Caitlin Fairchild | Nextgov | May 11, 2017 | 0 Comments

How Do You Protect a Helicopter From a Hacker?

Flickr user Walter

As more military weapons and vehicles become autonomous, the more at risk to cyber intrusions they will become. The Defense Advanced Research Projects Agency has developed the High-Assurance Cyber Military Systems program to create technology to secure those things that exist in the cyber and physical realms.

During a recent trial, HACMS software was deployed to protect an unmanned MH-6 Little Bird helicopter from a malware-based hack. The unmanned Little Bird is currently being developed for missions behind enemy lines and it runs on a small amount of code.

"Someone can walk up to the aircraft as a malicious maintainer and he could plug something into the aircraft while we're out on the ramp getting ready to launch," said Jason Graham, software lead of the unmanned Little Bird program at Boeing.

During a practice run of the HACMS program, a red team did just that and infected the helicopter with malware, using a mechanics thumb drive to attempt to kill the mission. Another team then deployed HACMS software to regain control.

To learn more about HACMS trial, check out the video below from DARPA: 


Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.