To many observers, 2020 can be labeled as the âyear the earth stood still.â But while the global population as a whole stayed home, that doesnât mean we didnât accomplish anything. Instead of doing business face-to-face, we switched our interactions to the internet.
From both a business or personal perspective, thereâs almost nothing we collectively do today that doesnât include interacting with a mobile app, website, or connected device of some sort. In fact, according to data firm Statista, the global internet population is now on the threshold of five billion people. Itâs mindboggling that almost two-thirds of our worldâs population has the capability to share all kinds of information with anyone instantly.
And thatâs not counting the uncountable number of internet of things (IoT) machine connections there are today. The IoT has everything from smartwatches to cars to just about anything you can imagine sharing real-time information. Unfortunately, all that free-flowing information is just too tempting of a target for the rapidly growing business of data piracy. And like the internet itself, cybercrime is just going to keep expanding.
Just how much of an issue is cybercrime for corporate and private aviation? Considering that the International Civil Aviation Organization (ICAO) designated 2020/2021 as the âYear of Security Cultureâ (YOSC), itâs a pretty pressing issue. In a statement, the coalition of aviation stakeholders and the ICAO Assembly called for a Cybersecurity Action Plan that, among other things, would work toward a common baseline for cybersecurity practices and make cybersecurity a part of aviation security and safety systems.
But what is cybersecurity in terms of business aviation? âCybersecurity is the act of ensuring that data being transmitted from an aircraft to a prescribed network is protected at all times to prevent the unauthorized use of that data,â explained Chris Moore, president of business aviation at Satcom Direct. âIt is often perceived as an abstract concept, but it incorporates physical security, data security, monitoring, risk management, education, roles, and responsibilities of departments that may not have converged before. For example, an IT department with an aviation department.â
Moore added that while many aircraft ownersâincluding those at Fortune 500 companiesâare familiar with cybersecurity for their offices and facilities, not many ever put their aircraftâs data security needs into that bubble. And thatâs a mistake, he noted.
âIn business aviation, there is often the assumption that if you are in an aircraft at altitude, that data is secure. However, without cybersecurity protocols in place, this is not the case,â he said. âThe internet is visible to the aircraft data; then the aircraft data is visible to the internet.â
But business aircraft have been connecting to the global web for a long time. Why is cybersecurity becoming such a hot topic now? According to the experts, there are a number of reasons. One is that hackers are becoming much more sophisticated. They realize that with prosperous companies and individuals spending more time on their âprivateâ aircraft, thereâs that much more valuable information to be hijacked. Another is that the way we use the aircraftâs connectivity has changed, and that has opened the door to easier access.
âThe ability to do live-streaming or a videoconference call from the aircraft opens up the connection for a much longer time, and thatâs a potential security issue,â explained Britton Wanick, v-p of digital solutions partnerships for SmartSky Networks. âWe need to realize that the ultimate objective of a hacker is not going to change because theyâre hacking an airplane. They want the same information they try to get on any other internet connection.â
And, depending on the goal, that information can be extremely tempting. Personal data, credit card numbers, and bank accounts are top on their list. But when a hacker is targeting a sophisticated business jet, they may well have bigger ambitions.
âItâs not a matter of if, but when an attack will occur,â Moore said. âWe noted a sharp increase in attempted cyberattacks through the pandemic, particularly in ransomware attacks.â
It should be pointed out, however, that probably last on a hackerâs digital target list is to try and âhijackâ the airplaneâs controls via its internet connection. While the idea of controlling a business jet from a laptop makes for exciting, Clive Cussler-worthy fiction, but industry experts say the likelihood of this ever happening is pretty much nil.
Rather, what the hackers want is either to collect dataâcorporate espionage, for exampleâor better yet, work their way into the companyâs computer network with some kind of malware or ransomware.
âOverall, we look at what the hackerâs motivation is and who or what is behind that motivation," explained Chris Bartlett president of CCX Technologies, which makes cybersecurity-focused cabin routers, components, and security plans that work in parallel with the aircraftâs connectivity provider. "Thereâs a wide spectrum of what that can be. In some cases, itâs just mischievous, and in others, itâs the opportunity to impact an organizationâs business. I don't know of an instance where it was a safety risk.â
âAn attack can come from a variety of points: it can be a non-targeted attack like a malware virus. I think everyone is familiar with those,â he continued. âIt could be a drive-by attack by a hacker who is just curious whether or not they can succeed. They just want to show how smart they are. These usually are no more than an annoyance.
âThe most troublesome are the commercially motivated hacks like the recent attack on the U.S. oil pipeline. There was a massive ransom paid on that one,â Bartlett said. âThere are so many motivations for attacks today. With all thatâs riding on communications, I think you can see that aviation is in no way immune to the risk. Private airplanes are only private up to a point.â
No matter what theyâre looking for or doing, the easiest way for a hacker to gain access to a companyâs network via an aircraftâs connectivity is through passengers' and crews' personal devices. Thatâs why so many cybersecurity experts suggest carrying separate personal and business devices, something so many of us do not do.
âRarely is an insertion accomplished by an individual hacker finding their way directly onto a network,â Wanick said. âItâs usually someone accessing a personâs personal device and planting something in there. The surface area in a large company is tremendous. The more users, the more entry points a hacker has.â
Of all the possible entry gates, the experts agree that phishing, pop-ups, fake emails, and the like are at the top of the list of ways for evildoers to gain entry into a device. Thatâs why it cannot be stressed enough that one should never open any unfamiliar email or document, which is easier said than done. Phishing scams are very sophisticated today and itâs getting harder all the time to tell the real from the fake.
âMethods used by the bad actors or malevolent hackers range from social engineering attacks to theft of passwords and credentials, to spam, malware, ransomware, and more,â Moore said. âTheir methodology is becoming increasingly more sophisticated, to the point where some threats are thought be derived from some state-sponsored institutions.â
In fact, some regions are becoming so notorious for cybercrime that Satcom Direct, in particular, has taken steps to proactively forewarn customers as to the threat potential. âOur existing cyber solutions suite offers a geofencing service," Moore explained. "If an aircraft is about to enter airspace where cyber events are more frequent, our threat-monitoring service will advise the crew. They can then advise the passengers and/or close down the network while the aircraft travels through that airspace.â
Of course, itâs not only data that the bad actors are after today. There are plenty of instances of black hat corporate espionage goings-on inside of business jet cabins.
Justin Vera, senior installation sales representative for Duncan Aviation, shared a story of a customer who was traveling internationally and somehow someone put malware on his phone to break into the aircraftâs network. âApparently, someone wanted to be able to listen in on what was being discussed on the airplane,â Vera said. âLuckily, the systemâs service provider spotted the intrusion and was able to shut it down. Itâs hard to imagine here, but apparently, there are parts of the world where this is commonplace.â
âOperators need to employ on the aircraft the same security protocols they do for their terrestrial networks,â Wanick added. âMonitor, protect, and loss prevention, they all should be available on the aircraftâs network.â
Also not to be overlooked is the need to maintain vigilance with regards to the aircraftâs security when away from home. Many wrongdoers are quite happy with planting an electronic device directly in the aircraftâs cabin. âWhen it comes to physical security, remember that most business aircraft donât have locks on their cabin doors. That makes them vulnerable for intrusion,â Bartlett said. âOperators need to be aware of this situation and take steps to protect the aircraft. Itâs still part of a cybersecurity plan.â
Thereâs a saying among psychologists that ârealizing you have a problem is the first step to finding a solution.â Unfortunately, when it comes to cybersecurity measures, way too many business and private aircraft owner/operators are still in denial, according to industry experts.
âWe have had dialogs with so many different flight departments, and in most cases, they are more worried about whether the Apple TV or Roku TV will work than whether or not the network will get hacked,â Bartlett said. âItâs just a matter of priorities for the passengers.â
That lack of urgency is evident when talking to MROs and avionics shops. When it comes time to upgrade or install a new connectivity system, cybersecurity is usually the last thing to come up in planning.
âThe subject of cybersecurity is still rare. Customers do ask about it, but not as often as you would think,â Vera said. âWe do have larger flight departments have their corporate IT folks get engaged from the beginning of the installation. And there are others that do nothing at all.
âRight now, when it comes to putting connectivity equipment on an airplane from the customer, to the manufacturer, service provider, and the systemâs installer, anything that any of them can do is regulated by the FAA or EASA," he added. âEverything is regulated except cybersecurity. There are currently no regulations regarding keeping that connection secure. In the eyes of the regulators, this is all ânon-essential equipment.â
âThatâs probably one reason why cybersecurity is not on a DOMâs mind today,â Vera continued. âThey are focused on the things they need to be doing and what the regulations require to keep the airplane airworthy.â
Dwayne Chandler, director of avionics sales for Stevens Aerospace and Defense Systems, agreed that while cybersecurity isnât currently anywhere near the top of many of the MROâs customers' âmust-haveâ lists, it is coming up more in discussions. âWe tell customers if they are under the assumption that no one else can get onto their aircraftâs network, they are incorrect," he said.
"Itâs just another network until you protect it," Chandler added. "The various connectivity providers have put a lot of effort into doing just that. Many of the large satellite service providers like Viasat and Satcom Direct also provide connectivity for the U.S. military and governments. They have very good security measures in place, and most are available to their other customers.
âFor us as an installation agency, our job is to configure the equipment per the manufacturersâ specifications and FAA regulations,â Chandler continued. âThere is nothing we can do to design or implement any further cybersecurity steps that the system doesnât already have.â
All of the air-to-ground (ATG) and satellite connectivity providers have invested heavily into technologies that keep their various customersâ data as safe as possible. Itâs not an easy solution by any stretch of the imagination.
Protecting in-flight data requires an understanding of the dynamic nature of the cybersecurity landscape and necessitates visibility into flight operations. This needs to be coupled with the right technologies, policies, procedures, and controls to implement solid security management systems, so operators need to discuss all these elements with their connectivity provider to reduce risk.
The in-flight connectivity system must be paired with a robust, secure ground infrastructure that can support secure connectivity solutions. Companies like CCX also add physical protection in the form of products installed on the aircraft.
âOur base-level offering goes beyond intrusion-detection systems to include intrusion prevention," said Moore. "This means we donât just let you know that a security event is happening, we take immediate steps to stop it and track down the root cause. Satcom Direct offers operators a sophisticated threat-monitoring and risk-mitigation service applied to the data traffic flowing to and from the aircraft.â
Moore stressed that Satcom Directâs data monitoring doesnât actually look at the digital content itself but instead looks for unique patterns in the networks and applications in use. âIf we spot abnormalities, we can take remedial action to protect the network,â he said. âOur team of certified experts can recognize and prevent attacks by proactively examining the data and shutting down any activity that seems unusual and notifying the crew in real-time.â
Cybersecurity is a highly complex business. Like everything in aviation, no two situations are the same, which makes creating and implementing a security plan challenging for the typical chief pilot or DOM.
Aircraft owner/operators need to work with their connectivity providers to explore all the options available to keep data safe, Moore said. There is no one size fits all, and it is important that the operator trusts the connectivity provider to tailor the security system according to their needs.
The good news is that it's possible to take some simple steps to start to assemble a workable cybersecurity protocol. It may not be something many chief pilots and DOMs are familiar or comfortable with, but the fact is, ready or not, chances are these types of decisions are going to fall on their shoulders.
âWe always recommend that you start with understanding what kind of data is being transmitted from the aircraft. How does that translate into a threat factor?â Bartlett said. âIt gets a lot more complicated when you start looking at passenger data, crew data, aircraft data, and the flight deckâArinc 429 transmissions. What do all of those messages contain? What are the potential implications to the company if someone accesses that information?
âThen talk to your selected service provider and find out what types of security measures are available for your level of service and what are options to enhance the protection?â he added. âThere are a lot of options today, maybe more than one provider can offer. Depending on how far you want the cybersecurity program to reach, you might need to bring in a third-party service provider.
âThese are questions that are not easy for a chief pilot or DOM to answer,â Bartlett added. âThere is a significant gap here. The biggest of all is whether or not the principal on board the aircraft will be happy with the solution.â
Unfortunately, thereâs often a fine line between having a healthy, secure network and a happy boss. Take encryption, for exampleâthere is a belief that encrypting a network connection slows down the onboard Wi-Fi experience, and the boss wonât like that.
âYou need to have an open discussion with the principal and all those involved about consequences of any cybersecurity protocol or process before you implement it,â Bartlett said. âYes, an open network is faster, but itâs very vulnerable to attack. Can the principal afford that?â
âI tell our new customers that while the service providers absorb the largest portion of the security issue, itâs really everyoneâs responsibility,â Duncan's Vera said. âWhen they get a new connection installation, my first bit of advice is to consider the network wide-open like Wi-Fi in a coffee shop until you take steps to make it otherwise.â
While it can take time and possibly new equipment to achieve the level of security thatâs right for a particular aircraft and flight operation, the data pirates arenât going to wait while everyone gets their digital ducks in a row.
Cybersecurity is new territory for the majority of business jet operators. For further help, a useful source is the NBAA connectivity subcommittee, which provides an array of insights to help answer cybersecurity questions.
While even identifying and planning a cybersecurity program is a major challenge, there are some steps that operators can take today to help make personal devices, and subsequently the aircraftâs network, just that much harder to break into:
⢠Install the latest version of the service providerâs preferred online security suite.
⢠Secure passwords. Use more than one password and do not share them.
⢠Update passwords often and remember that length matters. Experts say the more complex a password, the better. Just donât forget to keep them in a secure location or use a password manager application.
⢠While strong passwords are good, always take extra precautions when emailing sensitive information. Make sure these types of files are encrypted before pushing âreply.â
⢠Always take a second look at an email that is asking you to reply to verify some personal or account information. When in doubt, donât.
⢠If you must use a Wi-Fi hotspot, be sure to only use secure sites or, better yet, use a virtual private network (VPN).
⢠Use a multi-factor authentication protocol to provide extra layers of security. Set it up with authentication apps, SMS verification, or biometrics.
⢠When doing online transactions, look for secure sites. They will typically have a closed padlock icon in the status bar.
⢠Use one credit card for all of your online shopping needs. Also, experts suggest never using a debit card.
⢠Keep all apps and operating systems updated with the latest versions to ensure that you have the latest security patches and updates. If your device offers auto-updates for your apps, make sure to turn that on.