Cybersecurity Investigations After US Naval Collision

Probing potential cyber tampering and cyber intrusion will now be a standard part of US Navy accident investigation following the Aug. 21 collision of guided missile destroyer USS John S. McCain (pictured) with a chemical tanker, Vice Chief of Naval Operations Adm. Bill Moran told Congress recently.

As part of the investigation into McCain’s collision, a team from the Navy’s US 10th Fleet cyber arm traveled to Singapore to see if a reported steering failure of the destroyer was a result of cyber tampering.

Vice Adm. Jan Tighe elaborated on the effort during a U.S. Naval Institute and CSIS maritime security dialogue on Thursday.

“We will look for a couple of things. One, try to confirm cyber did not have anything to do with the collision and then how do we move forward in making sure these are a normal part of these investigations,” she said.

“It is something that we think about a lot and we have to have both the authorities and the human capital ready to respond.”

Last week, Moran told a joint hearing of the House Armed Services readiness and sea power and projection forces subcommittees that the possibility of a cyber intrusion to either

“It’s relatively new ground for us. This is the first time we’ve sent a team from our cyber command here in Washington, commander 10th fleet, sent a team over there to pull as much data from that ship as possible, that records data to see if there were any disruption or interruptions that are abnormal,” Moran said.

“I would also offer to you that just about every three letter agency in Washington, DC has looked to see if there were indications of an intent or a potential acknowledgement of a cyberattack. We have seen, I have personally not seen any evidence of that. But we’re not stopping there. The team is in place in Singapore today, has been for several days capturing all of the computer and network information to see if they can find any abnormalities or disruptions.”

The effort, called Operation Orion’s Hammer, focused on the reported failure of the aft steering mechanism that early reports say helped cause the collision between McCain and a chemical tanker off the coast of Singapore on Aug. 21 resulting in the death of 10 sailors, several Navy officials have told USNI News.

Much attention has been paid to the possibility that a cyberattack could have been responsible for not only McCain’s collision but also the June 17 collision between USS Fitzgerald (DDG-62) and a merchant ship off the coast of Japan that killed seven sailors.

While investigations into both collisions have not revealed evidence of a cyberattack, the Navy promised to thoroughly investigate the possibility. To allay future concerns of intrusion, the Navy now intends to build in cyber looks into future accident investigations, Moran said.

“This is the first time we’ve done this and we’re not stopping just, we’re, this is to try to institutionalise doing cyber as part of any mishap, aviation, submarine, you name it,” Moran told the panel.

“We need to go look at it as an order of business and not hand wave it toward cyber. So that’s where we’re headed.”

US Naval Institute:   Image: US Navy

You Might Also Read:

US Warship Collisions Raise Cyber Attack Questions:

Britain's Nuclear Subs In Cyber War:

« Global Cyber Conflict Is Close
Is the Flying Car Ready For Take-off? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

National Defense Industry Association (NDIA)

National Defense Industry Association (NDIA)

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.