Monday, April 09, 2012
Achilles' High-Tech Heel(s) - F-35 Must Read
There's no KISS when it comes to the F-35. Keep It Simple Stupid is not on the menu. The F-35 is all about complex, state-of-the-art complex. It may be too complex for its own good or ours for that matter.
A report from Computer Security Organization online looks at hacking vulnerabilities of America's civilian/military logistics chain that keeps their aerial tankers operating. It suggests that it's not very difficult for a clever hacker to keep those tankers on the ground when they're needed most. For a limited-range light bomber, just like the F-35, that means it would have to remain in the hangar.
Meanwhile, AviationWeek, reports the US Navy is facing this very same sort of troubles in America's strategic shift from the Middle East to Asia.
New technologies—including aircraft carriers and stealthy strike aircraft—will be transferred to the Asia-Pacific theater. But equally new, foreign-built surveillance systems, electronic attack weapons and cyberinvasion tools are unexpectedly threatening crucial sensors and communications on advanced ships and aircraft, say top Pentagon officials.
The advanced F-35 Joint Strike Fighter, for example, has a new vulnerability. Its wide-angle field-of-view radar can be attacked with cyberweapons through its active, electronically scanned array (AESA) antennas. Airborne cyberweapons form data beams that can be packed with malware and directed into a target antenna. These devices are being developed by several nations specifically to electronically attack, jam, invade and exploit high-value, airborne targets, say U.S. electronic warfare (EW) specialists.
In particular, U.S. analysts have been watching China develop EW platforms to attack specific types of high-value sensor and command-and-control aircraft, says a longtime U.S. EW specialist. These include E-3 AWACS air-to-air radar, E-8 Joint Stars air-to-ground radar and P-8 maritime surveillance aircraft.
“Electronic attack can be the method of penetrating a system to implant viruses,” says the EW specialist. “You’ve got to find a way into the workings of that [target] system and generally that’s through some sort of emitted signal.”
Moreover, three years ago, several terabytes of data—some of it related to the F-35’s electronics systems—were copied during a series of break-ins of contractor networks. Penetrations were traced to known Chinese Internet addresses.
High-tech is very much a double-edged sword. It works great until the other side figures out how to use it against you. Anybody getting the feeling we - and the Americans - are getting in over our heads on this one?