictionary of Technical Terms for Aerospace Use. Retrieved May 20, 2020, from https://er.jsc.nasa.gov/seh/a.html National Aeronautics and Space Administration. (2016). Retrieved 13 December 2020, from https://www.nasa.gov/sites/default/files/atoms/files/spectrum_101.pdf 146 National Aeronautics and Space Administration. (2021). Communications. Retrieved from https://www.nasa.gov/smallsat-institute/sst-soa/communications#9.4.1 National Air and Space Intelligence Center. (2018). Competing in Space. page 18. Retrieved from https://media.defense.gov/2019/Jan/16/2002080386/-1/-1/1/190115-F-NV7110002.PDF. National Institute of Science and Technology (NIST). 2019. Economic Benefits of the Global Positioning System (GPS). Retrieved from https://www.nist.gov/system/files/documents/2020/02/06/gps_finalreport618.pdf National Institute of Science and Technology. (2020). Security and Privacy Controls for Federal Information Systems and Organizations. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53R5.pdf National Institute of Science and Technology. (2021a). Draft NISTIR 8270: Introduction to Cybersecurity for Commercial Satellite Operations. Retrieved from https://nvlpubs.nist.gov/nistpubs/ir/2021/NIST.IR.8270-draft.pdf National Institute of Science and Technology. (2021b). Information technology (IT). Retrieved from https://csrc.nist.gov/glossary/term/information_technology National Telecommunications and Information Administration. (2000). Radars and the Electromagnetic Spectrum. Retrieved from https://www.ntia.doc.gov/legacy/osmhome/reports/ntia00-40/chapt3.htm Nichols, R., Mumm, H., Lonstein, W., Ryan, J., Carter, C., & Hood, J.-P. (2019). Unmanned Aircraft Systems (UAS) in the Cyber Domain (2nd ed.). Manhattan: New Prairie Press. Retrieved from https://newprairiepress.org/ebooks/27/ 147 Neipp, C., Hernández, A., Rodes-Roca, J., Márquez, A., Beléndez, T., & Beléndez, A. (2003). An analysis of the classical Doppler effect. European Journal of Physics, 24, 497. doi:10.1088/0143-0807/24/5/306 Neuendorf, K. (2017). The content analysis guidebook (Second ed.). SAGE Publications, Inc doi:10.4135/9781071802878 Patino, C. M., & Ferreira, J. C. (2018). Internal and external validity: can you apply research study results to your patients? Jornal brasileiro de pneumologia : publicacao oficial da Sociedade Brasileira de Pneumologia e Tisilogia, 44(3), 183. doi:10.1590/S180637562018000000164 Patten, M. L., & Newhart, M. (2018). Understanding research methods: An overview of the essentials (10th ed.). New York, NY: Routledge. Petersen, K., & Gencel, C. (2013). Worldviews, Research Methods, and their Relationship to Validity in Empirical Software Engineering Research. 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement, 81–89. Perez, R. (2019). Handbook of aerospace electromagnetic compatibility. Piscataway, NJ: IEEE Press. Retrieved from https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk& AN=1985323 Pinto, A., Zeidner, L., Khire, R., Banaszuk, A., & Reeve, H. (2010). Design System for Managing Complexity in Aerospace Systems. Retrieved 31 October 2021, from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.458.4424&rep=rep1&type=pd f 148 Price, A. 2005. Instruments of Darkness: The History of Electronic Warfare, 1939-1945. Greenhill. Ragland, E.L. (1962) "A Common System Approach to Aviation Data Communications," in IRE Transactions on Aerospace and Navigational Electronics, vol. ANE-9, no. 2, pp. 91-99, June 1962, doi: 10.1109/TANE3.1962.4201855. Price, A. (1989). The History of US Electronic Warfare: “The renaissance years, 1946 to 1964.” Association of Old Crows. Retrieved from https://books.google.com/books?id=77kMAQAAIAAJ Quisquater, J., & David, S. (2005). Electromagnetic Attack. In H. C. A. van Tilborg (Ed.), Encyclopedia of Cryptography and Security (pp. 170–174). Boston, MA: Springer US. doi:10.1007/0-387-23483-7_120 Riahi Manesh, M., & Kaabouch, N. (2017). Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system. International Journal of Critical Infrastructure Protection, 19(C), 16–31. doi:10.1016/j.ijcip.2017.10.0 Regmi, P. R., Waithaka, E., Paudyal, A., Simkhada, P., & van Teijlingen, E. (2016). Guide to the design and application of online questionnaire surveys. Nepal journal of epidemiology, 6(4), 640–644. doi:10.3126/nje.v6i4.17258 Robinson, J. (2014). Likert Scale. In A. C. Michalos (Ed.), Encyclopedia of Quality of Life and Well-Being Research (pp. 3620–3621). Dordrecht: Springer Netherlands. doi:10.1007/978-94-007-0753-5_1654 Ross, P. T., & Bibler Zaidi, N. L. (2019). Limited by our limitations. Perspectives on medical education, 8(4), 261–264. doi:10.1007/s40037-019-00530-x 149 Ruel, E., Wagner, W., & Gillespie, B. (2015). The practice of survey research: Theory and applications (1st ed.). Thousand Oaks, CA: SAGE Publications. Ryan, T. P. (2013). Sample size determination and power (1st ed.). Hoboken, NJ: John Wiley & Sons, Ltd. Retrieved from http://onlinelibrary.wiley.com/book/10.1002/9781118439241 Sacchi, C., Jamalipour, A., Ruiggieri, M. (2011). Aerospace Communications and Networking in the Next Two Decades: Current Trends and Future Perspectives [Scanning the Issue]. Proceedings of the Institute of Electrical and Electronics Engineers, USA, 99, 18351839. doi:10.1109/JPROC.2011.2165761 Sagdeev, R. (2009). The slow slide towards a new battlefield? Nature, 460(7253), 326–327. doi:10.1038/460326a Saleh, A., & Bista, K. (2017). Examining Factors Impacting Online Survey Response Rates in Educational Research: Perceptions of Graduate Students. Journal of MultiDisciplinary Evaluation, 13(29), 63–74. Salkind, N. (2007). Encyclopedia of Measurement and Statistics (Vols. 1–0). Thousand Oaks, CA: SAGE Publications, Inc. Retrieved from https://methods.sagepub.com/reference/encyclopedia-of-measurement-and-statistics Salkind, N. (2021). Encyclopedia of Research Design. Thousand Oaks, California: SAGE Publications, Inc. doi:10.4135/9781412961288 Salkind, N. J., ,. (2018). Exploring research (9th ed.). Harlow, England: Pearson. Sarkar, S., Banerjee, P., & Bose, A. (2018). A Review of 36 Years of GLONASS Service from India. Gyroscopy and Navigation, 9(4), 301–313. doi:10.1134/S2075108718040065 Satellite Group. (n.d.). About [LinkedIn Page]. LinkedIn. Retrieved 1 October 2021, from https://www.linkedin.com/groups/56469/ 150 Sayler, K. (2021). Emerging Military Technologies: Background and Issues for Congress (p. 37). Congressional Research Service. Retrieved from Congressional Research Service website: https://sgp.fas.org/crs/natsec/R46458.pdf Schober, P., Boer, C., & Schwarte, L. A. (2018). Correlation Coefficients: Appropriate Use and Interpretation. Anesthesia and analgesia, 126(5), 1763–1768. doi:10.1213/ANE.0000000000002864 Secure Wireless Agile Networks (2021) Radio Frequency Vulnerabilities. Retrieved from https://cpb-euw2.wpmucdn.com/blogs.bristol.ac.uk/dist/6/635/files/2021/05/SWANWH2.pdf Shing, LeeHur., Astacio, Jessica, Figuera, Alejandro, Shing, Chen-Chi. (2015). Vulnerabilities of radio frequencies. 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2682–2686. doi:10.1109/FSKD.2015.7382381 Simpson, J. (2000). Guiding Satellites. Johns Hopkins Magazine. Retrieved from https://pages.jh.edu/jhumag/0400web/04.html Spencer, D. (2018). The Unmanned Aerial Systems (UASs) Industry and the Business Impacts of the Evolution of the Federal Regulatory Environment (Dissertation, University of South Florida). University of South Florida, Florida. Retrieved from https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=8773&context=etd Stacey, D. (2008). Aeronautical Radio Communication Systems and Networks. Hoboken, NJ: John Wiley & Sons, Ltd. Strauss, A. L., & Corbin, J. M. (2014). Basics of qualitative research: Techniques and procedures for developing grounded theory. Thousand Oaks: Sage Publications. 151 Theofanidis, D, & Fountouki, A. (2019). Limitations And Delimitations In The Research Process. Perioperative nursing (GORNA), E-ISSN:2241-3634, 7(3), 155–162. doi:10.5281/zenodo.2552022 Tomsic, J. L. & Eastlake, C. N. (1998). SAE Dictionary of Aerospace Engineering. Society of Automotive Engineers. Retrieved from https://books.google.com/books?id=3Z5TAAAAMAAJ Ukwandu, E., Farah, M. A. B., Hindy, H., Bures, M., Atkinson, R., Tachtatzis, C., & Bellekens, X. (2021). Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends. Unal, B. (2019). Cybersecurity of NATO’s Space-based Strategic Assets. Retrieved from https://www.chathamhouse.org/sites/default/files/2019-06-27-Space-Cybersecurity-2.pdf United States Army. (2021). FM 3-12: Cyberspace Operations and Electromagnetic Warfare. Retrieved from https://irp.fas.org/doddir/army/fm3-12.pdf United States Military SATCOM. (n.d.). About [Facebook Page]. Facebook. Retrieved 1 October 2021, from https://www.facebook.com/groups/USMIL.SATCOM United States Space Force. (2020a). Space Capstone Publication: Spacepower Doctrine for Space Forces. Retrieved from https://www.spaceforce.mil/Portals/1/Space%20Capstone%20Publication_10%20Aug%2 02020.pdf United States Space Force. (2020b). Memorandum on Space Policy Directive-5—Cybersecurity Principles for Space Systems. https://history.nasa.gov/SPD-5.pdf United States Space Force. (2021). United States Space Force History. Retrieved from https://www.spaceforce.mil/About-Us/About-Space-Force/History/ 152 Velkovsky, P., Mohan, J., & Simon, M. (2019). Satellite Jamming. Retrieved from https://ontheradar.csis.org/issue-briefs/satellite-jamming/ Wang, G., Wei, S., Chen, G., Tian, X., Pham, K., & Shen, D.. (2016). Cybersecurity with radio frequency interferences mitigation study for satellite systems. In Sensors and Systems for Space Applications IX, Baltimore, MD: SPIE Defense + Security. Retrieved from https://www.researchgate.net/publication/303324074_Cyber_security_with_radio_freque ncy_interferences_mitigation_study_for_satellite_systems Westbrook, T. (2019). The Global Positioning System and Military Jamming: The geographies of electronic warfare. Journal of Strategic Security, 12(2), 1–16. doi:10.5038/19440472.12.2.1720 White House. (2010). National Space Policy of the United States of America. Retrieved from https://obamawhitehouse.archives.gov/sites/default/files/national_space_policy_6-2810.pdf White House. (2013). Presidential Policy Directive -- Critical Infrastructure Security and Resilience. Retrieved from https://obamawhitehouse.archives.gov/the-pressoffice/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil White House. (2018). National Cyber Strategy of the United States of America. Retrieved from https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-CyberStrategy.pdf White House. (2020). National Space Policy of the United States of America. Retrieved from https://trumpwhitehouse.archives.gov/wp-content/uploads/2020/12/National-SpacePolicy.pdf 153 Yaacoub, J. P., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218. doi:10.1016/j.iot.2020.100218 Yazdani, S., A. Shirvani, and P. Heidarpoor. (2021). A Model for the Taxonomy of Research Studies: A Practical Guide to Knowledge Production and Knowledge Management. Archives of Pediatric Infectious Diseases In Press(In Press):e112456. doi: 10.5812/pedinfect.112456. 154 APPENDIX A: LITERATURE REVIEW SEARCH Peer Reviewed Works Reviewed Key Word Search Germinal Works Reviewed Books Reviewed Studies Reviewed Research Methodology Quantitative Analysis 9 9 5 9 Qualitative Analysis 6 2 2 3 12 5 3 13 radio frequency Methods 32 7 4 2 Cybersecurity Methods 27 8 2 4 Aviation 29 12 7 13 Space 16 5 4 9 Unmanned Aerial Vehicles 14 2 5 8 US Federal Policy 26 0 3 13 Industry 23 0 0 11 194 50 35 85 Survey Research Design RF Threat Analysis Aerospace System Communication Policy/Guidance Total Documents Reviewed (364) 155 APPENDIX B: RESEARCH METHODOLOGY MAP • • • • Quantitative Descriptive Study Research Identify types of radio frequency attack vectors and define their relationship to Cybersecurity Contribute to body of knowledge in regard to RF attack vectors on Aerospace Systems Literature Review Review seminal and significant peer-reviewed literature in the Aerospace Communication Systems field. Contribute to the quality of the quantitative research analysis by providing a foundation for research • • • Pilot Study Conduct pilot study to ensure validity of survey Collect measurement data and participant feedback for improvements Adjust survey questions and process as appropriate • • • Data Collection Use online survey tool as the research instrument to collect data Disperse survey to study population Use design outlined in Chapter 3 to ensure data is collected in accordance with IRB approval. • • Data Analysis Review results of survey from data collection instrument Apply Pearson coefficient and generate correlational measurements • • • • Interpret Data and Report Results Interpret survey results and measurements Discuss potential meaning of any correlation or results Determine final recommendations and recommend future research Submit final Dissertation to Capitol Technology University 156 APPENDIX C: PARTICIPANT CONSENT FORM Participant Consent Form Thank you for participating in this survey. This survey is part of a research study which will measure aerospace system expert opinion on the effectivity of cybersecurity methodologies designed to protect aerospace assets from radio frequency attack vectors. This study will examine specific areas of cybersecurity methodologies and radio frequency characteristics to determine potential high-impact domains. Your informed consent is requested to participant in this survey as part of a research study for a doctoral program at Capitol Technology University. The Principal Researcher of this study is Nicholas S. Bradshaw (nsbradshaw@captechu.edu). This survey is not affiliated with and has not received any funds from a federal or commercial entity. Please read the entire introduction so you understand the purpose and use of your answers. When ready to see the survey questions, click the NEXT button at the bottom of the page. You can submit your answers at any time, today or later, but you must do so in a single session. The web site will not remember you, so you cannot start answering, leave the site, and return later to finish. Please complete the survey only one time. This survey is for any adult (18 or older) who has experience as a technician, operator, engineer, or professional utilizing an aerospace communication system with radio frequency applications. Examples of aerospace communication systems include Satellite Communications (SATCOM), Unmanned Aerial Vehicles (UAVs), Satellite Telemetry and Control Systems, Line-of-Sight Aerospace Communication Systems, Aviation Communications Support Systems, and related support systems. 157 If you are a minor (under 18 years of age) or considered to be in a protected group (prisoner, pregnant woman, or a child), you are asked to not participate in this survey. Participation in this study is completely voluntary. You are not required to participate in this survey. All survey records and data will be kept strictly confidentially. There is no personal data collection taken with this survey. There is no payment or reward for taking this survey. There is no penalty for not taking or not finishing the survey. This survey has been designed to be completed in 10-15 minutes. The survey will be completed once you have answered all questions in the included questionnaire. This survey is anonymous. While it is not possible to guarantee full anonymity on the Internet, the researcher has taken steps to protect your identity while taking part in the survey. You will not be required to log in or identify yourself throughout the completion of this survey. The survey begins with a few questions to confirm you understand and agree to the terms of the survey. Please ensure that you are within the correct group for the study. The survey will ask you to identify what your domain of aerospace system expertise is in, as well as your level of experience. When the survey period has elapsed, the researcher will save all completed survey responses offline. However, the research will not save any identifiable information such as your Internet (IP) address which could be used to identify you. No one will be authorized to contact you in any way for follow-up questions or additional information. The researcher has configured this survey tool to not collect the address of your computer. The research will have no identifiable record of who took the survey. All data gathered will be deleted no longer than one month after completion of this study. Risks and Benefits of Participating 158 You will have no significant risk by taking this survey. No one can share your answers with any employers, supervisors, or managers. No one, including the researcher, will know who you are, where you are, what your job is, or where you work. The questions within this survey are designed to be general in nature. Please do not detail existing vulnerabilities on systems (defense or commercial). These questions are opinion oriented, and do not ask to reflect the status of operational systems. During the duration of this survey, if you experience sensitivity to the survey instrument, please cease participation immediately. If you experience any symptoms of fatigue, you are asked to take a break and continue the survey at a later time. By completing this survey, you may benefit personally when considering cybersecurity implications of radio frequency attacks on Aerospace assets. The intent of this study is to improve how radio frequency attack vectors are handled on Aerospace systems. The results of this study may be used to improve the standardization of security practices on Aerospace communication systems which utilize radio frequency technology. For any questions regarding SurveyMonkey’s privacy policy, information can be provided at: https://www.surveymonkey.com/mp/legal/privacy/ 159 APPENDIX D: RESEARCH INSTRUMENT Survey Questions 1. Have you read the introduction explaining the purpose, use, and privacy protections involved? a. Yes b. No 2. Do you agree that you are taking part in this survey voluntarily, with no expectation of reward or payment, and no penalty for not participating? a. Yes b. No 3. Are you at least 18 years old? a. Yes b. No 4. Do you have experience working with aerospace communication systems which utilize radio frequency technology? a. Yes b. No 5. How many years of experience do you have working with aerospace communication systems? a. 0-5 years b. 6-10 years c. 10-15 years d. 16+ years e. No experience 6. Please select the type of aerospace communication system you have experience with. If you have experience with multiple types of aerospace communication systems, select the answer which corresponds with your greatest amount of experience (in years). a. Satellite Communications/Satellite Control b. Unmanned Aerial Vehicles c. Line-of-Sight Aerospace Communication Systems d. Aviation Communications Systems e. Other 7. What level of impact do radio frequency attacks have regarding the availability of aerospace communication systems? For this question, “Impact” is defined as a degradation in the capabilities of the aerospace communication system. “Availability” is defined as the reliability of access to data communicating to/from the aerospace communication system. 160 a. None (no level of impact) b. Low (some level of impact; some capabilities are degraded) c. Moderate (moderate level of impact; noticeable degradation of capabilities of a system) d. High (high level of impact; significant impact to the capabilities of a system) e. Severe (extremely high level of impact; capabilities of a system are no longer possible to maintain) 8. What level of impact do radio frequency attacks have regarding the integrity of data on aerospace communication systems? For this question, “Impact” is defined as a degradation in the capabilities of the aerospace communication system. “Integrity” is defined as the consistency and accuracy of data communicating to/from the aerospace communication system. a. None (no level of impact) b. Low (some level of impact; some capabilities are degraded) c. Moderate (moderate level of impact; noticeable degradation of capabilities of a system) d. High (high level of impact; significant impact to the capabilities of a system) e. Severe (extremely high level of impact; capabilities of a system are no longer possible to maintain) 9. What level of impact do radio frequency attacks have regarding the confidentiality of data on aerospace communication systems? For this question, “Impact” is defined as a degradation in the capabilities of the aerospace communication system. “Confidentiality” is defined as the assurance that data being communicated is only accessible by authorized parties. a. None (no level of impact) b. Low (some level of impact; some capabilities are degraded) c. Moderate (moderate level of impact; noticeable degradation of capabilities of a system) d. High (high level of impact; significant impact to the capabilities of a system) e. Severe (extremely high level of impact; capabilities of a system are no longer possible to maintain) 10. Regarding Aerospace systems, what is the frequency of radio frequency attacks on aerospace communication systems? For this question, “Frequency” is defined as the rate of occurrence that an event will take place. a. None (incidents have never occurred) b. Rare (incidents are unlikely to occur) c. Common (incidents are expected to occur) d. Very Common (incidents will almost always occur) 161 11. In your opinion, how would you rate current United States government resources and guidance regarding the protection of aerospace communication systems from radio frequency threats? a. Unsure (no knowledge of relevant resources and guidance) b. None (there are no resources or guidance which I can use to respond to an event; I am unprepared to respond to an event) c. Inadequate (there is not enough resources and guidance which I can use to respond to an event; I am unsure if I am able to respond to an event) d. Good (there is a significant amount of resources and guidance which I can use to respond to an event; I am somewhat prepared to respond to an event) e. Very Good (there is an adequate amount of resource and guidance; I am very prepared to respond to an event)