NoSuchBucketThe specified bucket does not existuswww-amp-staticWS27FTGMHD2GQA97drlXtWRGtd+w2AZSpDzPwC6PohxKcNExc0B9dl+BMd6d63WbJugEvWodYXamcKBb37LuuPsoLm4= NoSuchBucketThe specified bucket does not existuswww-amp-static2T5VK3GPHXZ6XCBN0jbnUAfaqHbT/DrJueHTyMGyR1PI1lxyLz3Wc3pIVmYd4xx+80Bq6kMsTZAmQGMSN+zsLNwOC6I= NoSuchBucketThe specified bucket does not existuswww-amp-staticWS26T7RVQAM838W2zGlH6i2l3CW7dNO34Zmax/+czySkYT7zXOcg08FSQ4NglYMKbfVBHRbBqam0eygzUtYCNoCO3Fg=

The New F-35 Fighter Jet Can Be Taken Down Without A Bullet Ever Being Fired

NoSuchBucketThe specified bucket does not existuswww-amp-staticWS252REZ58K6YG8V2Ry2f0JFYHS9iZknaknqgBu+BeLKJC4UKs7PLDWYcis9GLi42xsZEX0gsVQbRM6mJ2Mkpwti+tk=
The F-35 is being heralded as being the high-point in human-machine interaction.
Screenshot / http://www.cbsnews.com/news/can-the-f-35-be-hacked/

The F-35, the latest fighter jet being developed for the U.S. Armed Forces, has hit another potential snag.

This time, it's not questions of the jet's structural integrity or even questions of relevance in combat.

It's the plane's vulnerability to hackers.

The F-35's helmet displays an augmented reality overview, which is drawn from six cameras across the body of the plane. This enables the pilot to look around the cockpit and, instead of seeing the interior of the plane, see directly through the cameras at the world outside.

NoSuchBucketThe specified bucket does not existuswww-amp-staticWS22H01RH50XHPZNT5aIXL1sVvWFdeiAbNxgTQaohZ+TFwGHYHiB1rdq6pOMYvFC5yq13rPakv4CZGSU3b/CR3DbwmA=

This computational capability is all run by a computer system called ALIS.

A pilot shows CBS ALIS.
Screenshot / http://www.cbsnews.com/news/can-the-f-35-be-hacked/

David Martin, a correspondent for 60 Minutes, reports that ALIS (emphasis ours):

... Looks basically like a laptop computer, and the pilot carries it out to the plane and sticks it in a slot right next to him in the cockpit. That contains all the information about the mission he's gonna fly. The servers which run all of this software take up a room about the size of a shipping container.
This is a juicy, juicy target for a hacker. If your adversary can hack into all that software that's running [the mission], then they've essentially defeated the plane. All without firing a bullet.

So it seems the ALIS has been given too much power over the F-35. For example, ALIS has the ability to ground planes indefinitely if it detects anything wrong with the plane. Human intervention cannot overrule ALIS, either.

NoSuchBucketThe specified bucket does not existuswww-amp-staticWS22H01RH50XHPZNT5aIXL1sVvWFdeiAbNxgTQaohZ+TFwGHYHiB1rdq6pOMYvFC5yq13rPakv4CZGSU3b/CR3DbwmA=

If hackers could manage to infiltrate the network that ALIS relies on, it is very possible that they could brick an entire F-35 fleet. This would render the plane, the most expensive weapons system ever, completely useless.

Below is Martin's full story on the possible flaws within the F-35:

NoSuchBucketThe specified bucket does not existuswww-amp-staticWS22H01RH50XHPZNT5aIXL1sVvWFdeiAbNxgTQaohZ+TFwGHYHiB1rdq6pOMYvFC5yq13rPakv4CZGSU3b/CR3DbwmA=
NoSuchBucketThe specified bucket does not existuswww-amp-staticWS22H01RH50XHPZNT5aIXL1sVvWFdeiAbNxgTQaohZ+TFwGHYHiB1rdq6pOMYvFC5yq13rPakv4CZGSU3b/CR3DbwmA=
NoSuchBucketThe specified bucket does not existuswww-amp-staticB7WFPMBG778AMVHFRzOKGU6Nl9w5vL5qjvyjrz3DfgzvhosE9g4uAlIYHeotOPPf4Ob/BBxGsmxxnmT3px4nHUDyaE0=
NoSuchBucketThe specified bucket does not existuswww-amp-staticWS2B721PCJB679YFA65h9yKqmH6Wj3Br2ce/c27fBq0G3U0H1r76xZTOslgXseCJbwCSj5D8BvfXAcDBYiq/iEvO+20=