ICAO Committee To Tackle Cyber Warfare

 - February 2, 2013, 2:40 AM

During World War II, “Loose Lips Sink Ships” was a familiar slogan on both sides of the Atlantic at a time when German U-boats (U for unterwasserboot, submarine) were wreaking a deadly toll on cargo vessels transporting Allied supplies from North America to the beleaguered British Isles. Loose lips, of course, referred to the mention of shipping movements, destinations, cargoes or just about anything else to anyone not having a “need to know,” even apparently harmless comments to a friend like “Jack is going away on Thursday, and won’t be back for three or four weeks.” Overhearing that, a skilled enemy agent might tie it together with the knowledge that Jack is a merchant ship sailor; with a few more pieces of overheard chitchat, Jack might never return.

Seventy years later, there are many fewer classic spies listening for, and then attempting to piece together, incautious snippets of conversation. Instead, teams of analysts use modern technology, typified by the Internet and similar webs, to filter the zillions of bits of data that are constantly flowing by in the search for key words or phrases or other clues that could help flesh out vital intelligence information buried deep in the everyday traffic. China, the U.S. and Russia are regarded as leaders in this cyber warfare, followed by the UK, some other European NATO members and Israel.

Last year AIN learned confidentially that China had intercepted much of the huge amount of test data transmitted from many of the highly classified systems on board the military’s next-generation F-35 joint strike fighter, leading to suspicion about the surprisingly accelerated development of that country’s stealth fighters. In September, according to Aviation Week, the Marine Corps was restricted from operations away from Eglin AFB until its onboard security systems were upgraded, and this may still be the case.

Protection Against Cyberwarfare in the Civil Sector

But we are not in an actual war, so how does this affect civil aircraft operations? That is entirely unknown, because electronic components from reputable manufacturers destined for use in an avionics unit, or a civil ATC system or a ground/air/ground two-way data system such as Swim, can be compromised in the supply chain and then after installation lie dormant and undetected for perhaps years until remotely activated. And these won’t be physically destructive devices. Typically, they will have access to a large, complex system that they can disrupt or disable intermittently. In addition, these devices, such as a fake rivet head, are also difficult to detect without special facilities. Currently, products from two large Chinese electronics component manufacturers are prohibited from import into the U.S., as are their use in government contracts for completely assembled systems. However, repackaging of such components under false “approved” manufacturers’ documentation remains a major concern, as do the sometimes less than rigorous inspection protocols applied to them as they move through the handling, assembly and acceptance test processes en route to their final installation.

Examples of cyber threats were described at a cyber-security session of the recent ICAO Air Navigation Conference. Threats include:

ADS-B transmissions that showed several non-existent aircraft approaching to land simultaneously.

• Program code sabotage at a new airport terminal by software engineers who had been promised pay raises but never received them. Check-in services failed three days later, delaying 50 flights, with “knock-on” delays across airline networks.

• Tail strikes or crashes are alleged to have occurred due to incorrect crew EFB entries. But EFBs can be extremely vulnerable to unauthorized access, and EFB entries can be easily inserted when the units are connected to external networks to receive updates just before departure.

• Panelists likened a major cyber attack affecting multiple connected systems to a volcanic ash eruption, shutting down an entire region for several days at a cost of billions of dollars.

Several civil industry organizations have already launched studies of cyber threats, but their activities are not coordinated, with a number of gaps, overlaps and even incompatible standards. The Air Navigation Conference committee agreed to establish a cyber-security task force to evaluate the extent of the problem and draw up, with industry, a global cyber-security architecture.

June 2017
Concierge-level flight monitoring helps flight departments provide solutions before their passengers are even aware of a problem.


I's like to stay anonymous on this. But I see a lot of cases where you'll have a convenience store like a 7-11 or Quick Stop type of convenience store close to an AF base. They are usually staff by Indian or Pakistanians, or others from that general regeon. I have noticed how the same air crews will apparently stop there on a fairly regular basis when they are in the area, like creatures of habit. And how the employees who work there will try to to question them for seemingly small bits of seemingly harmless info., such as when and where they are flying to, or when they will be back, or what cargo will they be carrying, etc. One bit of info by itself might seem harmless. But when that data is interlinked, it could cost the lives of many service men/women, and/or many intelligence workers, interception of vital technology or weapons systems info, and national security. Many of these so called convenience store workers seem more like enemy intelligence operatives, or trained by them, to skillfully extract small seemingly harmless bits of data, that can be linked together. As as the saying goes, loose lips sink ships!!! It would be very interesting to intercept the cell phone and internet traffic of this so called convenience store workings, and see who they are passing their intelligence info on to!!!

Show comments (1)