A Cyberattack Could Lead To A Nuclear Strike

Cyber-attacks on nuclear weapons systems could lead to the "inadvertent" launch of missiles, a defence think tank has warned.

A report by Chatham House identified a "number of vulnerabilities" to nuclear weapons systems across the world, which could leave them open to harmful attacks, including through the use of malware or viruses.

Should a state be unaware that its systems have been compromised, it could lead to decisions being made based on false information, the study said. "Nuclear weapons systems were first developed at a time when computer capabilities were in their infancy and little consideration was given to potential malicious cyber vulnerabilities," the report's authors said.

"At times of heightened tension, cyber-attacks on nuclear weapons systems could cause an escalation, which results in their use.

"Inadvertent nuclear launches could stem from an unwitting reliance on false information and data. Moreover, a system that is compromised cannot be trusted in decision-making."

The report suggests the likelihood of attempted cyber-attacks on nuclear weapons systems is "relatively high", and cites reports the US may have infiltrated parts of North Korea's missile systems last year and caused test failures. It warns that a mistaken missile launch could result in a "significant loss of life".

The authors added: "Cyber vulnerabilities within nuclear weapons systems and structures present a whole set of dangers and risks.

"At best, cyber insecurity in nuclear weapons systems is likely to undermine trust and confidence in military capabilities and in the nuclear weapons infrastructure.
"At worst, cyber-attacks could lead to deliberate misinformation and the inadvertent launch of nuclear weapons.
"In times of crisis, loss of confidence in nuclear weapons capabilities would factor into decision-making and could undermine beliefs in nuclear deterrence - particularly in extending nuclear deterrence to allied countries."

The report, entitled Cybersecurity of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, said the issue required "urgent attention" from the governments of nuclear-armed states, and those that could be affected by the use of nuclear weapons.

It also urged governments to be open about their discussions, adding: "After all, it is the public that will pay the ultimate price for complacency regarding cyber-security of nuclear weapons systems."

According to a Stockholm International Peace Research Institute report from 2014, nine countries have nuclear forces: The United States, Russia, UK, France, China, India, Pakistan, Israel and North Korea.

BreakingNews

You Might Also Read: 

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?:

Nuclear Missiles Are Not N.Korea’s Only Threat:

Cyber Attacks Against Korean Missile Launches:

Cyber Threats & Nuclear Weapons:
 

 

« Smartphone Password Vulnerability Discovered
Healthcare Organisations In The Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

National Accreditation Agency of Ukraine (NAAU)

National Accreditation Agency of Ukraine (NAAU)

NAAU is the national accreditation body for Ukraine. The directory of members provides details of organisations offering certification services for ISO 27001.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

Merkle Science

Merkle Science

Merkle Science provides next generation risk mitigation, compliance and forensics for crypto-native businesses, DeFi participants, financial institutions & government agencies.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.

Prequel

Prequel

Prequel is your real-time problem detection and resolution platform, powered by the global reliability community.