A Cyberattack Could Lead To A Nuclear Strike

Cyber-attacks on nuclear weapons systems could lead to the "inadvertent" launch of missiles, a defence think tank has warned.

A report by Chatham House identified a "number of vulnerabilities" to nuclear weapons systems across the world, which could leave them open to harmful attacks, including through the use of malware or viruses.

Should a state be unaware that its systems have been compromised, it could lead to decisions being made based on false information, the study said. "Nuclear weapons systems were first developed at a time when computer capabilities were in their infancy and little consideration was given to potential malicious cyber vulnerabilities," the report's authors said.

"At times of heightened tension, cyber-attacks on nuclear weapons systems could cause an escalation, which results in their use.

"Inadvertent nuclear launches could stem from an unwitting reliance on false information and data. Moreover, a system that is compromised cannot be trusted in decision-making."

The report suggests the likelihood of attempted cyber-attacks on nuclear weapons systems is "relatively high", and cites reports the US may have infiltrated parts of North Korea's missile systems last year and caused test failures. It warns that a mistaken missile launch could result in a "significant loss of life".

The authors added: "Cyber vulnerabilities within nuclear weapons systems and structures present a whole set of dangers and risks.

"At best, cyber insecurity in nuclear weapons systems is likely to undermine trust and confidence in military capabilities and in the nuclear weapons infrastructure.
"At worst, cyber-attacks could lead to deliberate misinformation and the inadvertent launch of nuclear weapons.
"In times of crisis, loss of confidence in nuclear weapons capabilities would factor into decision-making and could undermine beliefs in nuclear deterrence - particularly in extending nuclear deterrence to allied countries."

The report, entitled Cybersecurity of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, said the issue required "urgent attention" from the governments of nuclear-armed states, and those that could be affected by the use of nuclear weapons.

It also urged governments to be open about their discussions, adding: "After all, it is the public that will pay the ultimate price for complacency regarding cyber-security of nuclear weapons systems."

According to a Stockholm International Peace Research Institute report from 2014, nine countries have nuclear forces: The United States, Russia, UK, France, China, India, Pakistan, Israel and North Korea.

BreakingNews

You Might Also Read: 

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?:

Nuclear Missiles Are Not N.Korea’s Only Threat:

Cyber Attacks Against Korean Missile Launches:

Cyber Threats & Nuclear Weapons:
 

 

« Smartphone Password Vulnerability Discovered
Healthcare Organisations In The Cloud »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.

Atlantica Digital

Atlantica Digital

Atlantica design and create highly innovative software solutions and solid, scalable and secure IT infrastructures for a constantly evolving market.

Office of Cyber Security and Information Assurance (OCSIA) - Isle of Man

Office of Cyber Security and Information Assurance (OCSIA) - Isle of Man

OCSIA acts as the focal point in developing the Isle of Man’s cyber resilience, working in partnership with private and third sector organisations across the Island alongside the wider population.