How to trust military embedded computing amid threats like cyber attacks and tampering

April 24, 2019
ANDOVER, Mass. – To have confidence or certainty in someone or something is a simplified definition of what we all know to be as trust. However, what does it mean to a company whose mission is to provide the U.S. military community with cutting-edge secure and safety-critical processing components, modules, and subsystems?

ANDOVER, Mass. – To have confidence or certainty in someone or something is a simplified definition of what we all know to be as trust. However, what does it mean to a company whose mission is to provide the U.S. military community with cutting-edge secure and safety-critical processing components, modules, and subsystems?

The proliferation of autonomous and artificial intelligence (AI) systems within the military landscape results in an efficient collection of large quantities of data, which leads to rapid decisions in the battlefield. In addition, enabling machines to perform some intelligence, surveillance, and reconnaissance (ISR) missions improves the safety of the individual warfighter and the entire unit. There is no questioning why these systems are a welcome addition on the battlefield.

However, the more we trust the information delivered by AI and autonomous systems instead of relying on information collected and analyzed by the warfighter, the greater the consequences if the system is compromised or altered.

The system software and hardware are desirable cyber targets for adversaries trying to disrupt or foil U.S. mission plans. Malicious backdoors via malware or hardware manufactured by a foreign company and implanted into an electronic device can make their way into the U.S. military’s supply chain and into one of many AI systems.

Imagine a foreign adversary gaining access to U.S. AI systems from one of these altered devices and having the ability to influence the decision-making of the AI system. A hacked system programmed to monitor and detect incoming aircraft, might identify the adversary’s aircraft as friendly and U.S. planes as foe. Enemy aircraft could receive safe passage into U.S. airspace or command centers, using this “trusted” information, and could take the incorrect action, leading to catastrophic results.

Related: Secure memory for military and commercial avionics that need trusted computing introduced by Mercury

Tampering and backdoors are very real threats when dealing with suppliers outside the U.S. The disastrous events like the scenario described can happen; but there are other threats as well. Counterfeit components can enter a company’s supply chain causing failures, program delays, and additional costs to the company and their customers -- including the US warfighter. In some industries, the negative impact can be overcome. However, in mission critical and highly secure defense applications, these possible outcomes must be mitigated from the onset.

The push for suppliers with trusted supply chains and trusted flows from design through test by the U.S. Department of Defense aims to eliminate these serious risks. However, until all mission-critical programs mandate that all suppliers implement these safeguards, there are no guarantees of device trust and assurance.

Partnering with domestic suppliers that have tightly managed supply chains, processes, and facilities alleviates these threats and provides assurance to the warfighter who relies on AI technology for mission success.

What are the critical aspects of a trusted partner to the defense community?

1. Trusted supply chain

2. Trusted design, manufacturing and test; made in the USA

3. Trusted flow

4. Thoroughly vetted employees

5. Active cyber security

Heavy technological investments outside of the U.S. means more and more electronic components are being designed and produced in foreign countries. It would be impossible to buy 100 percent of an embedded board or system only from made-in-the-USA suppliers.

However, trusted suppliers that produce electronics for the government should have a tightly managed supply chain with only qualified suppliers who strictly adhere to the Defense Federal Acquisition Regulations Supplement (DFARS) and their customer's policies, contracts, and flow downs, including policies on counterfeit components. A trusted supplier should not deviate from process or contracts unless prior approval from their customer is received to diverge from process.

Additional trust comes when government contractors conduct business with suppliers that design, manufacture, and test their electronics in U.S. facilities that are for classified and ITAR solutions using a trusted flow.

Taking it one-step further, an elite group of companies have invested in their facilities to receive accreditation by the Defense Microelectronics Activity (DMEA) for design, assembly, test, and broker services. These companies with thoroughly vetted and tightly integrated engineering, manufacturing, and test resources are the ideal trusted partners for government prime contractors looking to reduce security vulnerabilities and minimize program risk.

Lastly, trusted suppliers must have a robust cyber security infrastructure to protect all design and manufacturing records based on the NIST 800-171 security controls.

Meeting the stringent criteria to be a trusted supplier to the defense community requires commitment, time, and money. Only a few have accomplished this, while even fewer remain agile enough to produce today's most advanced defense electronic solutions. Trusted suppliers are an integral link in a trusted and secure military chain and enable the next generation of reliable innovations to aid and protect our warfighters.

Jennifer Keenan is senior principal product marketing manager at Mercury Systems in Andover, Mass., and in Phoenix, Ariz. Contact Mercury Systems online at www.mrcy.com.

Ready to make a purchase? Search the Military & Aerospace Electronics Buyer's Guide for companies, new products, press releases, and videos

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!