A Cyberattack Could Lead To A Nuclear Strike

Cyber-attacks on nuclear weapons systems could lead to the "inadvertent" launch of missiles, a defence think tank has warned.

A report by Chatham House identified a "number of vulnerabilities" to nuclear weapons systems across the world, which could leave them open to harmful attacks, including through the use of malware or viruses.

Should a state be unaware that its systems have been compromised, it could lead to decisions being made based on false information, the study said. "Nuclear weapons systems were first developed at a time when computer capabilities were in their infancy and little consideration was given to potential malicious cyber vulnerabilities," the report's authors said.

"At times of heightened tension, cyber-attacks on nuclear weapons systems could cause an escalation, which results in their use.

"Inadvertent nuclear launches could stem from an unwitting reliance on false information and data. Moreover, a system that is compromised cannot be trusted in decision-making."

The report suggests the likelihood of attempted cyber-attacks on nuclear weapons systems is "relatively high", and cites reports the US may have infiltrated parts of North Korea's missile systems last year and caused test failures. It warns that a mistaken missile launch could result in a "significant loss of life".

The authors added: "Cyber vulnerabilities within nuclear weapons systems and structures present a whole set of dangers and risks.

"At best, cyber insecurity in nuclear weapons systems is likely to undermine trust and confidence in military capabilities and in the nuclear weapons infrastructure.
"At worst, cyber-attacks could lead to deliberate misinformation and the inadvertent launch of nuclear weapons.
"In times of crisis, loss of confidence in nuclear weapons capabilities would factor into decision-making and could undermine beliefs in nuclear deterrence - particularly in extending nuclear deterrence to allied countries."

The report, entitled Cybersecurity of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, said the issue required "urgent attention" from the governments of nuclear-armed states, and those that could be affected by the use of nuclear weapons.

It also urged governments to be open about their discussions, adding: "After all, it is the public that will pay the ultimate price for complacency regarding cyber-security of nuclear weapons systems."

According to a Stockholm International Peace Research Institute report from 2014, nine countries have nuclear forces: The United States, Russia, UK, France, China, India, Pakistan, Israel and North Korea.

BreakingNews

You Might Also Read: 

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?:

Nuclear Missiles Are Not N.Korea’s Only Threat:

Cyber Attacks Against Korean Missile Launches:

Cyber Threats & Nuclear Weapons:
 

 

« Smartphone Password Vulnerability Discovered
Healthcare Organisations In The Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

Spinnaker Support

Spinnaker Support

Spinnaker Support is a premier global provider of on-premise and cloud-based enterprise software support services.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

AFRY

AFRY

AFRY is a world leading engineering company, trusted as a supplier of services and solutions within the industry, energy, and infrastructure sectors as well as for authorities.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.