Home » Air » DARPA Unveils Hack-Proof Drone

DARPA Unveils Hack-Proof Drone

by Kris Osborn on May 21, 2014

What's going on here?The Pentagon’s research arm unveiled a new drone built with secure software that prevents the control and navigation of the aircraft from being hacked.

The program, called High Assurance Cyber Military Systems, or HACMS, uses software designed to thwart cyber attacks. It has been underway with the Defense Advance Research Project Agency for several years after originating at the University of California, San Diego and the University of Washington, said Kathleen Fischer, HACMS program manager for DARPA.

“The software is designed to make sure a hacker cannot take over control of a UAS. The software is mathematically proven to be invulnerable to large classes of attack,” Fisher said.

QuadcopterThe mini drone is engineered with mathematically assured software making it invulnerable to cyber attack. Citing the success of mock-enemy or “red-team” exercises wherein cyber experts tried to hack into the quadcopter and failed, Fisher indicated that DARPA experts have referred to the prototype quadcopter as the most secure UAS in the world.

“We started out with the observation that many vehicles are easy for malicious hackers to tamper with the software and take control remotely. We’ve replaced all the software with our high assurance software that was developed using the tools and techniques that were invented in the program,” Fisher said.

The drone prototype was among more than 100 projects and 29 advanced research programs on display in the Pentagon’s courtyard Wednesday in what was billed as DARPA Demo Day.

The HACMS program develops system architecture models, software components and operating system software, DARPA officials said.

Vulnerabilities or security issues can arise when drones or other military aircraft are “networked” to one another such that they can share information in real time. Security risks can emerge through network protocols, software bugs or unintended interactions between otherwise correct components, DARPA officials explained.

“Many things have computers inside and those computers are networked to talk to other things. Whenever you have that situation, you have the possibility for remote vulnerabilities where somebody can use the network connection to take over and get the device to do what the attacker wants instead of what the owner wants,” Fisher explained.

The software tools used for the HACMS program can be adjusted to larger platforms. In fact, DARPA plans to transition the secure software to Boeing’s Unmanned Little Bird helicopter, DARPA officials said.

“The software is foundational so it could be used for a large number of systems,” Fisher added.

Share |

{ 49 comments… read them below or add one }

Nathan May 21, 2014 at 7:18 pm

now lets integrate this into an RQ-180 and fly it over Iran to see if they can hack it haha.

Reply

ROFLMAO May 23, 2014 at 2:26 am

Why? Didn't the US military make it clear that the drone brought down in Iran was due to mechanical / electronic problems rather than Iranian hacking?

Reply

IRAN May 23, 2014 at 6:27 am

Too late
we already did something that you cant even imagine .we hacked that and now we have your drone please just for the god sake fly it over my country one more time to make sure your system is UNHACKABLE :))))))))))))))))))))))

Reply

JohnB May 21, 2014 at 7:39 pm

Unhackable until it gets hacked.

Reply

tee May 21, 2014 at 7:49 pm

Nothing is "Unhackable" given enough time.

Reply

Me May 25, 2014 at 2:19 am

One Time Pad encryption is absolutely unbreakable. Period.

That said, you jam the GPS and command channel frequencies and it falls back to terrain maps. Jam the radar on a foggy night… All this jamming isn’t as easy as it used to be though.

So just jam the radar, fly up behind it, and lasso it by the tail.

Reply

hibeam May 21, 2014 at 8:26 pm

These unhackable drones can sit idle on the flight line with our regular drones. Waiting for someone with the political will to use them to come along. I know where the bad guys winter. Rhymes with Worth Naziristan. Call me.

Reply

Lance Brown May 21, 2014 at 10:13 pm

Great more small drone that are useless for war but made for Obama and the Army to spy on Americans… great.

Reply

engineer22 May 22, 2014 at 7:47 am

This small drone is just a prototype that tests the new software that resists hackers it's not actually used to spy on Americans in which that case they would probably use a Global Hawk

Reply

Kaleb May 23, 2014 at 10:16 am

You have a good point; if Obama is spying our calls. What else will he do to spy on the ****ing Americans!

Reply

BlackOwl18E May 21, 2014 at 11:40 pm

I don't think anything is fully hack-proof. This sounds like a marketing gimmick.

Reply

tmb2 May 22, 2014 at 4:05 am

"Unsinkable…"

Reply

Musson May 22, 2014 at 10:29 am

LOL!

Reply

Chuang Shyue Chou May 21, 2014 at 11:50 pm

"The mini drone is engineered with mathematically assured software making it invulnerable to cyber attack.."

I wonder what that means.

Reply

blight_ May 22, 2014 at 10:35 am

I guess it means some kind of encryption algorithm that will take forever to brute force..yeah right.

Did the NSA tell them that?

Reply

ROFLMAO May 23, 2014 at 2:32 am

Don't cut the sentence off. It says " … invulnerable to … large classes of attack."

Translation: the drone is hackable by small classes of attack.

So the point of contention is really what "large" means.

As for "mathematically proven", since it's being used by the US govt / military, so statistically it means this: BS.

Reply

Rob May 22, 2014 at 12:45 am

Don't need to hack it if you are able to block/interrupt signals to and from it. No easy solution for this scenario. If make it self destruct it's a total loss of money. If make it auto-return to base, it may get tracked back. If do nothing, it can just be modified and used against us. Maybe consider booby trapping it or attempt to virus any computer connected to it. A dormant system that puts out a GPS ping an hour after signal lost. Maybe even spontaneously combust after so it's ruined.

Reply

Beno May 22, 2014 at 4:19 am

Agree, the only way to realistically deal with this is a return to safe point on inertial guidance. Trident can be 10m accurate on inertial guidance systems. And they require no external input.
Im doubting this would be cheap tho ?
Beno

Reply

Shea May 22, 2014 at 9:09 am

If it's "off-the-shelf" technology that is already in service, it will only require $10 billion and 5 years to field.

Reply

Bernard May 22, 2014 at 10:40 am

The weakest link in most secure systems are the people using them. If you can hack the people then you don't need to hack the equipment. Regardless, no system is unhackable although they can certainly be engineered to higher standards to lower the risks of being hacked.

Reply

Carlos A Sfc Ret May 22, 2014 at 11:59 am

In my old encryption school
when I was in the military
There was a signed that said:
NEVER TRUST NO ONE
NOT EVEN YOURSELF

Reply

Bill May 22, 2014 at 2:05 pm

Guess it's not using Windows software then.

Reply

john boomer May 22, 2014 at 7:13 pm

I was thinking a 750 pound iron gravity bomb would be totally unhackable.

Reply

hooliman May 22, 2014 at 7:20 pm

our ww2 planes were unhackable… oh the problems we create for ourselves.

Reply

Vincent May 22, 2014 at 8:20 pm

"Yeh the Iranians didn't hack our RQ170, that's why we made a hack-proof drone"

Reply

Shakes May 22, 2014 at 8:42 pm

Where's that digital iceberg?

Reply

voodkokk May 22, 2014 at 9:04 pm

See this is exactly why our security sucks and the people in charge need to be removed. There is no such thing as a 100% secure system and it just has not been hacked yet.

Reply

deanegilmour May 22, 2014 at 9:42 pm

And how many times have we heard that "hack proof" statement. Just a challenge to the criminals on the web around the globe

Reply

JJ Murray May 23, 2014 at 7:34 am

First, there is no such thing as "hack proof" and anyone who makes a claim like that is either showing their arrogance, ignorance, or is trying to sell you a bill of goods.
Second, no need to hack a drone. All you need is a basic noise jammer between the drone and the controller and get it on the right frequency and the controller no longer has control. A bunch of guys in a cave might not pull this off, but individuals in the US have already built jammers in their garages that jam police radar guns for example so how hard would it be for a group with some money behind them to do, let alone a government.

Reply

Kaleb May 23, 2014 at 10:07 am

If this so called "hack proof" drone has software that cant be hacked and controlled by hostile solders; why don't they use it in the war; that's my problem. What do you think please reply.

Reply

Kaleb May 23, 2014 at 10:09 am

This is just a lie; nothing with software is NOT hack proof; bring out the real truth U.S.

Reply

Jack Bauer May 23, 2014 at 10:47 am

24….

Reply

rangedsp May 24, 2014 at 11:43 am

dude, exactly what i had in mind

Reply

John May 24, 2014 at 1:33 pm

I'm pretty sure I know a way to key these in an innovative way. I just need to talk to the right person. @Blackacre

Reply

Anon May 24, 2014 at 11:24 pm

By "mathematically proven" the article means "formally verified" (see https://en.wikipedia.org/wiki/Formal_verification ) and it means that there is a machine-check mathematical proof that states that under certain assumptions (hardware is correct, etc), the software on the system would fullfill its specifications, regardless of anything and everything else that may be going on. This can be hacked only if the attacker is able to either subvert some of the assumptions, or if the specification itself is too weak. Both are at least a theoretical possibility, but it is indeed "hack-resistent" (while not necessarily 100% hack-proof). And by the way, the code is all open source – see http://smaccmpilot.org/

Reply

Thunder350 May 25, 2014 at 12:33 pm

Countdown to some kid easily hacking this (like all the other "hackproof" things) for fun has begun.

Reply

ONTIME May 25, 2014 at 3:13 pm

I wonder if they put a self destruct on this flying bolt package, if it's swiped and goes off course without reason then why give it away again?

Reply

spec May 26, 2014 at 11:31 pm

uhmmm, probably because none of drones produced in the US can stay on course all the time, not even on take off sometimes!

Reply

Shamrock5472 May 27, 2014 at 3:49 pm

But if the chips are from China …. it can be hacked in a heartbeat.

Reply

Gary May 28, 2014 at 4:00 pm

If it detects hacking attempts it should fail safe to plan "B": target a much more critical larger target and adjust the warhead for copious amounts of collateral damage thusly discouraging future attempts at messing with our drone.

Reply

Rob C. May 29, 2014 at 9:07 pm

One can only hope they keep tight lid on how this software works or how to duplicate it. A lot of US secrets seem to get nabbed due to leaks in the companies and US State departments who develop and maintain them. Its been big concern of mine about hacking, of these flying aresenals and being turned on us the users or render incapable of fighting.

I do however suspect eventually, a new cyber-race will need to begin to maintain this "invulernablity". Nothing is unknowable forever, people are too darn determined not over come a challenge.

Reply

www.ask.com September 12, 2014 at 9:28 pm

Hey there! Do you know if they make any plugins to
assist with SEO? I’m trying to get my blog to rank for some targeted keywords but I’m not seeing very good results.
If you know of any please share. Appreciate it!

Reply

Wildman September 17, 2014 at 1:49 am

Why not use BlackBerry to encrypt the data? Even the president STILL uses a blackberry.

Reply

hcg Weight loss success Stories September 20, 2014 at 12:06 pm

Some dieters reportedly shed up to 40 lbs in just 6 weeks, resulting in an average loss of 1 pound per day.
Besides seafood a couple of times every week, rely of
plenty of colorful fruit, leafy green veggies and nuts to fill up your belly.
As a matter of fact, it has been found than men using
HCG in losing weight tend to have better effects than female
users in most cases.

Reply

fiberglass marine cooler with cushion September 21, 2014 at 2:02 am

Running the compressor of the above room air conditioners involves
high electricity consumptions and bills. Fly Fishing Setup Tips
- Fly fishing is a great way to catch more trout.
There are so many great places to go while you are there.

Reply

Fort Lauderdale CPA supplies September 21, 2014 at 2:06 am

For example, if your home office is 100 square feet and your
home is a total of 2000 square feet, then your
percentage is 5%. You need to seek Tax Filing Help if you
would like stay away from Tax Levy complications like a Wage Levy or
Bank Levy. For conducting the additional analysis on the specific
CPA network, which will assist you to earn funds, all you want to do is you will need to place in the identify of that network along with
some other applicable keyword phrases that could possibly
assist you in discovering out if there is any precise challenge
with that individual organization.

Reply

twitter sports marketing agency September 21, 2014 at 2:23 am

It’s a relationship tool and relationships take time

to develop. When I launched my first business, I thought I knew a bit about marketing.

Telling people or ‘broadcasting’ a message will not help you

to market any product. In the event you build a blog, you have a big database of articles from which to

choose to add to ones Twitter database.

Reply

lose weight September 21, 2014 at 3:13 pm

“If you are interested in losing weight with HCG hormone therapy, it is important that you also follow a special diet as well. Besides seafood a couple of times every week, rely of plenty of colorful fruit, leafy green veggies and nuts to fill up your belly. To be able to be in a kickboxing class in Royal Palm Beach, FL and know that you are accomplishing many different aspects of life is just amazing.

Reply

meriton serviced apartments brisbane September 30, 2014 at 3:13 pm

When you rent a corporate apartment in Melbourne,
you are assured of the best service. However, these
apartments can be rented for minimum 7 days. With so many more attractions to be explored, Edinburgh has the
magic of making your holiday or business trip very interesting and exciting.
Although luxury hotels in Melbourne are a popular
accommodation option in such cases, but nowadays the concept of short
stay apartment and serviced apartments are being popular and perfect alternative of luxury hotel.

Reply

Leave a Comment

Previous post:

Next post: