{"id":678,"date":"2017-11-16T15:55:13","date_gmt":"2017-11-16T15:55:13","guid":{"rendered":"https:\/\/securitycurve.com\/?p=678"},"modified":"2017-11-16T15:55:13","modified_gmt":"2017-11-16T15:55:13","slug":"boeing-the-security-measures-apply-to-you-too","status":"publish","type":"post","link":"https:\/\/securitycurve.com\/?p=678","title":{"rendered":"Boeing: The security measures apply to you too"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-large alignright lazyload\" data-src=\"https:\/\/i.giphy.com\/media\/3o6ZsVLEnhslyoSkg0\/giphy.webp\" width=\"320\" height=\"240\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/240;\" \/>A few interesting things in the news today. In fact, I think they are most interesting in the presence of each other.\u00a0 You may know that November 7-8 was the <a href=\"https:\/\/www.cybersatsummit.com\/\">CyberSat conference<\/a>?\u00a0If you weren&#8217;t aware of it, CyberSat is an event that is &#8220;&#8230;dedicated to assessing the ever-evolving threat of cyber attacks in the satellite and aerospace landscape.&#8221;\u00a0 So kinda like Blackhat, Infosec World, etc. but for planes and plane paraphenalia.<\/p>\n<p>Anyway, a bunch of stuff happened leading up to &#8211; and during &#8211; that event.\u00a0 The biggest security news of course is the <a href=\"https:\/\/www.csoonline.com\/article\/3236721\/security\/homeland-security-team-remotely-hacked-a-boeing-757.html\">US Homeland Security team remotely hacking a 757<\/a>.\u00a0 I linked the CSO article because I thought it outlined the salient facts without a lot of &#8220;blah blah blah&#8221; or editorializing about how terrible the whole thing is.\u00a0 Those of you that remember this stuff probably remember that attacks against airplanes have been a thing for years.\u00a0 But the DHS publicly outlining their testing is new.\u00a0 The plane that was tested was from Boeing.\u00a0 Hold that fact for later.<\/p>\n<p>While that&#8217;s interesting on its own, there were other things that happened during the event as well.\u00a0 The one that caught my eye was a <a href=\"http:\/\/www.aviationtoday.com\/2017\/11\/13\/end-end-cybersecurity-aerospace-yet\/\">recap of the session, &#8220;How to Achieve End-to-End Protection&#8221;<\/a>.\u00a0 The whole recap makes for a good read if you&#8217;re interested in what these folks have on their mind about security, but I found the comments from Boeing senior director of strategy to be most interesting.\u00a0 Specifically, he says that conversations must be ongoing, that OEM vendors must be flexible and willing to communicate, that folks need to protect against multiple different types of threats.\u00a0 Here&#8217;s the direct quote:<\/p>\n<blockquote><p>Bruce Chesley, senior director of strategy for Boeing Space and Missile Systems, said that the conversations around cybersecurity must be both persistent and dynamic. Original equipment manufacturers and service providers must be flexible and willing to communicate in order to adequately serve the wide range of satellite customers and their different demands. \u201cFor certain satellite customers, the boundaries of the system and the scope of what we deliver varies pretty widely,\u201d Chesley said. The cybersecurity challenge for a mature operator such as Intelsat, for example, is different for other customers for whom Boeing will develop, operate and maintain the entire core network, including the user terminals. \u201cThe edges of the ecosystem that have to be protected is a variable threat surface from a cyber point of view,\u201d he said.<\/p><\/blockquote>\n<p>So what&#8217;s interesting to me is that there&#8217;s an implicit criticism here.\u00a0 Specifically, it&#8217;s a call to action for satellite vendors (and by extensions others that are in Boeing&#8217;s supply chain) about what they should be doing about security.\u00a0 But couldn&#8217;t those same things (and the criticism it implies) be leveled against Boeing on the basis of the DHS test?\u00a0 Here&#8217;s what I mean in a point-by-point breakdown:<\/p>\n<ul>\n<li><strong>Persistence of discussion<\/strong> &#8211; <a href=\"http:\/\/resources.infosecinstitute.com\/cyber-threats-aviation-industry\/#gref\">we&#8217;ve known about &#8211; or suspected &#8211; attacks against planes for years.<\/a>\u00a0 Honestly, I thought the issue was nobody cared about it &#8212; not, in fact, that we didn&#8217;t know it could happen.\u00a0 Was Boeing having persistent and dynamic conversations since 2014 (the publication date from that article I cited) about how to find and fix these issues?\u00a0 I&#8217;m not sure if they have.\u00a0 There&#8217;s not much of a regulatory framework for this stuff, so it&#8217;s up to individual companies to show leadership and moral fortitude (i.e. to chose &#8220;security and safety&#8221; over &#8220;increased profitability&#8221;).\u00a0 Did they?\u00a0 If they did have this conversations, were they enough and did they lead to action?\u00a0 It took DHS 2 days to find the issue &#8212; did Boeing do more than two days of systematic testing?\u00a0 If so, what happened in their process that they didn&#8217;t find this too?<\/li>\n<li><strong>Willingness to communicate<\/strong> &#8211; Does Boeing itself pass the &#8220;willing to communicate&#8221; test?\u00a0 I&#8217;d argue that, if you want to harden your systems, you&#8217;d let independent and interested researchers test against them in a virtual environment.\u00a0 Maybe you pay those researchers a ridiculous bounty if they find a problem.\u00a0 Bear in mind that, for DHS to conduct their test, they had to\u00a0<span style=\"text-decoration: underline;\">buy a plane<\/span>.\u00a0 Am I going to buy a plane to bug hunt Boeing&#8217;s product?\u00a0 No.\u00a0 Would I test it in a virtual apparatus in the hope of making 100k if I find something?\u00a0 I&#8217;m not sure if I would or wouldn&#8217;t, but it&#8217;d at least be an option.<\/li>\n<li><strong>Addresses a variable threat surface<\/strong> &#8211; What the DHS found are RF attacks.\u00a0 RF.\u00a0 This is probably the first attack surface that folks are going to probe, right?\u00a0 What about the other attack surfaces: segmentation of in-flight WiFi, electromagnetic interference, rowhammer attacks, etc.?\u00a0 Is Boeing addressing variable threats?\u00a0 It seems unlikely to me if they have major problems getting RF right.<\/li>\n<\/ul>\n<p>Look, I&#8217;m not a Boeing exec.\u00a0 I also don&#8217;t know much about the &#8220;Satellite and Aviation&#8221; space since I&#8217;ve never worked in it.\u00a0 I do, however, feel that people should measure themselves with the same ruler they use to measure others.\u00a0 If Boeing is going to initiate a call to action for their supply chain participants to do certain things about security, it seems to me like they should hold themselves to the same standard.\u00a0 It&#8217;s the moral thing since health\/safety is involved, but it&#8217;s also the best way for them to lead&#8230; by example.<\/p>\n<p>This isn&#8217;t an indictment of Boeing by the way.\u00a0 I think there&#8217;s a real opportunity for them here.\u00a0 They can step up and show leadership for the industry and for other health and safety-impacting IoT vendors (looking at you biomed) as well.\u00a0 Regulators are years late to the party and trying to regulate will probably take still years more.\u00a0 In the meantime, Boeing should be leading the discussions.\u00a0 Who better? They can either take the leadership role and make that part of their competitive advantage &#8212; or they can let a competitor do it.\u00a0 Airbus maybe.\u00a0\u00a0Boeing is certainly leading the &#8220;talking about it&#8221; part as evidence by this panel.\u00a0 That&#8217;s a good first step.\u00a0 Will they lead the &#8220;doing it&#8221; part too?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few interesting things in the news today. In fact, I think they are most interesting in the presence of each other.\u00a0 You may know that November 7-8 was the CyberSat conference?\u00a0If you weren&#8217;t aware of it, CyberSat is an event that is &#8220;&#8230;dedicated to assessing the ever-evolving threat of cyber attacks in the satellite [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[12,19,38,99],"class_list":["post-678","post","type-post","status-publish","format-standard","hentry","category-security","tag-aviation-security","tag-boeing","tag-dhs","tag-rf"],"_links":{"self":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=678"}],"version-history":[{"count":0,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/678\/revisions"}],"wp:attachment":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}