{"id":7705,"date":"2021-04-22T10:47:03","date_gmt":"2021-04-22T13:47:03","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7705"},"modified":"2021-04-22T10:47:03","modified_gmt":"2021-04-22T13:47:03","slug":"guerra-algoritmica-el-departamento-de-defensa-de-eeuu-aborda-la-ciberseguridad-de-los-vehiculos-en-mad-hacks","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7705","title":{"rendered":"Guerra algor\u00edtmica: el Departamento de Defensa de EEUU aborda la ciberseguridad de los veh\u00edculos en &#8216;Mad Hacks&#8217;"},"content":{"rendered":"<p>Para fortalecer cibern\u00e9ticamente las plataformas vulnerables, la Red de Innovaci\u00f3n de Seguridad Nacional, que trabaja para atraer nuevos talentos para resolver los desaf\u00edos de defensa y se encuentra bajo la Unidad de Innovaci\u00f3n de Defensa, realiz\u00f3 recientemente un &#8220;hackathon&#8221; virtual y un d\u00eda de presentaci\u00f3n llamado &#8220;Mad Hacks: Fury Code&#8221;.<\/p>\n<hr \/>\n<p>The U.S. military relies on its fleet of vehicles to transport troops and gear across battlefields, but their importance could make them prime targets for cyberattacks in a future conflict.<\/p>\n<p>To better cyber-harden vulnerable platforms, the National Security Innovation Network \u2014 which works to attract new talent to solve defense challenges and is nestled under the Defense Innovation Unit \u2014 recently held a virtual \u201chackathon\u201d and pitch day called \u201cMad Hacks: Fury Code,\u201d a play on the name of the famous <em>Mad Max: Fury Road<\/em> movie.<\/p>\n<p>NSIN worked alongside Army partners at the 1st Cavalry Division, Combat Capabilities Development Command\u2019s Ground Vehicle Systems Center and the Next-Generation Combat Vehicles cross-functional team at Futures Command. Additionally, schools \u2014 such as the University of California at Berkeley, University of Washington, San Diego State University and Georgia Tech \u2014 and industry members like Dell took part, according to organizers.<\/p>\n<p>Maj. Mitch Sanik, force integration officer with the Army\u2019s 1st Cavalry Division, illustrated the challenge posed to participants:<\/p>\n<p>\u201cImagine this: It\u2019s the year 2030 and a major natural disaster has stricken a friendly country,\u201d he said in a promo video for the event. \u201cThe affected nation \u2014 a long-time ally \u2014 has requested U.S. military assistance to aid in their recovery. U.S. Army forces \u2014 including elements of 1st Cavalry Division \u2014 are called up.\u201d<\/p>\n<p>The host nation is undergoing political unrest and prior to the natural disaster, separatist groups had begun disrupting the government and attacking key public infrastructure and military facilities, Sanik said of the fictional scenario.<\/p>\n<p>\u201cThe primary objective of response teams is to deliver medical supplies, food and water to the afflicted population,\u201d he said. \u201cGiven the political instabilities, a convoy consisting of 1st Cavalry soldiers is assembled to accomplish the mission. &#8230; The convoy consists of supply trucks, personnel carriers, and a handful of their recently fielded optionally manned fighting vehicles.\u201d<\/p>\n<p>These platforms feature both autonomous and semi-autonomous operating modes and are designed to be protected from many forms of cyberattacks. However, it is possible that there are built-in vulnerabilities, he noted.<\/p>\n<p>The components supporting these vehicles rely on commercial protocols and communication standards, such as controller area network and vehicle-to-vehicle, which offer little to no communication security, Sanik said. The use of both wired and wireless communication also poses an additional risk when in close proximity to adversarial forces.<\/p>\n<p>Sanik asked participants to consider a number of questions as they developed solutions, including how operators will know a vehicle is compromised, what are the next steps if it is, and how can the military ensure the mission can continue.<\/p>\n<p>\u201cIs there a way to return the vehicle to its \u2018factory state\u2019 while still operating?\u201d he asked. \u201cAre there redundancies that could be built in to help personnel keep the mission on track? How would you regain control of a compromised vehicle if there is limited connectivity?\u201d<br \/>\nPhil Smith, cyber vehicular sciences division chief at the Ground Vehicles Systems Center, said the three focus areas of the challenge were resiliency, situational awareness, and sustainment and recovery.<\/p>\n<p>Officials asked teams to develop concepts, technologies or systems that could help human-controlled and autonomous vehicles operate through cyberattacks or electronic warfare interference and return to a \u201cknown good state\u201d with or without human intervention.<\/p>\n<p>\u201cThe example scenario we came up with was really tied to the optionally manned fighting vehicle and robotic combat vehicle programs,\u201d said Kedar Pavgi, program manager for NSIN\u2019s hacks office. \u201cCybersecurity is at the core of both of those programs and one of the concerns is that if these vehicles are compromised, they still have a job to get done. \u2026 So how would you design potential countermeasures in a way where they can still accomplish a mission, but the operator knows that &#8230; this cyberattack is happening?\u201d<\/p>\n<p>The event wasn\u2019t about penetration testing, but rather coming up with novel solutions for the problem, he said in an interview.<\/p>\n<p>Nine teams were selected from more than 500 hackathon registrants to present their ideas during a pitch event in late February. Judges from industry and the military evaluated the solutions.<\/p>\n<p>The winning teams \u2014 which were made up of academia, ventures and startups \u2014 shared a pot of $70,000 to continue developing their solutions.<\/p>\n<p>The grand prize-winning team \u2014 which took home $25,000 \u2014 was Distributed Spectrum, which created a radio frequency threat detection system.<\/p>\n<p>Their \u201csolution will detect cyberattacks in the radio spectrum in real time,\u201d according to NSIN. The system \u201cidentifies enemy transmissions designed to disrupt vehicle operations and determine the threat they pose to the vehicle\u2019s safety.\u201d<\/p>\n<p>The group was made up of students Alex Wulff, Isaac Struhl and Ben Harpe.<\/p>\n<p>Three other teams \u2014 Base8, Koala-Proof and Synergy \u2014 took home prizes of $15,000.<\/p>\n<p>The intent is for the winning teams to continue to collaborate with the Army on their concepts, Pavgi said.<\/p>\n<p>There are organizations on board right now that are working on the issue, he said.<\/p>\n<p>His message for the winners? \u201cStay in touch with them, use their feedback to continue developing your solution,\u201d he said. \u201cOne day we want your solution to be included as they develop their vehicles and bring their programs into fruition.\u201d<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.nationaldefensemagazine.org\/articles\/2021\/4\/20\/dod-tackles-vehicle-cybersecurity-at-mad-hacks\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.nationaldefensemagazine.org<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Para fortalecer cibern\u00e9ticamente las plataformas vulnerables, la Red de Innovaci\u00f3n de Seguridad Nacional, que trabaja para atraer nuevos talentos para resolver los desaf\u00edos de defensa&hellip; <\/p>\n","protected":false},"author":1,"featured_media":7706,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7705"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7705"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7705\/revisions"}],"predecessor-version":[{"id":7707,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7705\/revisions\/7707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/7706"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}