Cyber Threats & Nuclear Fears

Since the second World War and throughout the subsequent Cold War, nuclear weapons seemed like the most destructive weapon that humanity ever developed. Now, the development of cyber weapons, information-warfare capabilities and the new dynamics of the ‘cyber age’ are providing a considerable challenge to the management, thinking and strategy that underpins nuclear weapons. 

While the nature and extent of these challenges varies between nuclear-armed states and across nuclear systems, they do, taken together, represent a noticeable shift in the context and environment in which we think about nuclear weapons, nuclear security, manage nuclear relationships and regulate global nuclear order.

Governments and legislators are struggling to keep pace with the rapid development of these cyber capabilities. 
As military systems become more technically complex it would be easy to assume that they are more secure. The opposite is true. Increased automation and connectivity increases vulnerabilities to cyber attacks. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuclear risk hardly imagined before.

Alarm is mounting over large security vulnerabilities produced by the pervasive spread of cyber capabilities into vast realms of social and economic activity. 

Currently most cyber threats fall into the category of mischief or normal crime, but the destructive potential for cyber attacks on nuclear power plants, other critical infrastructure or on the financial system, could do enormous harm. There is a need, therefore, to seek remedies and adapt to the challenges posed by this ubiquitous dual-use technology.

The main question that surrounds cyber war is not whether a cyber war can possible or not, but what would be the main target of this kind of operation. 

In 2005 the first type of a cyber weapon called Stuxnet hit an Iranian nuclear facility and potentially and created a new fear that such an attack could trigger a massive explosion which prompted widespread debate among policy makers. 

It is surprising to learn that the first target for a deliberate cyber war first was the nuclear program of a country, which seemed an impossibility for conventional military operations. In particular, a unique type of cyber risk arises from the integration of nuclear and non-nuclear capabilities, which is itself often enabled by computing and communications technology. Such integration raises the risk of an inadvertent nuclear escalation in times of conflict. 

Stuxnet showed us that nuclear weapon systems could have exploitable weaknesses in themselves, where it can spill over to the most destructible components of violence. 

The attack in 2005 should be accepted as a sign of future cyber warfare and its potential targets.  What humanity feared most could be the target of the people who are behind a screen. This person could be a state officer or something worse, like a terrorist or AI-powered robots that are free from established political and moral constraints of the people who are in command of these weapons.

Since the Cuban Missile Crisis, where the world came to the brink of a nuclear war, the world’s nuclear powers engaged in various reciprocal arms control regimes and limitation agreements. Those agreements generally used the classification and transparent presentation as the main way to execute such controls. But in a cyber world, there is extreme secrecy over the issue that surrounds it.

Many countries that are working over such tools are not willing to prepare comprehensive catalogues that can be used against nuclear weapons and their control and command systems. 

This extreme secrecy that surrounds the issue creates a problem for cynical scholars who think cyber weapons cannot match when they will face nuclear weapons. Indeed, the secrecy surrounding cyber tools and weapons is one of the gravest dangers in a world where these secrets could easily spill out and spread among other actors.

Nuclear - Cyber Nexus

Governments must also invest heavily in research activities particularly in the framework of existing institutions such as the NATO Cooperative Cyber Defence Centre of Excellence, the EU CBRN Centres of Excellence, the United Nations and within national cyber security institutions. Governments and decision-makers of the nuclear-armed states should publicly acknowledge that cyber security for nuclear weapons systems is a top tier priority for the safety and security of national military programs. 

If the security of nuclear weapons is in question, this not only reduces their credibility and deterrent value, but it also poses a massive safety and security risk. 

The developing relationship between cyber and nuclear technologies certainly represents an important shift in the context in which we think about nuclear weapons and nuclear security, manage nuclear relationships and strategic stability and regulate the global nuclear order. If we understand cyber as a holistic concept that includes not just the internet, but also the software, hardware, other infrastructure and people that operate and interact with these systems, then the challenge to nuclear weapons in the cyber age is in fact multifaceted. 

Leaders of nuclear armed states need to start a discussion about the nature and implications of the emerging cyber–nuclear nexus and begin to think about pursuing confidence building measures at the strategic level. 

Such dialogue may help provide the basis for more concrete mechanisms of protection and control, such as a set of moratoria or agreements between states not to target each other’s nuclear C2 systems with cyber, for example. This in turn may help lay the foundations for broader bilateral or even multilateral arms control agreements in the cyber–nuclear realm in the future, and even for talks that address the whole range of emerging technological challenges to nuclear orthodoxy. 

While none of this will be easy or straightforward, it is imperative to act now, to guard against the new and growing challenges to nuclear weapons presented by the cyber age. 

Mert Matsumoto:     The Diplomat:   RUSI:    Carnegie Endowment:     Herbert Lin:    ELN:    ArmsControl.Assoc:

You Might Also Read: 

Cyber Capabilities & National Power Rankings:

 

« NATO Prepares For Cyber Warfare
Reduce Vulnerabilities & Defend Your Brand Against DDoS Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Francisco Partners

Francisco Partners

Francisco Partners provide capital, expertise, and support for growth-aspiring technology companies.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.