19 août 2019 | International, Aérospatial

The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

By Joseph Marks

LAS VEGAS — In a Cosmopolitan hotel suite 16 stories above the Def Con cybersecurity conference this weekend, a team of highly vetted hackers tried to sabotage a vital flight system for a U.S. military fighter jet. And they succeeded.

It was the first time outside researchers were allowed physical access to the critical F-15 system to search for weaknesses. And after two long days, the seven hackers found a mother lode of vulnerabilities that — if exploited in real life — could have completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight.

They even found bugs that the Air Force had tried but failed to fix after the same group of hackers performed similar tests in November without actually touching the device.

“They were able to get back in through the back doors they already knew were open,” Will Roper, the Air Force's top acquisition official, told me in an exclusive briefing of the results.

The hackers lobbed a variety of attacks — including injecting the system with malware and even going at it with pliers and screwdrivers. When I saw it, the metal box that's usually secure on the aircraft had wires hanging out the front.

The hackers briefed Roper on the findings on Saturday afternoon. He was surrounded by discarded pizza boxes, iced coffee drinks — and the hotel's drinking glasses filled with screws, nuts and bolts removed from five fully dismantled TADS devices, which run about $20,000 a pop.

He'd expected the results to be about this bad, Roper told me on a private tour of the hacking event. He pinned the weaknesses on decades of neglect of cybersecurity as a key issue in developing its products, as the Air Force prioritized time, cost and efficiency.

He's trying to turn that around, and is hopeful about the results of the U.S. government's newfound openness to ethical hackers. He'd come straight from Def Con's first-ever Aviation Village, which the Air Force helped establish, and was wearing a gray T-shirt with the words “No, Mr. Bond, I expect you to hack,” emblazoned on the front — a riff on a classic line from the 1964 James Bond film “Goldfinger.”

This is a drastic change from previous years, when the military would not allow hackers to try to search for vulnerabilities in extremely sensitive equipment, let alone take a literal whack at it. But the Air Force is convinced that unless it allows America's best hackers to search out all the digital vulnerabilities in its planes and weapons systems, then the best hackers from adversaries such as Russia, Iran and North Korea will find and exploit those vulnerabilities first, Roper told me.

“There are millions of lines of code that are in all of our aircraft and if there's one of them that's flawed, then a country that can't build a fighter to shoot down that aircraft might take it out with just a few keystrokes,” he said.

Roper wants to put his military hardware where his mouth is.

During next year's Def Con conference, he wants to bring vetted hackers to Nellis or Creech Air Force bases near Las Vegas where they can probe for bugs on every digital system in a military plane, including for ways that bugs in one system can allow hackers to exploit other systems until they've gained effective control of the entire plane.

He also wants to open up the ground control system for an operational military satellite for hacker testing, he said.

“We want to bring this community to bear on real weapons systems and real airplanes,” Roper told me. “And if they have vulnerabilities, it would be best to find them before we go into conflict.”

Those hacking challenges will also be useful for the private sector because military planes and satellites share many of their computer systems with the commercial versions of those products, Roper said, and the Air Force can share its findings.

The seven hackers probing the TADS devices were all brought to Vegas by the cybersecurity company Synack, which sells the Pentagon third-party vulnerability testing services, under a contract with the Defense Digital Service, a team of mostly private-sector technology stars who try to solve some of the Pentagon's thorniest technology problems during short-term tours.

The Defense Digital Service started by organizing large-scale hacking competitions in 2016, with names such as “Hack the Pentagon” and, eventually, “Hack the Air Force.” These were open to almost anybody — but included only public-facing hacking targets such as military service websites and apps.

Shortly after, they also began opening more sensitive systems to a smaller number of vetted hackers who sign nondisclosure agreements.

DDS has run about a dozen of those more sensitive hacking competitions so far, but this is the first time it has offered up the same system for hacking twice, said Brett Goldstein, DDS's director, who earned a reputation in technology as Open Table's IT director and chief data officer for the city of Chicago.

“That's important because security is a continuous process,” he told me. “You can't do an exercise and say, ‘Oh, we found everything' and check the box. You need to constantly go back and reevaluate.”

They also allowed the hackers to be more aggressive this time and to physically disassemble the TADS systems to get a better idea of what kinds of digital attacks might be effective, Goldstein said. That meant the hackers could simulate a cyberattack from adversaries that had infiltrated the vast network of suppliers that make TADS components and had sophisticated knowledge about how to compromise those elements.

They could also advise the Air Force about flaws in how the TADS hardware was built that make it more susceptible to digital attacks.

Moving forward, Roper told me, he wants to start using that knowledge to mandate that Air Force vendors build better software and hardware security controls into their planes and weapons systems upfront so the Air Force doesn't have to do so much cybersecurity work on the back end.

He's up against an arcane and byzantine military contracting process, however, that's going to make those sorts of fundamental reforms extremely difficult, he acknowledged.

In some cases, the company that built an Air Force system owns the software embedded in that system and won't let the Air Force open it up for outside testing, he says. In other cases, the Air Force is stuck with legacy IT systems that are so out of date that it's difficult for even the best technologists to make them more secure.

“It's difficult to do this going backward, but we're doing our best,” Roper told me. “I can't underscore enough, we just got into the batter's box for what's going to be a long baseball game.”

https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/08/14/the-cybersecurity-202-hackers-just-found-serious-vulnerabilities-in-a-u-s-military-fighter-jet/5d53111988e0fa79e5481f68/

Sur le même sujet

  • A220 : les fournisseurs d’Airbus toujours sous pression pour réduire leurs coûts de 20 %

    30 septembre 2019 | International, Aérospatial

    A220 : les fournisseurs d’Airbus toujours sous pression pour réduire leurs coûts de 20 %

    Par Maxime Bertrand Airbus vise toujours une réduction de 20 % des coûts de la part de ses fournisseurs afin d'assurer la rentabilité de l'A220. C'est ce qu'ont déclaré les pdg d'Airbus et d'Airbus Canada, Guillaume Faury et Philippe Balducchi, lors d'une rencontre avec la presse montréalaise jeudi. Nous avons progressé, mais le processus n'est pas terminé, a déclaré Philippe Balducchi, pdg d'Airbus Canada L'A220 a vraiment besoin d'une accélération, d'un renforcement du programme de réduction des coûts, a renchéri Guillaume Faury, pdg d'Airbus. Le géant européen a pris les commandes du programme né de la C Series de Bombardier – renommé A220 depuis – en juin 2018. Pas plus tard qu'en octobre 2018, le pdg d'Airbus affirmait qu'il lui faudrait « des années » avant que l'A220 devienne une réussite économique. En entrevue avec la presse montréalaise, les deux dirigeants ont soutenu jeudi qu'il était normal que l'effort demandé soit plus important pour l'A220 que pour les autres appareils de la flotte d'Airbus, car le programme en est à ses débuts et qu'il faut repositionner l'appareil, accélérer la cadence de production et entrer dans une zone de rentabilité. Selon la direction de l'avionneur, tous les appareils en début de production doivent relever ce genre de défi. Airbus se donne trois ans pour terminer le processus entamé il y a une quinzaine de mois et parvenir à une réduction des coûts de 20 %. La démarche ne s'arrêtera pas là, préviennent les dirigeants, car les baisses des coûts devront également s'inscrire dans le temps. À la fin de mai dernier, le carnet de commandes d'Airbus comptait 536 appareils A220. Au salon aéronautique du Bourget, en juin, l'entreprise a annoncé de 70 appareils A220. Dossier des avions de chasse Dans le dossier des avions de chasse, la direction d'Airbus a dit s'être retirée avec beaucoup de regret de l'appel d'offres du gouvernement canadien. Elle croit que sa présence au Canada gr'ce à l'A220 permettra d'accroître sa visibilité et de saisir les occasions futures qui se présenteront. Différend commercial entre l'Europe et les États-Unis Par ailleurs, la direction d'Airbus a réagi à la décision de l'Organisation mondiale du commerce (OMC) d'autoriser les États-Unis à imposer des droits de douane annuels de 7,5 milliards de dollars sur les produits européens dans le cadre du conflit sur les subventions dans le domaine de la construction aéronautique. Il s'agit d'un différend de 15 ans entre Boeing et Airbus, donc entre les États-Unis et l'Europe, qui s'accusent mutuellement de consentir des aides illégales à leurs avionneurs. Nous croyons que tout le monde sort perdant d'une guerre commerciale, a déclaré Guillaume Faury. Si des droits sont imposés par les deux parties, cela entraînera une hausse des coûts de déplacement et nous rendra moins concurrentiels. Nous croyons que les parties finiront par s'entendre et que la voix de la sagesse sera la plus forte. Nous continuons à militer en faveur d'une entente, nous croyons qu'il est possible d'y parvenir. https://ici.radio-canada.ca/nouvelle/1319890/a220-avion-reduction-couts-programme-airbus

  • Contract Awards by US Department of Defense - July 8, 2019

    9 juillet 2019 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité, Autre défense

    Contract Awards by US Department of Defense - July 8, 2019

    DEFENSE INFORMATION SYSTEMS AGENCY Affinity Innovations LLC,* Hanover, Maryland (HC1047-19-D-2020); Applied Systems Engineering Joint Venture LLC,* Annapolis Junction, Maryland (HC1047-19-D-2021); A Square Group LLC,* Rockville, Maryland (HC1047-19-D-2022); Business Computers Management Consulting Group LLC,* Falls Church, Virginia (HC1047-19-D-2023); Bluestone Logic LLC,* Washington, District of Columbia (HC1047-19-D-2024); Credence Management Solutions LLC,* Vienna, Virginia (HC1047-19-D-2025); DHPC Technologies Inc.,* Woodbridge, New Jersey (HC1047-19-D-2026); InCadence Strategic Solutions Corp.,* Manassas, Virginia (HC1047-19-D-2027); INNOPLEX LLC,* Columbia, Maryland (HC1047-19-D-2028); Innovation Evolution Technologies JV LLC,* Reston, Virginia (HC1047-19-D-2029); Innovative Government Solutions JV LLC,* Virginia Beach, Virginia (HC1047-19-D-2030); Integrated Systems Inc.,* Tysons Corner, Virginia (HC1047-19-D-2031); Interactive Process Technology LLC,* Billerica, Massachusetts (HC1047-19-D-2032); Mission Support LP,* McLean, Virginia (HC1047-19-D-2033); NetCentric Technologies Inc.,* Wall, New Jersey (HC1047-19-D-2034); Riverside Engineering LLC,* Vienna, Virginia (HC1047-19-D-2035); Semper AASKI Alliance Inc.,* Canyon Lake, Texas (HC1047-19-D-2036); Superlative Technologies Inc.,* Ashburn, Virginia (HC1047-19-D-2037); Synergy Business Innovation & Solutions Inc.,* Arlington, Virginia (HC1047-19-D-2038); TekSynap Corp.,* Reston, Virginia (HC1047-19-D-2039); Tiber Creek Consulting Inc.,* Fairfax, Virginia (HC1047-19-D-2040); ValidaTek Inc.,* Arlington, Virginia (HC1047-19-D-2041); and VOLANT Associates LLC,* Chantilly, Virginia (HC1047-19-D-2042), were each awarded an indefinite-delivery/indefinite-quantity (ID/IQ) contract for Systems Engineering, Technology and Innovation (SETI). This was a competitive solicitation for a multiple-award ID/IQ contract. Two pools were solicited, one unrestricted and one restricted for small businesses. These awards are for the restricted pool. The contracts in the unrestricted pool were awarded on June 14, 2018. The face value of the entire ID/IQ is a ceiling amount of $7,500,000,000. Awardees will each receive a minimum guarantee of $500 applicable to the base ordering period only. All other funding will be obligated at the task order level. Performance locations will be identified at the task order level and may be worldwide. Proposals were solicited via the Federal Business Opportunities website and 99 proposals were received for the restricted pool. The period of performance is a five-year base period with one five-year option period. The Defense Information Technology Contracting Organization, National Capital Region, is the contracting activity. NAVY Lockheed Martin Corp., Lockheed Martin Aeronautics Co., Fort Worth, Texas, is awarded $41,269,021 for modification P00002 to a previously awarded order (N00019-19-F-2474) placed against basic ordering agreement N00019-14-G-0020. This modification exercises an option for the design, procurement and integration of flight test instrumentation and data processing solutions for F-35 Lightning II development test aircraft to support the Tech Refresh-3 and the Follow on Modernization Block 4 mission systems configuration. Work will be performed in Fort Worth, Texas, and is expected to be completed in February 2021. Fiscal 2019 research, development, test and evaluation (Air Force) and non-U.S. Department of Defense (DoD) participant funds in the amount of $2,470,993 are being obligated at time of award, none of which will expire at the end of the current fiscal year. This modification combines purchases for the Air Force ($16,501,005; 40%); Navy ($8,250,503; 20%); Marine Corps ($8,250,503; 20%); and non-U.S. DoD participants ($8,267,010; 20%). The Naval Air Systems Command, Patuxent River, Maryland, is the contracting activity. Deloitte Consulting LLP, Arlington, Virginia, is awarded a $21,656,574 indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract for execution of sustainment and technical support for special projects and electronic systems for experimental, demonstration and developmental technology for the Navy, Department of Homeland Security, Customs and Border Protection and other government agencies. This is one of four multiple-award contracts. All awardees will have the opportunity to compete for task orders during the ordering period. This three-year contract includes two two-year option periods, which, if exercised, would bring the cumulative value of this contract to an estimated $52,659,079. Work will be performed in San Diego, California, and work is expected to be completed July 7, 2022. If all options are exercised, the period of performance would extend through July 7, 2026. No funds will be obligated at the time of award. Funds will be obligated as task orders and are issued using research, development, test and evaluation (Navy); operations and maintenance (Navy); other procurement (Navy); and Department of Homeland Security. This contract was competitively procured via Request for Proposal N66001-18-R-0110, which was published on the Federal Business Opportunities website and the Naval Information Warfare Systems Command e-Commerce Central website. Four offers were received and four were selected for award. Naval Information Warfare Center Pacific, San Diego, California, is the contracting activity (N66001-19-D-0111). Serco Inc., Herndon, Virginia, is awarded an $18,163,831 indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract for execution of sustainment and technical support for special projects and electronic systems for experimental, demonstration and developmental technology for the U.S. Navy, Department of Homeland Security, Customs and Border Protection and other government agencies. This is one of four multiple-award contracts. All awardees will have the opportunity to compete for task orders during the ordering period. This three-year contract includes two two-year option periods, which, if exercised, would bring the cumulative value of this contract to an estimated $44,421,226. Work will be performed in San Diego, California, and work is expected to be completed July 7, 2022. If all options are exercised, the period of performance would extend through July 7, 2026. No funds will be obligated at the time of award. Funds will be obligated as task orders and are issued using research, development, test and evaluation (Navy); operations and maintenance (Navy); other procurement (Navy); and Department of Homeland Security. This contract was competitively procured via Request for Proposal N66001-18-R-0110, which was published on the Federal Business Opportunities website and the Naval Information Warfare Systems Command e-Commerce Central website. Four offers were received and four were selected for award. Naval Information Warfare Center Pacific, San Diego, California, is the contracting activity (N66001-19-D-0113). McKean Defense Group LLC, Philadelphia, Pennsylvania, is awarded a $17,594,138 indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract for execution of sustainment and technical support for special projects and electronic systems for experimental, demonstration and developmental technology for the Navy, Department of Homeland Security, Customs and Border Protection and other government agencies. This is one of four multiple-award contracts. All awardees will have the opportunity to compete for task orders during the ordering period. This three-year contract includes two two-year option periods, which, if exercised, would bring the cumulative value of this contract to an estimated $42,574,062. Work will be performed in San Diego, California, and work is expected to be completed July 7, 2022. If all options are exercised, the period of performance would extend through July 7, 2026. No funds will be obligated at the time of award. Funds will be obligated as task orders and are issued using research, development, test and evaluation (Navy); operations and maintenance (Navy); other procurement (Navy); and Department of Homeland Security. This contract was competitively procured via Request for Proposal N66001-18-R-0110, which was published on the Federal Business Opportunities website and the Naval Information Warfare Systems Command e-Commerce Central website. Four offers were received and four were selected for award. Naval Information Warfare Center Pacific, San Diego, California, is the contracting activity (N66001-19-D-0112). Alutiiq Information Management LLC, Kodiak, Alaska, is awarded a $15,292,491 indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract for execution of sustainment and technical support for special projects and electronic systems for experimental, demonstration and developmental technology for the Navy, Department of Homeland Security, Customs and Border Protection and other government agencies. This is one of four multiple-award contracts. All awardees will have the opportunity to compete for task orders during the ordering period. This three-year contract includes two two-year option periods, which, if exercised, would bring the cumulative value of this contract to an estimated $36,742,366. Work will be performed in San Diego, California, and work is expected to be completed July 7, 2022. If all options are exercised, the period of performance would extend through July 7, 2026. No funds will be obligated at the time of award. Funds will be obligated as task orders are issued using research, development, test and evaluation (Navy); operations and maintenance (Navy); other procurement (Navy); and Department of Homeland Security. This contract was competitively procured via Request for Proposal N66001-18-R-0110, which was published on the Federal Business Opportunities website and the Naval Information Warfare Systems Command e-Commerce Central website. Four offers were received and four were selected for award. Naval Information Warfare Center Pacific, San Diego, California, is the contracting activity (N66001-19-D-0110). ARMY The Boeing Co., Mesa, Arizona, was awarded a $21,567,229 modification (P00004) to foreign military sales (United Kingdom) contract W58RGZ-17-D-0052 for engineering services. Work locations and funding will be determined with each order, with an estimated completion date of Aug. 2, 2022. U.S. Army Contracting Command, Redstone Arsenal, Alabama, is the contracting activity. Princeton Hydro LLC,* Ringoes, New Jersey, was awarded a $9,900,000 firm-fixed-price contract for architect-engineering services for navigation and flood damage projects. Bids were solicited via the internet with four received. Work locations and funding will be determined with each order, with an estimated completion date of July 7, 2024. U.S. Army Corps of Engineers, New York, New York, is the contracting activity (W912DS-19-D-0003). DEFENSE LOGISTICS AGENCY Parker Hannifin Corp., Irvine, California, has been awarded a maximum $13,828,991 firm-fixed-price delivery order (SPRPA1-19-F-KP2V) against a five-year basic ordering agreement (SPE4A1-17-G-0011) for F/A-18 spare parts. This was a sole-source acquisition using justification 10 U.S. Code 2304 (c)(1), as stated in Federal Acquisition Regulation 6.302-1. This is a 47-month contract with no option periods. Location of performance is California, with a June 30, 2023 performance completion date. Using military service is Navy. Type of appropriation is fiscal 2019 through 2023 Navy aircraft procurement funds. The contracting activity is the Defense Logistics Agency Aviation, Philadelphia, Pennsylvania. UPDATE: Easy Street JD&S LLC, Carol Stream, Illinois (SPE8EC-19-D-0041), has been added as an awardee to the multiple award contract issued against solicitation SPE8EC-17-R-0002 announced Nov. 8, 2016. *Small business https://dod.defense.gov/News/Contracts/Contract-View/Article/1898178/source/GovDelivery/

  • Bourget 2019 : le Ministère des Armées sélectionne le drone NX70

    17 juin 2019 | International, Aérospatial

    Bourget 2019 : le Ministère des Armées sélectionne le drone NX70

    Par BOQUET Justine Le Ministère des Armées a sélectionné le micro-drone NX70 de Novadem. Novadem a annoncé le 17 juin que son drone NX70 avait été sélectionné par le Ministère des Armées pour venir équiper les soldats français déployés en opérations extérieures. Plus de 50 micro-drones auraient ainsi été commandés par la DGA, pour un montant d'un peu plus de 2 M€. « Chacun des 27 systèmes acquis est composé de deux micro-drones, d'un segment sol et du soutien technique associé », a détaillé l'entreprise aixoise. Les premiers systèmes ont d'ores et déjà été remis à la DGA et ont été évalués par la STAT (Section Technique de l'Armée de Terre). Ces drones viendront équiper les soldats de l'Armée de Terre afin de renforcer leurs moyens de détection et ainsi les doter d'outils d'observation leur permettant de mieux appréhender leur environnement tactique. « Au-delà de ses capacités de détection et de reconnaissance de jour et de nuit, le NX70 peut être doté de capacités étendues lui permettant, par exemple, d'assurer des missions d'observation de plusieurs heures gr'ce à son dispositif d'alimentation en énergie depuis le sol via un c'ble libérable en plein vol », détaille Novadem. Petit drone tactique pesant environ 1 kilo, le NX70 dispose d'une portée de 3 km et d'une autonomie de 45 minutes. Sa capacité à voler en environnement complexe lui permettra ainsi de s'adapter aux thé'tres d'opération, peu importe leurs caractéristiques météorologiques. https://www.air-cosmos.com/article/bourget-2019-le-ministre-des-armes-slectionne-le-drone-nx70-10359

Toutes les nouvelles