The government has new plan to ensure that your seat belts are fastened, seats are in the upright position -- and no one is hacking your plane.
- By Shane Harris
Shane Harris is a senior staff writer at Foreign Policy, covering intelligence and cyber security. He is the author of The Watchers: The Rise of America's Surveillance State, which chronicles the creation of a vast national security apparatus and the rise of surveillance in America. The Watchers won the New York Public Library’s Helen Bernstein Book Award for Excellence in Journalism, and the Economist named it one of the best books of 2010. Shane is the winner of the Gerald R. Ford Prize for Distinguished Reporting on National Defense. He has four times been named a finalist for the Livingston Awards for Young Journalists, which honor the best journalists in America under the age of 35. Prior to joining Foreign Policy, he was the senior writer for The Washingtonian and a staff correspondent at National Journal.
America’s security and intelligence agencies are teaming up with airline manufacturers to defend against a catastrophic cyberattack that could cripple the air traffic control system, interfere with the computer systems used by modern aircraft, and potentially even bring down a plane.
As part of a new program, which will be run from a federal facility outside Washington, U.S. government personnel will work alongside private-sector aviation employees to share information about computer security threats, government and corporate officials said. Their goal is to spot malicious hacker activity on computer networks and to improve the security of airline manufacturing, during which complex software programs that could create entry points for hackers are installed on passenger aircraft.
For years, cybersecurity experts and government officials have warned that the computer networks underpinning the U.S. air traffic control system could be penetrated by malicious hackers. President Barack Obama emphasized the threat in his first major address on national cybersecurity in 2009. The current air traffic control system remains vulnerable, but more modern aircraft also carry complex navigation and mechanical software, and in the future they will be connected to the air traffic system via new computer networks, making each individual airplane a potential vulnerable target.
The new government and industry information-sharing program is meant to defend "the entire system. It’s the airports, the [air traffic management] system, the supply chain, the airline manufacturers. There are a lot of attack surfaces there," said Fred Schwien, the director of Homeland Security at Boeing, which is participating in the program.
To bring all sides together, a new information-sharing and analysis center will be built at a Transportation Security Administration facility near Ft. Meade, Md., the headquarters of the National Security Agency and U.S. Cyber Command, which oversees military computer security. According to a presidential directive, Cyber Command also would be involved in responding to a cyberattack on any critical infrastructure in the United States, including the air traffic control system.
U.S. officials said the TSA is leading the program in a partnership with the Office of the Director of National Intelligence, which oversees all American intelligence agencies, and the National Counterterrorism Center, which is currently the hub for information about potential threats to the aviation system from terrorists and hijackers.
The TSA will launch a pilot program "that will focus on aviation-related security and intelligence sharing to include the private and public sectors," said a TSA spokesperson, who added it would be "premature to comment on the particulars" before the program begins. Officials didn’t say when that would happen.
A spokesperson for the Director of National Intelligence confirmed the existence of the new program but said, "We cannot comment at this time on the details of this effort as the final composition and responsibilities are still being worked out."
The government has been sharing information about threats to aviation from passengers and explosives hidden in luggage and cargo since shortly after the Sept. 11 terrorist attacks. And it’s been sharing some cyber-related threat information on a limited basis. But the new center "is going to make the information-sharing much tighter," said Schwien, the Boeing executive. "This will be a place where people will know each other and trust each other."
Schwien said that as a model, the aviation industry and government officials are looking to an existing system that connects the government with computer security personnel from banks and financial services companies. The so-called Financial Services Information Sharing and Analysis Center is a well-regarded cyberthreat program designed to counter financial fraud and defend against attacks on bank networks. Both sides are supposed to share intelligence about known hacker techniques, network breaches, and malicious software that’s being used against government or corporate networks. The group has been credited with helping banks to better monitor emails that contain computer viruses.
Cyber threats to aviation are among the oldest and most feared, since they could cause massive damage and loss of life. One of the first major cyber attacks to attract officials’ attention in Washington occurred in 1998, when a teenager broke into a Bell Atlantic telephone network and disabled the communications system at regional airport in Worcester, Mass. The hacker cut off communications to the control tower and turned off a transmitter that allowed incoming aircraft to turn on runway lights. The teenager, who later reached a plea agreement with the Justice Department, exploited a flaw in the phone system that let him also disable communications with the fire department, airport security, and the weather service for six hours.
The modern air traffic control system may fare no better than that airport in Massachusetts. Over the next decade, the federal government plans to roll out its so called NextGen system, which promises to reduce congestion in the skies and, hopefully, make air travel more efficient and less expensive. But NextGen will rely on global positioning satellites, which are vulnerable to computer hackers. Two years ago, researchers at the University of Texas at Austin demonstrated that they could commandeer the controls of a remote-piloted drone by tricking it with fake GPS coordinates.
The experiment was organized by the Department of Homeland Security, which oversees the TSA and hence is in charge of the new cyber security program for the aviation industry. The vulnerability the Texas researchers found in the GPS system was "just the tip of the iceberg of a much bigger security issue we have in this country," Logan Scott, a GPS industry consultant, told Wired magazine at the time.
Paul Rosenzweig, a cyber security expert and former Homeland Security official, wrote last year that the hackable GPS system poses a risk for commercial aviation. He said that to prevent against a catastrophe, air traffic controllers would have to use GPS that can recognize when they’re being fooled or that cross-check their position against internal navigations systems that aren’t connected to computer networks.
Devising those kinds of defensive solutions, and putting them into practice, is what the new aviation security center aims to do.
Shane Harris is a senior staff writer at Foreign Policy, covering intelligence and cyber security. He is the author of The Watchers: The Rise of America's Surveillance State, which chronicles the creation of a vast national security apparatus and the rise of surveillance in America. The Watchers won the New York Public Library’s Helen Bernstein Book Award for Excellence in Journalism, and the Economist named it one of the best books of 2010. Shane is the winner of the Gerald R. Ford Prize for Distinguished Reporting on National Defense. He has four times been named a finalist for the Livingston Awards for Young Journalists, which honor the best journalists in America under the age of 35. Prior to joining Foreign Policy, he was the senior writer for The Washingtonian and a staff correspondent at National Journal.| Cyberwar |
John Reed is a national security reporter for Foreign Policy. He comes to FP after editing Military.com’s publication Defense Tech and working as the associate editor of DoDBuzz. Between 2007 and 2010, he covered major trends in military aviation and the defense industry around the world for Defense News and Inside the Air Force. Before moving to Washington in August 2007, Reed worked in corporate sales and business development for a Swedish IT firm, The Meltwater Group in Mountain View CA, and Philadelphia, PA. Prior to that, he worked as a reporter at the Tracy Press and the Scotts Valley Press-Banner newspapers in California. His first story as a professional reporter involved chasing escaped emus around California’s central valley with Mexican cowboys armed with lassos and local police armed with shotguns. Luckily for the giant birds, the cowboys caught them first and the emus were ok. A New England native, Reed graduated from the University of New Hampshire with a dual degree in international affairs and history.| The Complex |