F-35 Is The Most Thoroughly Tested Cyber Weapon

The cutting-edge F-35 stealth fighter jet is probably one of the most cyber tested weapons systems that exists in the US department of defence inventory, it's maker says.

With almost nine million lines of software code contained within it, the warplane has previously been described by Britain's Lightning Force as essentially a flying computer.

The multimillion-pound supersonic F-35 Lightning II Joint Strike Fighter is considered to be one of the most sophisticated aircraft ever developed. The UK is embarked on a £9.1 billion program to buy 48 by 2025 of the F-35, but has pledged to purchase 138. 

Steve Over, the director of F-35 international business development at Lockheed Martin, the company which manufactures the jet, said it is probably one of the "most cyber tested weapons systems that exists in US Department of Defence inventory".

He told the Press Association: "To our knowledge we have passed every cyber test that has been applied against the F-35, but it is not an area where any of us, the US, Lockheed or our customers can afford to be complacent.

"This is an area where you have to remain vigilant, and we have to remain committed to continuing the evolution of all the IT systems on the airplane so that we stay ahead of the cyber threat that is very real and very existential."

Asked whether a cyber-attack could be conducted or carried out from an F-35 jet, he stopped short of providing an answer. "I know of nothing there we can talk about," Mr Over said.

Britain currently has 15 of the F-35B, the short take off and vertical landing variant, based in the US where they are being used for testing and training. 

News AU

You Might Also Read: 

AI Defeats Human Fighter Pilots:

Aircraft Can Be Successfully Hacked In-Flight:
 

 

« Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users
Google Workers Are Revolting »

Directory of Suppliers

Institute of Information Security Professionals (IISP)

Institute of Information Security Professionals (IISP)

The IISP is a not-for-profit organization dedicated to raising the standard of professionalism in the infromation security industry.

Harbottle & Lewis LLP

Harbottle & Lewis LLP

Harbottle & Lewis is a UK law firm specialising in in the Technology, Media and Entertainment sectors. Practice areas cover data security and data protection.

Mayer Brown

Mayer Brown

Mayer Brown is a leading global law firm with offices across the Americas, Asia and Europe. Practice areas include Cybersecurity & Data Privacy.

WinMagic Data Security

WinMagic Data Security

WinMagic provides intelligent key management for everything encryption, with robust, manageable and easy-to-use data security solutions.

Cyber Squared

Cyber Squared

Cyber Squared Inc., headquartered in Arlington, Virginia, stops sophisticated cyber threats by bridging incident response, defense and threat analysis

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

Lark

Lark

Lark (Group) Limited is a Chartered Insurance Broker (CII corporate Chartered status). Commercial services include cyber risk insurance.

Chubb Corp

Chubb Corp

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

My Data Recovery Lab

My Data Recovery Lab

Hard Drive Data Recovery, RAID Recovery and NAND Flash Data Recovery

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 220 certified security consultants helping companies and authorities prevent and manage cyber threats.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Software Factory

Software Factory

Software Factory develops custom-built high-performance software solutions and products for applications including industrial cyber security.

Wehowsky.com

Wehowsky.com

We specialize in developing innovative solutions to detect cyber threats in near real time by looking for suspicious anomalies in computer networks.

C3Compliant

C3Compliant

C3Compliant hosts a comprehensive suite of solutions for information technology, privacy and compliance personnel.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.