Abstract
The purpose of this article is to show, using the examples from the Defense department (available in open sources), that software products are becoming overly complex, practically exceeding the resources of mankind, especially in the context of cyber warfare. For illustration, we use F-35 aircraft Autonomic Logistics Information System, a story about cyber threats of software-based weapons systems, US Army Single Security Architecture as the failure in the fight against cyber threats. Cyber-attack on the Colonial Pipeline is a case of cyber war. In the context of an impending cyber war and given the failures to eliminate cyber threats in many projects, each comparable to the Manhattan nuclear project it should be recognized that their implementation is currently beyond the competence of individual companies and even governments and is becoming a problem of international cooperation. Therefore, an international agreement on cyber warfare is required, for example, like the Treaty on the Non-Proliferation of Nuclear Weapons.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Grieves, M.W.: Virtually intelligent product systems: digital and physical twins. In: Flumerfelt, S., Schwartz, K.G., Mavris, D., Briceno, S. (eds.) Complex Systems Engineering: Theory and Practice, pp. 175–200. American Institute of Aeronautics and Astronautics, Inc., Reston, VA (2019)
Johnston, L., Williamson, S.H.: What was the U.S. GDP then? In: MeasuringWorth (2022)
Semeraro, C., et al.: Digital twin paradigm: a systematic literature review. Comput. Ind. 130 103469 (2021). https://doi.org/10.1016/j.compind.2021.103469
Kurganova, N., et al.: Digital twins’ introduction as one of the major directions of industrial digitalization. Int. J. Open Inf. Technol. 7(5), 105–115 (2019)
Laird, R.: Industry 4.0: the case of the F-35 (2018). https://sldinfo.com/2018/11/industry-4-0-the-case-of-the-f-35/
Delivering digitally for F-35 force management solutions (2021). https://www.lockheedmartin.com/f35/news-and-features/delivering-digitally-for-f35-force-management-solution.html
F-35 Joint Strike Fighter (JSF) program. Congressional research service (2022). https://crsreports.congress.gov. RL30563
IIoT platform creates a digital twin of F-35 manufacturing facilities (2017). https://www.sme.org/iiot-platform-creates-a-digital-twin-of-f-35-manufacturing-facilities
Clark, B., Patt, D., Schramm, H.: Mosaic warfare. Exploiting artificial intelligence and autonomous systems to implement decision-centric operations. CSBA (2020)
Exec. Order No. 13,859, 84 Fed. Reg. 3967 (2019)
U.S. Department of Defense. Summary of the 2018 Department of Defense. Artificial Intelligence Strategy: Harnessing AI to Advance Our Security and Prosperity (2019)
European Commission: proposal for a regulation of the European parliament and of the council laying down harmonised rules on artificial intelligence (Artificial Intelligence Act) (2021). https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52021PC0206
F-35 program stagnated in 2021. https://www.pogo.org/analysis/2022/03/f-35-program-stagnated-in-2021-but-dod-testing-office-hiding-full-extent-of-problem/
GAO-22–105995. F-35 sustainment DOD. Faces several uncertainties and has not met key objectives (2022)
Grazier, D.: F-35 Program stagnated in 2021 but DOD testing office hiding full extent of problem. In: Analysis (2022). https://www.pogo.org/analysis/2022/03/f-35-program-stagnated-in-2021-but-dod-testing-office-hiding-full-extent-of-problem
Charette, R.N.: F-35 Program continues to struggle with software. IEEE Spectr. 19 (2012)
GAO-19-128. Weapon systems cybersecurity. DOD just beginning to grapple with scale of vulnerabilities, report to the committee on armed services, U.S. Senate, US GAO (2018)
Grazier, D.: What should we do about a generation of weapons vulnerable to cyberattacks? An obvious solution being ignored (2019). https://www.pogo.org/analysis/2019/01/what-should-we-do-about-a%20generation-of-weapons-vulnerable-to-cyberattacks/
Thompson, M.: The U.S. Navy’s Titanium “Tin Can”, in Analysis (2019). https://www.pogo.org/analysis/2019/01/the-u-s-navys-titanium-tin-can
Cyber situational awareness - big data solution. https://docplayer.net/2357634-Cyber-situational-awareness-big-data-solution.html/
JRSS Deployments. https://c.ymcdn.com/sites/alamoace.siteym.com/resource/resmgr/2017_ace/2017_speakers/2017_AACE_Keynote_Presentations/doc_keynote_Yee.pdf/
GAO-16-593. Joint information environment: DOD needs to strengthen governance and management (2016)
Marks, J.: The pentagon has a big plan to solve identity verification in two years. In: Nextgov (2018). https://www.defenseone.com/technology/2018/05/pentagon-has-big-plan-solve-identity-verification-two-years/148280/
Pomerleau, M.: The pentagon is moving away from the joint regional security stacks (2021). https://www.c4isrnet.com/it-networks/2021/11/01/the-pentagon-is-moving-away-from-the-joint-regional-security-stacks/
Executive order on improving the nation’s cybersecurity. https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
Edward snowden. https://en.wikipedia.org/wiki/Edward_Snowden#Revelations
Prism. https://en.wikipedia.org/wiki/PRISM#Responses_to_disclosures
Colonial pipeline ransomware attack. https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack
Brooks, C.: Alarming cyber statistics for mid-year 2022, 3 Jun 2022. https://www.forbes.com/sites/chuckbrooks/2022/06/03/alarming-cyber-statistics-for-mid-year-2022-that-you-need-to-know/?sh=51f25a7b7864
Hatton, L., Spinellis, D., van Genuchten, M.: The long-term growth rate of evolving software: empirical results and implications. J. Software Evol. Process. 29(5) (2017). https://doi.org/10.1002/smr.1847
Wester, R., Koster, J.: The software behind Moore’s Law. IEEE Software, 32(2) 37–40, (2015). https://doi.org/10.1109/MS.2015.53
Business software and services market size, share & trends analysis report, 2022–2030. https://www.grandviewresearch.com/industry-analysis/business-software-services-market
Tucker, P.: The virtual tools that built the air force’s new fighter. In: Prototype (2020). https://www.defenseone.com/technology/2020/09/virtual-tools-built-air-forces-new-fighter-prototype/168505/
West, T.D., Blackburn, M.: Is digital thread/digital twin affordable? A systemic assessment of the cost of DoD’s latest manhattan project. Procedia Comput. Sci. 114, 47–56 (2017). https://doi.org/10.1016/j.procs.2017.09.003
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Sneps-Sneppe, M., Namiot, D. (2023). On Digital Twin Software and Cyber Threats. In: Koucheryavy, Y., Aziz, A. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022. Lecture Notes in Computer Science, vol 13772. Springer, Cham. https://doi.org/10.1007/978-3-031-30258-9_43
Download citation
DOI: https://doi.org/10.1007/978-3-031-30258-9_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30257-2
Online ISBN: 978-3-031-30258-9
eBook Packages: Computer ScienceComputer Science (R0)