F-35 Is The Most Thoroughly Tested Cyber Weapon

The cutting-edge F-35 stealth fighter jet is probably one of the most cyber tested weapons systems that exists in the US department of defence inventory, it's maker says.

With almost nine million lines of software code contained within it, the warplane has previously been described by Britain's Lightning Force as essentially a flying computer.

The multimillion-pound supersonic F-35 Lightning II Joint Strike Fighter is considered to be one of the most sophisticated aircraft ever developed. The UK is embarked on a £9.1 billion program to buy 48 by 2025 of the F-35, but has pledged to purchase 138. 

Steve Over, the director of F-35 international business development at Lockheed Martin, the company which manufactures the jet, said it is probably one of the "most cyber tested weapons systems that exists in US Department of Defence inventory".

He told the Press Association: "To our knowledge we have passed every cyber test that has been applied against the F-35, but it is not an area where any of us, the US, Lockheed or our customers can afford to be complacent.

"This is an area where you have to remain vigilant, and we have to remain committed to continuing the evolution of all the IT systems on the airplane so that we stay ahead of the cyber threat that is very real and very existential."

Asked whether a cyber-attack could be conducted or carried out from an F-35 jet, he stopped short of providing an answer. "I know of nothing there we can talk about," Mr Over said.

Britain currently has 15 of the F-35B, the short take off and vertical landing variant, based in the US where they are being used for testing and training. 

News AU

You Might Also Read: 

AI Defeats Human Fighter Pilots:

Aircraft Can Be Successfully Hacked In-Flight:
 

 

« Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users
Google Workers Are Revolting »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

Nehemia Security

Nehemia Security

Nehemiah Security delivers a security risk management and analytics platform that empowers business leaders to make better, more actionable decisions.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

CyLumena

CyLumena

CyLumena's mission is to provide clients with peace of mind around cybersecurity through a cost-effective combination of preparation, prevention, and responsive action.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.