DoD Tackles Vehicle Cybersecurity at 'Mad Hacks'.

AuthorTadjdeh, Yasmin
PositionAlgorithmic Warfare

* The U.S. military relies on its fleet of vehicles to transport troops and gear across battlefields, but their importance could make them prime targets for cyberattacks in a future conflict.

To better cyber-harden vulnerable platforms, the National Security Innovation Network--which works to attract new talent to solve defense challenges and is nestled under the Defense Innovation Unit--recently held a virtual "hackathon" and pitch day called "Mad Hacks: Fury Code," a play on the name of the famous Mad Max: Fury Road movie.

NSIN worked alongside Army partners at the 1st Cavalry Division, Combat Capabilities Development Command's Ground Vehicle Systems Center and the Next-Generation Combat Vehicles cross-functional team at Futures Command. Additionally, schools--such as the University of California at Berkeley, University of Washington, San Diego State University and Georgia Tech--and industry members like Dell took part, according to organizers.

Maj. Mitch Sanik, force integration officer with the Army's 1st Cavalry Division, illustrated the challenge posed to participants:

"Imagine this: It's the year 2030 and a major natural disaster has stricken a friendly country," he said in a promo video for the event. "The affected nation--a long-time ally--has requested U.S. military assistance to aid in their recovery. U.S. Army forces--including elements of 1st Cavalry Division--are called up."

The host nation is undergoing political unrest and prior to the natural disaster, separatist groups had begun disrupting the government and attacking key public infrastructure and military facilities, Sanik said of the fictional scenario.

"The primary objective of response teams is to deliver medical supplies, food and water to the afflicted population," he said. "Given the political instabilities, a convoy consisting of 1st Cavalry soldiers is assembled to accomplish the mission....The convoy consists of supply trucks, personnel carriers, and a handful of their recently fielded optionally manned fighting vehicles."

These platforms feature both autonomous and semi-autonomous operating modes and are designed to be protected from many forms of cyberattacks. However, it is possible that there are built-in vulnerabilities, he noted.

The components supporting these vehicles rely on commercial protocols and communication standards, such as controller area network and vehicle-to-vehicle, which offer little to no communication security, Sanik said. The use of both...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT