F-35 Is The Most Thoroughly Tested Cyber Weapon

The cutting-edge F-35 stealth fighter jet is probably one of the most cyber tested weapons systems that exists in the US department of defence inventory, it's maker says.

With almost nine million lines of software code contained within it, the warplane has previously been described by Britain's Lightning Force as essentially a flying computer.

The multimillion-pound supersonic F-35 Lightning II Joint Strike Fighter is considered to be one of the most sophisticated aircraft ever developed. The UK is embarked on a £9.1 billion program to buy 48 by 2025 of the F-35, but has pledged to purchase 138. 

Steve Over, the director of F-35 international business development at Lockheed Martin, the company which manufactures the jet, said it is probably one of the "most cyber tested weapons systems that exists in US Department of Defence inventory".

He told the Press Association: "To our knowledge we have passed every cyber test that has been applied against the F-35, but it is not an area where any of us, the US, Lockheed or our customers can afford to be complacent.

"This is an area where you have to remain vigilant, and we have to remain committed to continuing the evolution of all the IT systems on the airplane so that we stay ahead of the cyber threat that is very real and very existential."

Asked whether a cyber-attack could be conducted or carried out from an F-35 jet, he stopped short of providing an answer. "I know of nothing there we can talk about," Mr Over said.

Britain currently has 15 of the F-35B, the short take off and vertical landing variant, based in the US where they are being used for testing and training. 

News AU

You Might Also Read: 

AI Defeats Human Fighter Pilots:

Aircraft Can Be Successfully Hacked In-Flight:
 

 

« Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users
Google Workers Are Revolting »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Mitre

Mitre

At Mitre we work across government to tackle challenges to the safety, stability, and well-being of our nation. Areas of expertise include Cybersecurity.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity's mission is to provide value by dramatically improving the cybersecurity posture of our clients and business partners.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.

Redinent Innovations

Redinent Innovations

Redinent is a cutting-edge IoT Security platform that offers precise security posture analysis and delivers actionable intelligence, empowering businesses to operate with unrivaled resilience.

Stratsec

Stratsec

Stratsec is a global team of experts on a mission to protect human life, well-being and the environment against cyber-driven threats.