Hands on in Signal intelligence, Electronic Warfare, CEMA for Security applications
Oct 4th and 5th, 2023Grand Hyatt, Kochi, India
WS-08
Hands on in Signal intelligence, Electronic Warfare, CEMA for Security applications
- Understanding the history of Electronic warfare
- How Electronic warfare can
- Categories and sub categories in ELINT and SIGINT
- Electromagnetic spectrum operation and management
- Hands on with SDR and EW
- Intersection of EW and cyber operations
Course Content (ToC):
- EW -101
- SDR-101
- Wireless communication -101
- GRC
- Hands on with SDR
- Flow graph building constraints
- Basic tone Tx and Flow graph
- Basic FM demodulation in GRC and out of tree software
- Radiotap for CEMA
- Physical layer reversing of signals
- Jammer basics
- Jammer Hands on
- CTF on the above mentioned topics
- Basic Knowledge of Radio
- Beginner level Python Skills
- Basic Knowledge of Embedded Signals
- Basic Linux commands
- Laptop with basic configuration (4gb ram)
- Internet connection
- Ubuntu 20.04 (mandatory installed not virtual box or vmware)
- ECE students, M.Tech Students and Phd students
- Faculties
- Law enforcement agency officials
- EW-101, SDR applications EW
- Becoming an expert in EMSO or telecom interception
Pre-requisite:
Participants Requirements:
Duration:
2 Days (6 Hours each day min)
Who Should Attend:
What to Expect:
What not to expect:
Speakers

Samarth Bhaskar Bhat
Technical Director , Reinfosec , India ▪ Security Architect
▪ Over six years of experience in Information Security, design and development of Application
▪ Software.
▪ Audited 50+ business Web-Applications in the areas of Banking, Finance, Insurance, Trading and eCommerce.
▪ Conducted security audit of Payment Gateway.
▪ Expertise in handling various Application security Assessments, Penetration Tests and Vulnerability Assessment
▪ Good work exposure on implementation of SOC (Security Operation Centre) and Data Loss Prevention
▪ Proficient in understanding application level vulnerabilities like XSS, SQL injection, response splitting attacks, session hijacking, authorization bypass, weak cryptography, authentication flaws & design level vulnerabilities along with the defence mechanisms.
▪ Expert in web security testing tools like Proxy Editors, Network Sniffing tools, Web Vulnerability scanners, flash de-compilers.
▪ Well versed with OWASP Top 10
▪ Proficiency in creating Threat profile for different types of applications
▪ Knowledge of different phases, methodologies, concepts and procedures involved in the PT/VA.
▪ Good understanding of vulnerability scanners like Nessus, QualysGuard, Rapid7 and Symantec CCSVM.
▪ Expertise in implementation and configuration disk encryption and email encryption (PGP)
▪ Sound knowledge on remediation process for the vulnerabilities identified during the assessment
▪ Proficient in Information security reporting for executive management
▪ Trained in secure code review of .NET applications.
▪ Trained in web services testing methodology.
▪ Sound knowledge of T-SQL, Crystal Reports, VBA, C# (Winforms), Visual Basic.NET
▪ Expertise in database programming
▪ Experienced with exposure and experience in understanding, reversing and
▪ fuzzing wireless protocols in the RF-Layer of systems.
▪ Experienced in reversing hardware protocols and implementing hardware attacks and threat-modelling of Wireless and Signals Systems. Have previous exposure and experience in Signal Design and Offensive Signal Tactics. Presently working on application of EW and SIGINT techniques in the Aerospace and Defence domain. Personal projects include machine learning and deep learning methods of recognition and deepfaking signals that can cause signal cant impact on the physical domain/layer of systems and OpenWRT for mesh networking.
▪ Signal Detection meta information extraction of signals using Commercially available SDR platforms.
▪ Protocol decomposition ofsignal of interest.
▪ Baseline formulation of minimum jamming requirements for RADAR and datalink.
▪ Utilization of SDR for SIGINT and ELINT in drones.
▪ Proof of Concept development of DRFM systems using commercially available SDR.
▪ Telecom signal (LTE) reconnaissance using commercially available SDR/
▪ Radio Direction Finding (RDF) and aggregation using commercially avaialble SDR.
▪ Establishment of CEMA guidelines for EW and Cross layer protocol research.
▪ Bechmarking of default DSP algorithms in GP-CPU's using python (adopted from BDTI guidelines).
▪ Network metrics computation of IQ data transfer metrics on mesh networks for SIGINT and ELINT operations.
▪ Wideband FHSS interception techniques using aliasing and FFT shot detection.
▪ Development of PoC of Automatic Modulation Recognition techniques using function models in python.
▪ 3D cyclostationary analysis ofsignalsfor operator visulalization.
▪ IQ signal generator and interference generator using SDR for RDF testing.
▪ Information security baseline for CEMA and ELINT operations
Workshop Assistant

Aditya Arun Kumar
Advisor and Trainer , South Indian- software defined radio (SI-SDR) group , India Aditya arun Kumar is a SDR hobbyist who’s been doing SDR work for more than 5 years now. He has previous exposure to digital signal processing system and blind signal analysis and SDR applications for electronic warfare. He is interested in signal reversing and analysis of signal and physical layer security and building custom framework for communication systems. He is currently working on applications on Machine and Deep learning techniques for communication system as a hobby project.