When Cyber Meets the Spectrum: SIGINT and Security Lessons for ICS Satellite Communications

May 19, 2026

When Cyber Meets the Spectrum

Independent Research on the Convergence of AppSec, OT/ICS, and SIGINT

Originally Presented: November 2025 at BSides Delaware
Research Timeline: Independent research, conducted and presented prior to formal research collaborations
Speaker: Norris P. Cornell, Jr.
Research Focus: Critical infrastructure security, signals-layer threat analysis, industrial control system vulnerabilities


Executive Summary

This presentation identifies and documents a critical, previously under-defended attack surface that emerges at the intersection of three traditionally siloed security domains:

The Core Finding

Systems can have strong API security AND solid industrial control system defenses, yet still fail catastrophically if they trust unverified signals at the RF/timing layer.

When attackers exploit the convergence of these three domains simultaneously, they operate in a blind spot that traditional security frameworks miss — because that blind spot falls between organizational silos and defensive responsibilities.


Why This Research Matters

The Problem Statement

  1. RF-Layer Blind Spot
    • Network firewalls cannot detect spectrum-layer manipulation
    • Traditional cybersecurity tools start at the network layer, missing attacks that occur at the RF layer
    • Critical systems implicitly trust signals from satellites, GNSS receivers, and communications systems without verification
  2. ICS Protocol Weaknesses
    • Many operational technology protocols (Modbus, DNP3, legacy SCADA) transmit data in plaintext
    • No built-in authentication or integrity checking
    • Vulnerable to command injection and data spoofing
  3. Organizational Blind Spot
    • AppSec teams don’t typically defend OT systems
    • OT teams don’t typically monitor RF/signal layer threats
    • SIGINT/RF specialists don’t typically defend critical infrastructure
    • The convergence zone has no owner

Real-World Evidence

Viasat Attack (2022)

Ukraine GPS Warfare (2025 - Active)

UT Austin GPS Spoofing Research


The Hybrid Attack Surface: How the Domains Converge

Three Domains on a Venn Diagram

When you map AppSec, OT/ICS, and SIGINT threats, the intersection zone represents a critical gap in how we defend critical infrastructure.

Attack Vectors Across the Convergence

AppSec ∩ SIGINT

ICS/OT ∩ SIGINT

AppSec ∩ ICS/OT

All Three (AppSec ∩ OT/ICS ∩ SIGINT)


Presentation Contents

Slide Overview

  1. The Invisible Layer — Introduction to signal-dependent systems
  2. About the Speaker — Background and credibility context
  3. Talk Scope — What this is and isn’t (awareness, not attack walkthroughs)
  4. Three Domains Collide — Venn diagram of AppSec, OT/ICS, SIGINT convergence
  5. Cyber-Physical Stack — SCADA as brain, communications as nervous system, field devices as muscles
  6. IT vs OT Security Priorities — Why traditional IT security misses OT-specific threats
  7. The Satellite Blind Spot — Three fundamental gaps in current defenses
  8. Viasat Attack Timeline — Case study of IT-OT-Network convergence failure
  9. UT Austin GPS Spoofing — Low-cost RF attack demonstrated on critical systems
  10. Traditional vs Satellite Attacks — Why network defenses fail at RF layer
  11. GNSS Spoofing 101 — How attackers broadcast false GPS signals
  12. Timing Attacks — How 2-3 second GPS delays cascade through systems
  13. When the Orchestra Falls Out of Sync — Metaphor for timing-dependent system failure
  14. When the Dominoes Start to Fall — Cascade failure in interconnected systems
  15. Ukraine: Live GPS Warfare Testbed — Active threat evidence (1,200+ disruptions)
  16. Hybrid Attack Surface — Full convergence framework with RF, network, and application layers
  17. Defense-in-Depth Strategy — Four-layer defense across RF, network, application, and operational
  18. Monday-Morning Actions — Immediately actionable steps for defenders
  19. Resources & Acknowledgments — Standards, communities, and reference materials
  20. Key Takeaways — Visibility, Validation, Action
  21. Thank You / Contact — Speaker information

Defense Framework: Four Layers

Layer 1: RF Layer Defense

Layer 2: Network Layer Defense

Layer 3: Application Layer Defense

Layer 4: Operational Defense


Immediate Actions for Defenders

This Week

  1. Add satellites to threat models
    • Document systems that depend on GPS timing or satellite communications
    • Identify single points of failure related to RF signals
  2. Inventory your dependencies
    • Which systems rely on GNSS for synchronization?
    • Which systems depend on satellite communications?
    • Where are the gaps in monitoring?
  3. Start with one control
    • Implement timestamp validation in one critical system
    • Deploy RF monitoring in one satellite ground station
    • Choose one actionable step and deploy this week

This Month

  1. Expand threat modeling to include RF-layer attacks
  2. Document signal redundancy — Can your systems operate without satellites?
  3. Begin operator training on satellite dependency and failure modes

This Quarter

  1. Implement network segmentation for satellite-dependent systems
  2. Deploy spectrum monitoring for critical infrastructure
  3. Establish operational procedures for degraded satellite conditions

Connections to Broader Research

This presentation builds directly on the Inputs Lie framework — the thesis that critical infrastructure systems fail when they trust unverified inputs across the physics, signals, and application layers.

The Inputs Lie Series:

Key Insight: The convergence of AppSec, OT/ICS, and SIGINT is the practical manifestation of the Inputs Lie framework in action. Every attack vector exploits a system that trusts unverified inputs at one of these three layers.


Download the Complete Presentation

Full Slide Deck

Download: When Cyber Meets the Spectrum (PPTX)

File Details:


Research Timeline & Attribution

November 2025: Research conducted and presentation developed independently
November 2025: Presented at BSides Delaware 2025 (public conference)
May 2026: Published to cornellsecurity.com as permanent research asset

This timeline establishes independent authorship of the convergence framework and research prior to any formal collaborations or research partnerships.


Key Resources & Standards

NIST Standards

IEEE Standards (Timing & Synchronization)

Industry Communities


About the Research

Research Focus: Critical infrastructure security at the intersection of application security, operational technology, and signals intelligence

Methodology:

Key Contributions:


About the Author

Norris P. Cornell, Jr.
ICS/OT Security Researcher & Author

Background:

Research Identity: Specializes in critical infrastructure vulnerabilities across physics, signals, and application layers. Focuses on the convergence of traditionally separate security domains and the hybrid attack surfaces that emerge at their intersection.

Published Work:


Research Inquiry & Collaboration

If you’re working on related research, defending critical infrastructure, or exploring the AppSec-OT-SIGINT convergence, I’m actively interested in collaborations, consulting engagements, and joint research initiatives.

Contact:


© 2025–2026 Norris P. Cornell, Jr. All rights reserved.

This research is published under the following terms:

This presentation and accompanying materials may be viewed, downloaded, and shared for non-commercial, educational, and professional purposes including:

Prohibited uses:

For licensing, consulting, or collaboration inquiries: Contact npcornell@gmail.com


Acknowledgments

This research was developed independently and draws on:

Special thanks to the security research community for maintaining the shared knowledge that makes this work possible.


Questions or Next Steps?

If this research aligns with your work or interests, reach out. I’m actively exploring research collaborations and consulting engagements in critical infrastructure security.

Let’s connect: npcornell@gmail.com