--Warrior Maven Video Report Above - DARPA Works on AI-Enhanced Cybersecurity ---
By Kris Osborn - Warrior Maven
The Air Force is massively revving up efforts to defend stealth fighters, nuclear-armed missiles, air-launched weapons and crucial combat networks from crippling wartime cyber attacks by taking new steps with a special unit put together to find and fix vulnerabilities.
The service has now solidified key weapons development procedures for its Cyber Resilience Office for Weapons Systems, or CROWS. The concept for the office, established by Air Force Materiel Command, is grounded upon the realization that more and more weapons systems are increasingly cyber-reliant.
“CROWS has completed an acquisition language guidebook to support program offices in development of contracting documents ensuring cyber resiliency is baked into acquisition efforts,” Capt. Hope Cronin, Air Force spokeswoman, told Warrior Maven.
This phenomenon, wherein cybersecurity threats continue to rapidly expand well beyond IT and data systems to reach more larger platforms and weapons systems, is often discussed in terms of a two-fold trajectory. While advanced computer processing, sophisticated algorithms and better networked weapons and fire control bring unprecedented combat advantages, increased cyber-reliance can also increase risk in some key respects.
For instance, successful hacking or cyber intrusions could disrupt vital targeting and guidance systems needed for precision weapons, derail computer enabled aircraft navigation and targeting, or even seek to change the flight path of a drone or ICBM. CROWS is also designed to harvest the best thinking when it comes to anticipating potential enemy cyberattacks.
By working to “think like and enemy,” CROWS experts work with weapons developers to find vulnerabilities and areas of potential attack. As part of this, the rationale for the effort is to therefore “bake in” cyber protections early in the acquisition process so as to engineer long-term cyber resilience.
“CROWS efforts have been successful in identifying the highest risk cyber vulnerabilities and then working with the program offices to develop mitigation solutions to reduce those risks,” Cronin said. The CROWS has also developed multiple cyber training courses and published a cyber assessment methodology to be used in support of testing processes, Cronin added.