Back to news

September 12, 2018 | International, C4ISR

Cyberattack risk poses biggest threat to airports, aviation

A senior official from Tampa International Airport (TPA) told US lawmakers the risk of cyberattack “without question represents the preeminent and persistent threat” to global aviation.

The comments came during a Sept. 6 joint hearing of the House Homeland Security Committee's Cybersecurity and Transportation Security subcommittees, held to examine cyber threats to aviation.

“In today's modern and technologically advanced airports, there are virtually no areas or functions that do not rely at some level on a digital network,” TPA EVP-IT and general counsel Michael Stephens said. “The operational importance of these systems ... makes airports immensely appealing targets and potentially vulnerable to malicious cyber threats, such as criminal organizations and state sponsored actors.”

In his testimony, Stephens said US airports have reached a point “where voluntary compliance is no longer adequate,” and asked lawmakers to consider mandating the adoption of “uniform minimum cyber security standards and frameworks.”

He also said the “human factor remains the most highly exploited vector” for breaching cyber defenses, and threat awareness and information security training programs for airport, airlines and aviation industry employees are “perhaps one of the most effective and cost-efficient ways of increasing airports' and airlines' cybersecurity readiness.”

Lawmakers also heard from Christopher Porter, chief intelligence strategist at cybersecurity group FireEye, Inc., who testified that state-backed hackers are “routinely” targeting the US aviation industry through cyberespionage to steal industrial secrets from manufacturers, researchers and operators of military and civilian aircraft.

Porter called cyberespionage the “most common cyber threat facing the aviation industry,” and said that hackers sponsored by China, Russia and more recently Iran have all “targeted the US or its close allies for theft of aviation secrets.” All three countries also routinely target ticketing and traveler data, shipping schedules and even partner industries like railways or hotels as part of their counterintelligence efforts, Porter added.

However, Porter reminded lawmakers that, because cyber-espionage is routine, “it should not be viewed as destabilizing.”

“When cyberespionage operators get a foothold on a system, they can often use that access for stealing information or to launch a disabling or destructive attack using the same technology,” Porter said. “But they rarely choose to do so, and in the US, there are significant redundancies in place to ensure safety. A crashed IT system does not mean a crashed plane, and it's important for the public to keep that in mind.”

http://atwonline.com/security/cyberattack-risk-poses-biggest-threat-airports-aviation

On the same subject

  • Bell out to win Australia’s bid for special ops helicopters

    March 1, 2019 | International, Aerospace

    Bell out to win Australia’s bid for special ops helicopters

    By: Mike Yeo MELBOURNE, Australia – Bell is positioning itself for Australia's special operations helicopter requirement by showcasing its offerings and promoting local industry tie-ups at the Avalon Airshow. Speaking to Defense News, Dan McQuestin, Bell's business development director for Australia, New Zealand and Papua New Guinea, confirmed that the company responded to a request for information issued by the Australian Army, offering the Bell 407 or Bell 429 helicopters with local partner Hawker-Pacific. The helicopters being offered for Australia's Land 2097 Phase 4 requirement will be commercial off the shelf, with kits developed to meet the majority of mission requirements spelled out in the RFI. These include air assault, intelligence-gathering, and troop transport. There is also a potential requirement for the helicopter to be weaponized in the future. McQuestin said that 60 weaponized Bell 407 are already operating with a customer in the Middle East, and existing customers have expressed interest in an armed configuration of the Bell 429. The company is preparing to offer a similar weapons kit tfitted to the 407 on the 429, with two, four or six weapons stations. McQuestin also confirmed that four Bell 407s can fit inside a Boeing C-17A Globemaster III airlifter, adhering to one of the requirements set out in the RFI. He added that testing is ongoing with the Bell 429 to assess its compatibility on the C-17 with government customers elsewhere. The company has its Bell 407 and 429 helicopters painted in camouflage on the static display at the show currently being held at Avalon Airport outside Geelong in Victoria, Australia. Partner Hawker Pacific in Australia submitted the response to the RFI as the prime contractor. Trevor Thomas, government relations adviser to Hawker Pacific in Australia added that the company, which is well-established in defense and performance-based sustainment contracts in Australia, is a “natural fit” with Bell. It also has local experience with special operations equipment, and is fulfilling a sustainment contract to support the Royal Australian Air Force's fleet of 49 Pilatus PC-21 trainer aircraft. Defense News reported last year that Land 2097 Phase 4 is seeking at least 16 helicopters to fulfil the requirement, with major delivery of equipment to be delivered in 2022 and initial operating capability to follow soon after. A request for tender is expected at the end of this year. https://www.defensenews.com/digital-show-dailies/avalon/2019/02/26/bell-out-to-win-australias-bid-for-special-ops-helicopters/

  • Here’s what an intel chief thinks industry needs to know

    August 16, 2018 | International, C4ISR

    Here’s what an intel chief thinks industry needs to know

    By: Mark Pomerleau The director of the Defense Intelligence Agency had a pointed message for members of industry; whatever solution is pitched, it has to be understood in the context of how it will be used. Like many top defense leaders giving presentations nowadays, Lt. Gen. Robert Ashely, speaking Aug. 13 at the DoDIIS conference in Omaha, Nebraska, stressed the need for industry's help going forward to solve DIA's tough problems. However, solutions must not work just in the lab, but also in the operating environment military and intelligence leaders believe forces will be conducting operations in the future. “Through my career I've seen too many times the technology looks great in the lab ... but it doesn't scale to the battlefield,” he said. Full Article: https://www.c4isrnet.com/show-reporter/dodiis/2018/08/15/heres-what-the-dia-director-wants-industry-to-know/

  • The new ways the military is fighting against information warfare tactics

    July 22, 2020 | International, C4ISR

    The new ways the military is fighting against information warfare tactics

    Mark Pomerleau One of the clearest examples of how the military wants to defeat adversaries using information warfare is by publicly disclosing what those enemies have been doing and what capabilities they have. Information warfare can be abstract, combining cyber, intelligence, electronic warfare, information operations, psychological operations or military deception as a way to influence the information environment or change the way an adversary think. “At our level, the most important thing we can do is to be able to expose what an adversary is doing that we consider to be malign activity, in a way that allows that to be put in the information environment so that now more scrutiny can be applied to it,” Lt. Gen. Timothy Haugh, commander 16th Air Force, the Air Force's newly established information warfare organization, told reporters during a media round table in late February. One of the first ways the Department of Defense has sought to test this is through U.S. Cyber Command's posting of malware samples to the public resource VirusTotal. Malware samples discovered in the course of operations by the Cyber National Mission Force are posted to the site to inform network owners. It also helps antivirus organizations of the strains build patches against that code and helps identify the enemies' tools being used in ongoing campaigns. Haugh, who most recently led the Cyber National Mission Force, explained how these cyber teams, conducting what Cyber Command calls hunt forward operations, were able to expose Russian tactics. U.S. military teams deploy to other nations to help them defend against malign cyber activity inside their networks. “Those defensive teams then were able to identify tools that were on networks and publicly disclose them, [and] industry later attributed to being Russian tools,” he said. “That was a means for us to use our unique authorities outside the United States to be able to then identify adversary activity and publicly disclose it.” Officials have said this approach changes the calculus of adversaries while also taking their tools off the battlefield. “Disclosure is more than just revealing adversary intent and capabilities. From a cyberspace perspective, disclosure is cost imposing as it removes adversary weapons from the ‘battlefield' and forces them to expend resources to create new weapons,” Col. Brian Russell, the commander of II Marine Expeditionary Force Information Group, told C4ISRNET in June. “Disclosure forces the adversary to ask: ‘How were those capabilities discovered?' It causes them to investigate the cause of the disclosure, forcing them to spend time on something other than attacking us. If I can plant a seed of doubt (messaging) that the disclosure might have been caused by someone working on the inside, it makes them question the system's very nature, perhaps spending more time and resources to fix the system.” The NSA has demonstrated a similar tactic when it created its cybersecurity directorate in late 2019. The entity was formed in part, due to the fact that adversaries were using cyberspace to achieve strategic objectives below the threshold of armed conflict. Now, the directorate uses its intelligence and cyber expertise to issue advisories to the network owners of cybersecurity threats so they can take the necessary steps to defend themselves. One recent advisory had direct bearing on a nation state's malicious activity, according to a senior intelligence official. In late May, the agency issued an advisory regarding a vulnerability in Exim mail transfer agent, which was being widely exploited by a potent entity of Russia's military intelligence arm the GRU called Sandworm. “Quickly thereafter, we saw five cybersecurity companies jumped on it and really used that to deepen and expand and publish information about the GRU's infrastructure that they use to conduct their cyberattacks and further information as well,” the official told reporters in early July. “That was terrific because we felt that that had a direct impact on a major nation state in terms of exposing their infrastructure ... and we saw significant patch rates go up on a vulnerability that we knew they were using. That's the kind of thing that we're looking for.” The military has had to think differently to combat for how adversaries are operating. “A central challenge today is that our adversaries compete below the threshold of armed conflict, without triggering the hostilities for which DoD has traditionally prepared,” Gen. Paul Nakasone, commander of Cyber Command, wrote in prepared testimony before the House Armed Services Committee in early March. “That short-of-war competition features cyber and information operations employed by nations in ways that bypass America's conventional military strengths.” These disclosures or efforts to call out malign behavior have also taken the forms of media interviews and press releases. For example, Gen. Jay Raymond, the head of U.S. Space Command and the commandant of Space Force, said in a February interview in which he detailed what he deemed unacceptable behavior by Russia in space, a surprising charge given how tight lipped the U.S. government typically is about its satellites. “We view this behavior as unusual and disturbing,” he said of Russian satellites creeping up to American ones. “It has the potential to create a dangerous situation in space.” Or consider that leaders from Africa Command on July 15 issued a press release detailing the activities of the Wagner Group, a Russian security company, as acting on behalf of the Russian state to undermine the security situation in Libya. “U.S. Africa Command (AFRICOM) has clear evidence that Russian employed, state-sponsored Wagner Group laid landmines and improvised explosive devices (IEDs) in and around Tripoli, further violating the United Nations arms embargo and endangering the lives of innocent Libyans,” the release said. “Verified photographic evidence shows indiscriminately placed booby-traps and minefields around the outskirts of Tripoli down to Sirte since mid-June. These weapons are assessed to have been introduced into Libya by the Wagner Group.” Moreover, Africa Command's director of operations called out Russia, noting that country's leaders have the power to stop the Wagner Group, but not the will. Sixteenth Air Force, at the request of C4ISRNET, provided a vignette of such behavior from Russia in the form of how it covered up the explosion of a radioactive rocket, dubbed Skyfall. According to the service, Russia took extreme steps to curb monitoring of the site where the explosion took place and sought to conceal the true nature of the explosion potentially hindering surrounding civilian populations from receiving adequate medical treatment and guidance. With new forces integrated under a single commander, using unique authorities to collect intelligence and authorities to disclose, 16th Air Force is now better postured to expose this type of malign activity, which previously the U.S. government just didn't do. Top Pentagon leaders have explained that the dynamic information warfare space requires a new way of thinking. “We've got to think differently. We've got to be proactive and not reactive with messaging,” Lt. Gen. Lori Reynolds, the Marine Corps' deputy commandant for information, told C4ISRNET in an interview in March. “We have been very risk averse with regard to the information that we have. You can't deter anybody if you're the only one who knows that you have a capability.” https://www.c4isrnet.com/information-warfare/2020/07/20/the-new-ways-the-military-is-fighting-against-information-warfare-tactics/

All news