How Might an F-35 Fight Off "Hacking Attacks" in Combat

Warrior Maven

VIDEO: Army & Raytheon Build New AI-Empowered EW "Jamming" System

By Kris Osborn - Warrior Maven

(Washington D.C.) They call the F-35 a “flying computer” armed with artificial intelligence-like sensor fusion, 360-degree cameras, advanced data links, an extensive database of threat information and a complex computerized logistics systems. So what happens if the stealth fighter jet is hacked? Its threat data could be compromised, weapons guidance derailed or, perhaps worst of all, its entire flight path or data sharing systems could be destroyed.

The greater the advantage afforded by advanced computing and a new-generation of processing speed and AI-enabled algorithms, the greater the need to “harden” the system and ensure it is sufficiently resilient. This reality is not lost, for example, upon Lockheed developers or Air Force cyber specialists who have in recent years been immersed in an accelerated effort to secure weapons systems and major platforms against cyber attackers.

The Air Force has, for several years now, been taking new strides with an ambitious, yet crucial effort known as Cyber Resilience Office for Weapons Systems, or CROWS. The concept for the office, established by Air Force Materiel Command several years ago, is grounded upon the premise that countermeasures and cyber protections, such as emerging Raytheon cyber resilience technologies such as Boot Shield or Countervail for example, need to be “baked in” early and “layered” into prototypes for weapons systems early in the developmental process. Boot Shield

Raytheon’s Countervail, somewhat of an off-the-shelf technology focused on preserving data reliability and operating system functional integrity.

“Countervail can detect and recover critical files in real time and make sure that the things that are being loaded into memory are the things that you intended to be there. Countervail ensures systems in the field operate as designed. It protects system configuration and locks it in place,” Jacob Noffke, Principal Cyber Engineer, Raytheon Intelligence and Space, told Warrior in an interview.

In tandem with Countervail, Raytheon cyber engineers and scientists have developed a new small form-factor physical card called Boot Shield. The card has its own microprocessor and plugs in or attaches to a computer to both encrypt and authenticate part of the boot code, Noffke explained.

“We can leverage Boot Shield to store critical data and validate what countervail is seeing on the system. We layer these solutions together so an adversary does not have to just defeat something in the operating system but also a hardware security mechanism. We combine these two to fight through an attack,” he added.

These are just a few examples of a handful of emerging hardening technologies which seek to go beyond more narrowly configured cybersecurity methods of denying intruders access and look more broadly at how to fight off or fight through an attack should any kind of initial penetration be successful.

Along with the well-known “sensor fusion” able to organize and display crucial targeting, surveillance, avionics and navigational data on a single screen for pilots, there are a range of systems on the F-35 which rely heavily upon advanced computing. Other systems on the F-35 engineered for greater levels of automation include the Autonomic Logistics Information System, or ALIS—a logistics and sustainment computer which, among other things, assesses health and maintenance of avionics, engine systems and other aircraft functions. The idea is to replace the necessity of manual checks by engineering computers able to perform more systematic functions on their own.

Computer technology increasingly organizes, integrates and presents information for pilots with an improved efficiency and graphical user interface. Developers often refer to this as “easing” the cognitive burden so that the dynamic human mind can better direct its energy toward tasks it is uniquely able to perform, such as problem solving.

The F-35’s Distributed Aperture System, a suite of sensors around the aircraft that provides pilots a 360-degree view of the battlespace, is another example of advanced computer integration. The aircraft’s Electro-Optical Targeting System, or EOTs, is in the same category. The F-35s Mission Data Files as well, a compilation or data library of known threats specific to designated threat areas across the globe, represents the kind of system which simply cannot be hacked. Should an intruder destroy, derail or infect the database with wrong information, attacking F-35 pilots could face complete mission failure. Therefore, the threat information, which continues to grow more elaborate and extensive to incorporate emerging threats, needs to be both accessible for sensors and fire control systems needed by pilots yet also completely hardened against external attack.

This phenomenon, wherein cybersecurity threats continue to rapidly expand well beyond IT and data systems to reach larger platforms and weapons systems, is often discussed in terms of a two-fold trajectory. While advanced computer processing, sophisticated algorithms and better networked weapons and fire control bring unprecedented combat advantages, increased cyber-reliance can also increase risk in some key respects.

The increasingly serious cyber threat to major platforms and weapons systems is by no means restricted to the F-35. For instance, successful hacking or cyber intrusions could disrupt vital targeting and guidance systems needed for precision weapons, derail computer enabled aircraft navigation and targeting, or even seek to change the flight path of a drone or ICBM. CROWS is also designed to harvest the best thinking when it comes to anticipating potential enemy cyberattacks.

-- Kris Osborn is the Managing Editor of Warrior Maven and The Defense Editor of The National Interest --

Kris Osborn is the defense editor for the National Interest*. Osborn previously served at the Pentagon as a Highly Qualified Expert with the Office of the Assistant Secretary of the Army—Acquisition, Logistics & Technology. Osborn has also worked as an anchor and on-air military specialist at national TV networks. He has appeared as a guest military expert on Fox News, MSNBC, The Military Channel, and The History Channel. He also has a Masters Degree in Comparative Literature from Columbia University.*

Comments (1)
No. 1-1
eric ali
eric ali

This is actually the kind of information I have been trying to find. Thank you for writing this information.


Air

FEATURED
COMMUNITY