Articles

Air Force 4-Star: F-16s may be vulnerable to cyber attack

Air Force fighter jet mission data, sensors, missiles, intelligence information, precision guidance technology, data links and weapons targeting systems are all increasingly integrated with computer systems in today's fast-moving high-tech warfare environment -- a scenario which simultaneously upgrades lethality, decision-making and combat ability while also increasing risk and cyber-vulnerability, senior service leaders explained.


With this paradox and its commensurate rationale in mind, senior Air Force leaders unveiled a comprehensive "cyber campaign plan" designed to advance seven different lines of attack against cyber threats.

While faster processing speeds, advanced algorithms and emerging computer programs massively increase the efficiency, accuracy and precision of combat networks and weapons systems, increased computer-reliance also means weapons systems themselves can become more vulnerable to cyber-attack in the absence of sufficient protection.

For instance, how could Joint Direct Attack Munitions pinpoint targets in a combat environment where GPS signals have been destroyed, hacked or knocked out? What if navigation and geographical orientation were destroyed as well? How could an F-35 use its "sensor fusion" to instantly integrate targeting, mapping and threat information for the pilot if its computer system were hacked or compromised? How could drone feeds provide life-saving real-time targeting video feeds if the data links were hacked, re-directed, taken over or compromised?

These are precisely the kind of scenarios Air Force future planners and weapons developers are trying to anticipate.

Seven Lines of Attack 

Speaking at the annual Air Force Association Air Warfare Symposium, National Harbor, Md., Gen. Ellen Marie Pawlikowski Commander, Air Force Materiel Command, delineated the inspiration and direction for the 7 lines of attack.

US Air Force photo

A key impetus for the effort, as outlined in the first line of attack, is working to secure mission planning and recognized cyber vulnerabilities, Pawlikowski explained.

For instance, she explained the prior to embarking upon a global attack mission, an Air Force F-16 would need to acquire and organize its intelligence information and mission data planning – activities which are almost entirely computer-dependent.

"We did some mission planning before we got that in the air. Part of that mission planning was uploaded into a computer," Pawlikowski said.  "An OFP (operational flight plan) is developed using software tools, processors and computers. When you lay out a mission thread it takes to conduct a global mission attack, you find that there are cyber threat surfaces all over the place. How do you make sure your F-16 is secure? We need to address each and every one of those threat surfaces."

A U.S. Air Force F-16 Fighting Falcon fighter aircraft assigned to the 18th Aggressor Squadron takes off from Eielson Air Force Base, Alaska | US Air Force photo by Tech. Sgt. Joseph Swafford Jr.

The second line of attack is described in terms of technology acquisition and weapons development procedures. The idea, Pawlikowski said, was to engineer future weapons systems with a built-in cyber resilience both protecting them from cyber-attacks and allowing them to integrate updated software and computer technology as it emerges.

"We want to understand cyber security as early as we can and develop tools that are needed by program managers. We want to engineer weapons systems that include cyber testing in developmental and operational tests," she said.

Brining the right mixture of cyber security experts and security engineers into the force is the thrust behind the third line of attack, and working to ensure weapons themselves are cyber resilient provides the premise for the fourth line of attack.

"We can't take ten years to change out the PNT (precision, navigation and timing) equipment in an airplane if there is a cyber threat that negates our ability to use GPS," Pawlikowski explained.

Part of this equation involves the use of an often-described weapons development term called "open architecture" which can be explained as an attempt to engineer software and hardware able to easily accommodate and integrate new technologies as they emerge. Upon this basis, weapons systems in development can then be built to be more agile, or adaptive to a wider range of threats and combat operating conditions.

In many cases, this could mean updating a weapons system with new software tailored to address specific threats.

"Open mission systems enable me in avionics to do more of a plug-and-play capability, making our weapons systems adaptable to evolving cyber threats," she explained.

The fifth line of effort involves establishing a common security environment for "classification" guides to ensure a common level of security, and the sixth line of attack involves working with experts and engineers with the Air Force Research Laboratory to develop built-in cyber hardening tools.

US Air Force photo

For instance, Pawlikowski explained that by the 2020s, every Air Force base would have cyber hardening "baked" into its systems and cyber officers on standby against potential cyber-attack.

Preparing to anticipate the areas of expected cyber threats, and therefore developing the requisite intelligence to prepare, is the key thrust of the seventh line of effort.

"We planned and built our defenses against an expectation of what our adversary was able to do. We need to understand where the threat is going so we can try to defend against it," Pawlikowski said.

Humor

The truth about cell phones in Basic Training

Thank god you got out when you did! The moment you received your DD-214, it was officially an end of an era. Hopefully, your branch won't fall victim like all those other, weaker branches did. It's Lord of the Flies in here.

New recruits are arriving in droves and they're pulling out their cell phones to record themselves talking back to their drill sergeants. If the drill sergeants have a problem with it, they whip out their stress cards, go back to eating their Tide Pods, and continue listening to their music (which, coincidentally, has gotten progressively worse since your generation, too).

Keep reading... Show less
Articles

How R. Lee Ermey's Hollywood break is an inspiration to us all

While there have been many outstanding actors and celebrities who have raised their right hand, there has never been a veteran who could finger point his way to the top of Hollywood stardom quite like the late great Gunnery Sergeant R. Lee Ermey.

Keep reading... Show less
Military Life

5 reasons your troops are more important than promotion

If there's one complaint common across the military, it's that commanders too often care more about their careers than the well-being of their troops. It's problematic when higher-ups are willing to put lower enlisted through hell if it means they look good at the end of the day.

Keep reading... Show less
Military Life

'Operation Cure Boredom' is a funny, unrepentant look back at life in the 1990s Air Force

The following is an excerpt from the first book by Air Force veteran and Hollywood writer Dan Martin. Titled Operation Cure Boredom, it's a hilarious collection of short stories chronicling the adventures of Martin's 1990-1994 enlistment in the world's best Air Force.

This chapter, called "Guest on the Range," is about the extraordinary lengths Martin went to in order to qualify on the firing range as a junior enlisted Crew Chief.

Keep reading... Show less
Military Life

The top 6 reasons people decide to join the infantry

Deciding to join the military is a huge step for anyone looking to make a life-altering change. One of the most appealing aspects of becoming a member of the armed forces is the vast array of professional opportunities the service offers.

You can sign up, ship out, and, within a few short months, be guarding a military installation as your newfound brothers- and sisters-in-arms sleep.

Keep reading... Show less
GEAR & TECH

These high-tech glasses could change how sailors train

Training has evolved over the years but the core elements have always remained the same. There's an instructor and a bunch of students. They go over material, both in theory and in practice, mastering the skills required by the job. But no matter how good the teacher, students will always need a refresher from time to time. So, that means it's time to go back to school — or does it?

Now, mixed-reality technology — including smart glasses — could change the way sailors learn the skills they need to serve.

Keep reading... Show less
Entertainment

6 US conflicts that would (probably) make terrible video games

When developers set out to make video games, their focus should always primarily be on crafting a fun and engaging experience. Oftentimes, you'll see video games set far in the future so that developers can place an arsenal of advanced, sci-fi weaponry in the hands of the player — because it's fun. Other times, they'll take cues from real wars and toss the player directly into the heat of a historical battle — because that's fun, too.

Keep reading... Show less
Tactical

How to start a fire with only one hand

Heading out into the wilderness for a camping trip is exhilarating and refreshing. Starting a campfire and roasting some marshmallows under the stars is a great way to get in touch with Mother Nature. Although the idea of spending a night in the great outdoors sounds incredible, campers should always remember to bring specific tools and learn important survival skills in the event they sustain an injury and help is far, far away.

It gets cold out there at night, so it's important to know the basics of starting a fire to keep warm — even in the dire circumstance that you've been injured. Do you know how to start a fire with just one hand? You never know — this skill might just save your life.

Keep reading... Show less