Create and release your Profile on Zintellect – Postdoctoral applicants must create an account and complete a profile in the on-line application system. Please note: your resume/CV may not exceed 2 pages.
Complete your application – Enter the rest of the information required for the IC Postdoc Program Research Opportunity. The application itself contains detailed instructions for each one of these components: availability, citizenship, transcripts, dissertation abstract, publication and presentation plan, and information about your Research Advisor co-applicant.
Additional information about the IC Postdoctoral Research Fellowship Program is available on the program website located at: https://orise.orau.gov/icpostdoc/index.html.
If you have questions, send an email to ICPostdoc@orau.org. Please include the reference code for this opportunity in your email.
Research Topic Description, including Problem Statement:
Modern and future wireless technologies, such as fifth generation (5G), are utilizing increasingly higher frequencies extending into the millimetre wave and beyond with their associated ability to support higher information bandwidths. The commercialization of this technology is leading to the availability of low cost RF sub systems and components at these higher frequencies. This is likely, to increase technical threats operating at these higher frequencies, which will be produced at a significantly lower cost with easy deployment. This will mean that the public, businesses, and infrastructure would be vulnerable to cyber-attacks. There is also a user case within airport security and screening techniques used at border checkpoints. This research would investigate what these threats are so that the security forces can a) detect their presence and b) put effective counter measures in place to protect the public, businesses, and national infrastructure.
The aim of the research is to:
There is a growing area of research that examines security and privacy concerns, identifying attack methods and countermeasures to offer greater protection from such attacks. For example, there has been research to discover how audio from loudspeakers can be recovered from soundproof buildings due to the subtle disturbances they cause to RF transmitters such as widely available such as Wi-Fi1. The research identifies the risk and then describes how to protect against this potential attack method.
Relevance to the Intelligence Community:
The security community needs to fully understand the potential threats posed to the public, businesses, and infrastructure associated with Common-Off-The-Shelf technology that operates at the higher frequency range on 5G. Detection and early mitigation is essential to address this threat. There is also the implication of improving screening technologies at airports or borders by increasing our techniques for detection of hidden devices. Portable screening devices is a research challenge that remains unresolved.
Wei, T., Wang, S., Zhou, A., & Zhang, X. (2015). Acoustic Eavesdropping through Wireless Vibrometry. Proceedings of the 21st Annual International Conference on Mobile Computing and Networking - MobiCom '15, 130-141. doi:10.1145/2789168.2790119
Key Words: 5G, Millimetre Wave, Radio Physics, Technical Security, Wireless Sensing, Pattern Recognition, Countermeasures