Media: Pentagon experts warned of F-35 cyber vulnerability

70
The team of Pentagon’s chief tester informed the command of the vulnerability of the F-35 Lightning II digital fighter system for cyber attacks, reports Look with reference to Janes.com.

Media: Pentagon experts warned of F-35 cyber vulnerability


"The Pentagon recognized the need to conduct a more thorough check of the cyber vulnerability of F-35," writes the resource. “Michael Gilmore, director of the US Department of Defense, expressed concern about the possible delay in developing aircraft combat software.”

Nevertheless, the military promised that "the most advanced software for the fighter will be ready in the 2017 year."

Previously, the media have already expressed doubts that the development of a new fighter will ever be completed.

“Ten years after the first flight of the F-35, its development has not yet been completed, although the 180 aircraft have already been built. None of them can fight, each will have to be modified when the final version is ready. This does not make much sense, because the F-35 has a number of flaws that will instantly destroy it in practice, ”wrote American Thinker magazine in mid-January.

And in early January, the plane hit the rating of the “most unsuccessful fighters”, compiled by the National Interest.
70 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. -8
    27 January 2016 14: 13
    Hooray!!! All patriots for a snack - Penguin blundered again !!! But seriously, how is this possible? He is not connected via Wi-Fi with the land and AWACS.
    1. +16
      27 January 2016 14: 17
      Communication goes through an encrypted channel, but still through electromagnetic waves. And they can be intercepted. So the vulnerability is the place to be.
      1. +7
        27 January 2016 14: 25
        What about encryption? He doesn’t just have a receiver that responds to any signal. Any signal can be hammered by interference, of course, but what does it have to do with cyber vulnerability then. It is rather from the area of ​​electronic warfare.
        1. +5
          27 January 2016 15: 11
          Quote: Maksus
          What about encryption? He doesn’t just have a receiver that responds to any signal. Any signal can be hammered by interference, of course, but what does it have to do with cyber vulnerability then. It is rather from the area of ​​electronic warfare.

          .. in 2015, one of the mattress cybersecurity specialists, while on the plane from the tablet, "broke" the control system .. although now under a criminal case, but the essence remains true .. to get into the communication and control channel .. last year I don't remember who already announced that ours have learned to slip "false data" on the radio altimeter .. hi
          1. +1
            27 January 2016 15: 18
            If from a tablet, then this is a shame. In theory, the very structure of the code for civilian and military equipment should be different, and the Americans seem to use general principles. Do not be surprised if they have equipment running under Windows ....
            1. 0
              27 January 2016 20: 42
              On a number of ships of the U.S. Navy, the BIUS is running a slightly modified MS Win2K.
      2. 0
        27 January 2016 15: 01
        Intercept and block, which is very important.
      3. Dam
        0
        28 January 2016 01: 30
        Does he have any strong places? A day later, some kind of article about glitches and flaws. Interestingly, this invisible shit basically flies?
    2. 0
      27 January 2016 14: 23
      and no one canceled the satellite channels ... plus everything can be jammed with interference and packets of parasites ....
    3. +19
      27 January 2016 14: 26
      Quote: Maksus
      But seriously, how is this possible? He is not connected via Wi-Fi with the land and AWACS.

      ----------------------
      Seriously, its predecessor F-22 has closed communication channels and cannot exchange data in a group, everything needs to be done through ... sorry, a dispatcher on the ground who decides, or rather, administers, without seeing the real situation. All this happens with a time delay, and in general it makes the F-22 an airplane of one flight task. With the F-35 they decided to get away from this, but the communication channels are intercepted and encryption has a limited durability in time. The computer on board the aircraft becomes obsolete in 5 years, computers on the ground are constantly being improved. So the interception and decoding of the signal — and instantly, is not an overly complicated task. Therefore, they are afraid to throw wunderwafers into combat zones, because even cave barmalei have skilled cyberjihad fighters.
      1. 0
        27 January 2016 14: 41
        Also, the cooling of the equipment is fuel, so the F-35 is not for hot countries.
      2. +9
        27 January 2016 15: 00
        F-22 Raptor is controlled by two fault tolerant onboard computers,
        called CIP - Common Integrated Processor. In each of them - 66 modules,
        each module is based on the i32 960-bit RISC processor
        ))))))))))))) I960 processors are the predecessors of the Pentium.
        In the late 1990s, the release of Intel i960 was discontinued.
        Now it may turn out that your cell phone has more processing power than the F-22)))
        1. The comment was deleted.
        2. VP
          +1
          27 January 2016 16: 57
          He doesn’t say anything. If he successfully copes with the functions assigned to him, then why put a more advanced one and fit the rest of the equipment under it?
      3. +1
        27 January 2016 16: 37
        Quote: Altona
        A computer on board an airplane becomes obsolete in 5 years,


        Who told you this? A computer is a computer. It is a fairly autonomous device. But the channels of informational interaction between the aircraft and the earth, indeed, should be fast-acting and protected from both natural and artificial interference.
    4. +12
      27 January 2016 14: 31
      Quote: Maksus
      All patriots for a snack - Penguin blundered again !!!

      News about the F-35 in number competes with news about Ukraine. smile
      1. +2
        27 January 2016 14: 44
        And the minuses are the same drinks
      2. +5
        27 January 2016 14: 45
        There is also a difference - mattresses for a flying offspring still allocate more money and more often than for jumping. laughing
    5. RDX
      0
      27 January 2016 22: 32
      F35 looks like a refrigerator, all in flags and stickers)))
  2. +7
    27 January 2016 14: 13
    Is he also vulnerable to hackers? laughing Well, just a miracle is an airplane.
    1. +1
      27 January 2016 14: 22
      Is he also vulnerable to hackers?
      -----------------------------
      quite real, if you remember, they recently showed a plot of how craftsmen seized control of a sophisticated jeep; in the end, he simply moved to a ditch.
      1. +1
        27 January 2016 14: 31
        Quote: guzik007
        how craftsmen seized control of a sophisticated jeep

        it was even a passenger Boeing and Airbus!
        Researcher Demonstrates Management Takeover ...
        habrahabr.ru ›Apps4All Blog› blog / 176381
        The payload can be downloaded with a simple tap, and from that moment the flight control system is remotely controlled by a hacker. ... The difference between Watermelon and Boeing is only in the "shape of the pens", while the Boeing is still the traditional "helm".
    2. +1
      27 January 2016 14: 32
      I didn’t drink coffee, there’s no pilot, no connection, no plane. Wonders...
  3. +2
    27 January 2016 14: 14
    Yes, what kind of cyber vulnerability is there .... This plane is a big vulnerability for the budget, and in general "did not work out a little" ... There would be more such))) and there will be no money left for the rest)
  4. +6
    27 January 2016 14: 15
    The Pentagon’s chief tester team informed the command of the vulnerability of the F-35 Lightning II fighter’s digital system to cyber attacks,

    Cool airplane turned out, current and have time to cut the loot. Some are able lol
  5. +1
    27 January 2016 14: 15
    If vulnerable, then it will fall ...
  6. 0
    27 January 2016 14: 17
    So what is "peremoga"? As their Ukrainian pets say, because only they have a situation of "full arctic fox" called beautifully and briefly - "peremoga")))
  7. 0
    27 January 2016 14: 18
    Damn, put Kaspersky on computers! Only sell it for a trillion bully
    1. +2
      27 January 2016 15: 24
      Quote: Abbra
      Put Kaspersky on computers!

      it’s a direct diversion after Casper, they don’t have a place for cards
  8. +2
    27 January 2016 14: 20
    Ten years after the first flight of the F-35, its development is still not completed, although 180 aircraft have already been built.

    Well, okay ... The main goal has already been achieved! Namely: "sell" expensive pieces of iron to the allies and remove the "fat" at once. Businessmen are great! Engineers are not very ...
  9. 0
    27 January 2016 14: 21
    headlines of newspaper articles from the near future - "An epidemic among the penguins", "Mass deaths of invisible from viruses" laughing
  10. 0
    27 January 2016 14: 24
    F-35 - a great training ground for sucking money from the budget. Sucked 10 years, why not suck?
  11. 0
    27 January 2016 14: 25
    After each such article, I have two thoughts:
    1) Where are our fifth generation aircraft?
    2) Where are they able to cut money better - in our sphere of politics and housing and communal services, or in the case of amers in the field of defense?
    1. -5
      27 January 2016 14: 30
      Wait, haven't you noticed 100500 of our fifth generation aircraft? Ours will be better, not only in the 17th, but by the year 27th. Then we laugh even more gloatingly at the Yankees. Just before that, we will solve the problem with the engine, that is, we will finally start our own production, eradicate corruption and find the means to order the series, otherwise we have decided to purchase 48 of the 12 claimed, and this is very small for the new series.
      1. -4
        27 January 2016 14: 35
        Americans now need to develop and build new ones again, by then PAK will already be on the wing, and they will have trouble with this F-35.
      2. +1
        27 January 2016 15: 47
        Quote: Svoy_tovarish
        Wait, haven't you noticed 100500 of our fifth generation aircraft?
        - the absence of the required number of 5th generation aircraft, we quite successfully compensate for the S-300/400 hi
      3. VP
        0
        27 January 2016 17: 05
        Perhaps by the 27th the Americans would decide to take 35 into service. Until now, they are hesitant to do so.
        They let out a bulge and refuse to accept it for service.
    2. VP
      +1
      27 January 2016 17: 02
      For fifth generation aircraft, ours and not ours, a good article
      http://judgesuhov.livejournal.com/144148.html
  12. +2
    27 January 2016 14: 33
    Your mother, he also has cyber vulnerability ...
    Maybe stop pretending and pretend it's a plane?
    Immediately honestly admit that this is crap.
    Incomprehensible, expensive and a little able to fly.
  13. +1
    27 January 2016 14: 41
    Listen, if you think so, then our planes can also be attacked through cyber space, but ours do not panic!
    we conclude: AGAIN WILL ASK THE BUTTERFLY!
    1. 0
      27 January 2016 20: 55
      In order to break the algorithmic support of our aircraft, a programmer and physical access to the computer are needed. This is not technical backwardness at all; these are the requirements of information security.
  14. 0
    27 January 2016 14: 43
    And in general, it is vulnerable, and it costs a lot of money, and it doesn’t fly very well.
  15. +3
    27 January 2016 14: 44
    No need for skepticism. They will bring it to completion. Similar statements knock out big budget money. Let us recall what thorns the F-16 went through, but the result is obvious.
  16. +5
    27 January 2016 14: 47
    "None of them can fight, each will have to be modified" ///

    The battle can be fought by any of them - the question is, what battle ... Fights of the 5th generation
    significantly different from the 4th battles. And the difference just hangs a lot on software.

    The F-35, in contrast to the F-22 Raptor, is the so-called "flexible software architecture".
    It can be infinitely improved and easily adapted to any
    present and future avionics and weapons systems. In F-22, this is impossible, therefore
    the project is at an impasse.
    But flexibility and weakness - more bugs, vulnerabilities, "memory" leaks.
    Those user countries that are good at software like England, Israel, and Norway
    will be able to improve their aircraft to their needs and their weapons.
    And who does not bang - will be very dependent on Lockheed.
  17. +2
    27 January 2016 14: 49
    In today's world, not only American technology may be subjected to cyber-attack.
    I think ours is no exception, although to a lesser extent.
  18. -1
    27 January 2016 14: 52
    In short, they were scared of our electronic warfare. They will put them in a super-duper airplane, like a banal drone
  19. 0
    27 January 2016 14: 52
    Previously, the media have already expressed doubts that the development of a new fighter will ever be completed.
    And this, of course, is no longer funny. So much money swelled into the project. Still, the Americans are able to build financial pyramids.
  20. +6
    27 January 2016 14: 56
    Quote: mpzss
    Listen, if you think so, then our planes can also be attacked through cyber space, but ours do not panic!


    our planes? ... through cyberspace ...? lol
    I beg you ... the calculator Electronics MK-52 is not a thread for you there Winda - it is not only through cyberspace, it is not so easy to break it directly with a hammer ... lol
    1. +1
      27 January 2016 15: 00
      Quote: kitamo
      our planes? ... through cyberspace ...?

      Do planes use a navigation system? Receive data from satellites?
      I think 2 times you can answer "Yes"
      Therefore vulnerable
      1. 0
        27 January 2016 15: 04
        yes I joked ... smile
        1. 0
          27 January 2016 18: 42
          yes I joked
          But it turned out well wink
      2. 0
        27 January 2016 21: 07
        Aircraft fly by ANN, Glonas / GPS are mainly used for correction. It is physically impossible to break the digital computer through the Glonas / GPS signal receiver.
  21. 0
    27 January 2016 14: 57
    Media: Pentagon experts warned of F-35 cyber vulnerability
    Not experts warn of the presence of trash in the form of Phi-35 in the United States.
  22. +4
    27 January 2016 14: 58
    Until now, fighters flew kerosene.
    The Americans, the first in the world, managed to create a fighter flying in dollars.
  23. 0
    27 January 2016 15: 02
    "Ten years after the first flight of the F-35, its development is still incomplete ..."

    I wonder how many new millionaires emerged in the US during these 10 years? And how much more will appear due to this eroplan?
  24. +4
    27 January 2016 15: 03
    Even we were not upset
  25. +2
    27 January 2016 15: 05
    Can plywood sheathe it?
  26. +1
    27 January 2016 15: 07
    Once again I’m convinced that ours did the right thing by focusing on electronic warfare, something tells me that no matter what an air monster the United States creates, it will be rubbish against a country that has advanced electronic warfare
  27. +2
    27 January 2016 15: 17
    Well this is certainly a discovery! Isn't all electronics using cyber vulnerable?
    1. 0
      27 January 2016 21: 36
      No, only the one that has direct access to the network is vulnerable.
  28. +2
    27 January 2016 15: 20
    "Damn, put Kaspersky on your computers! We'll only sell it for a trillion"

    Then it does not take off, the computer hangs on it ... ny.
    You can hack everything, the only question is the time to hack. Really during the flight someone managed to crack the F-35 system? Here is junk, not a system.
  29. 0
    27 January 2016 15: 36
    Well, all is not thank God. The question is, what the hell did they start to produce it? What would be the first? fool
  30. 0
    27 January 2016 15: 42
    Vulnerability)) Recently, the topic surfaced that the overwhelming amount of software for the Pentagon is written with the help of Russian programmers (globalization), and of Chinese and Indian ones too. How many of these programmers cooperate with the special services is unknown ... In addition, all modern technology is based on microcontrollers, which are produced thanks to the same globalization in different countries, respectively, there is a risk of "bookmarks" at this level. Well, no one canceled the possibility of a banal hack))
    1. 0
      27 January 2016 18: 45
      And here I recall
      A friend told me that for 6 years he has been living in the USA and is engaged in programming games in one large American company.

      We decided to remember the good old 90 and bought a game about the Second World War. I don’t remember what is called - but there was such a turn-based strategy. Played for the Russians, won, began to play for the Germans for fun. And what is surprising - with the overwhelming superiority of forces, there is necessarily at least one front on which the Soviet troops defeat, and then the end comes to all the forces of the Nazis. In general, no matter how hard they try, it does not seem possible to win the war for Germany!
      I argued with the Americans that the game has a condition that the Germans cannot win in principle. We got into the code, began to search ... I don’t know where exactly there, but found a place after which the Yankee colleagues could not understand my enthusiasm. Inside the code, the phrase was commented out:

      "And because, as long as at least one Russian is alive, we will not give up the Motherland to you!"
      Looks like our guys were among the developers.
  31. +1
    27 January 2016 15: 44
    I think that such development of staffers is only to the benefit of the whole world. 180 not flying killers! This is great.
  32. +1
    27 January 2016 15: 57
    Cyber ​​vulnerability of the F-35 th? Why not? Recently, the Amerov general was perplexed to report that about 8 drones delivered to Ukraine flew to Russia. They say the Russians in flight changed the flight program and planted in their territory. But at first the Americans were surprised that we could even see them, then they were surprised that these drones were accompanied by ours. Now they stopped wondering and began to fear out of habit ... bully
  33. +1
    27 January 2016 16: 07
    Everything, Americans, your time is over! Long live Russia!
  34. 0
    27 January 2016 16: 30
    Something that reminds all fun early 2000s: www.vtdesign.ru/winwars_2000 wassat
  35. INF
    +2
    27 January 2016 17: 09
    As I understand it, the Hankey was hacked!
  36. +1
    27 January 2016 17: 20
    Hehehe ... Hackers will be able to bring down this plane without any problems)))
    1. +1
      27 January 2016 18: 48
      And who said
      without any problems)))
      ? And not to shoot down, but to seize control, but yes ...