09-21-2018 05:57:21 PM -0700
09-21-2018 04:06:11 PM -0700
09-20-2018 10:29:38 AM -0700
09-20-2018 08:44:42 AM -0700
09-19-2018 04:17:25 PM -0700
It looks like you've previously blocked notifications. If you'd like to receive them, please update your browser permissions.
Desktop Notifications are  | 
Get instant alerts on your desktop.
Turn on desktop notifications?
Remind me later.
PJ Media encourages you to read our updated PRIVACY POLICY and COOKIE POLICY.
X


Stretch, grab a late afternoon cup of caffeine and get caught up on the most important news of the day with our Coffee Break newsletter. These are the stories that will fill you in on the world that's spinning outside of your office window - at the moment that you get a chance to take a breath.
Sign up now to save time and stay informed!

'Only a Matter of Time' Before an Airline Cybersecurity Breach, Secret Government Docs Warn

A team led by the Science and Technology Directorate at the U.S. Department of Homeland Security (DHS) recently conducted an experiment proving that it could remotely penetrate the control system of a commercial aircraft using a Boeing 757 that was parked at the Atlantic City, N.J., airport.

The disclosure was made by Robert Hickey, the aviation program manager in the DHS Cyber Security Division. According to an article at Good Planes, "The disclosure of the hacking ultimately cost Hickey his job."

Motherboard obtained DHS and other U.S. government documents in which DHS predicts it’s only a matter of time before a cybersecurity breach on an airline occurs.

The DHS response was, “While certain details of the assessment remain classified,” Hickey’s comments “lack important context, including an artificial testing environment and risk reduction measures already in place." DHS added, "Along with our federal and industry partners, DHS takes aviation cybersecurity seriously and works with both researchers and vendors to identify and mitigate vulnerabilities in the aviation sector. The aviation industry, including manufacturers and airlines, has invested heavily in cybersecurity and built robust testing and maintenance procedures to manage risks.”

Translated, it says little to address the concerns among the aviation and cybersecurity communities.

In one of the presentations from the Pacific Northwest National Laboratory (PNNL), a Department of Energy government research laboratory, it states that the “potential of catastrophic disaster is inherently greater in an airborne vehicle, and it’s just a matter of time before a cyber security breach on an airline occurs.”

Cyber attacks of the airlines’ wireless systems have already occurred. According to the FBI, in 2015 a security researcher, Chris Roberts, claimed that he had penetrated the in-flight entertainment system of an aircraft and had overwritten code on the plane’s thrust management computer while on the flight and caused the plane to briefly change course. How did he do it? According to a report from the U.S. Government Accountability Office released that same year, some Boeing and Airbus planes have Wi-Fi networks used for passenger entertainment and to connect to the Internet. These networks are also connected to the avionics systems of the aircraft themselves!

“Today’s commercial aviation backbone is built upon a network of trust; most commercial aircraft currently in use have little to no cyber protections in place,” a 2016 DHS presentation warned. Boeing estimates a 20-year-plus service life for its current aircraft, which means “15-20 years of higher cyber vulnerability,” the DHS document adds.

And according to John Hultquist, director of intelligence analysis at cybersecurity firm FireEye, "In the instances where we have seen targeting of airports, the targeting was done by actors who we believe were carrying out reconnaissance for attack. Airlines have been targeted as well. The information they have could be valuable to an actor seeking to identify and track persons of interest. The actors who shut off the lights twice in Ukraine and caused over a billion dollars in economic damage and Russian hacking groups have already probed airports."