Cybersecurity Investigations After US Naval Collision

Probing potential cyber tampering and cyber intrusion will now be a standard part of US Navy accident investigation following the Aug. 21 collision of guided missile destroyer USS John S. McCain (pictured) with a chemical tanker, Vice Chief of Naval Operations Adm. Bill Moran told Congress recently.

As part of the investigation into McCain’s collision, a team from the Navy’s US 10th Fleet cyber arm traveled to Singapore to see if a reported steering failure of the destroyer was a result of cyber tampering.

Vice Adm. Jan Tighe elaborated on the effort during a U.S. Naval Institute and CSIS maritime security dialogue on Thursday.

“We will look for a couple of things. One, try to confirm cyber did not have anything to do with the collision and then how do we move forward in making sure these are a normal part of these investigations,” she said.

“It is something that we think about a lot and we have to have both the authorities and the human capital ready to respond.”

Last week, Moran told a joint hearing of the House Armed Services readiness and sea power and projection forces subcommittees that the possibility of a cyber intrusion to either

“It’s relatively new ground for us. This is the first time we’ve sent a team from our cyber command here in Washington, commander 10th fleet, sent a team over there to pull as much data from that ship as possible, that records data to see if there were any disruption or interruptions that are abnormal,” Moran said.

“I would also offer to you that just about every three letter agency in Washington, DC has looked to see if there were indications of an intent or a potential acknowledgement of a cyberattack. We have seen, I have personally not seen any evidence of that. But we’re not stopping there. The team is in place in Singapore today, has been for several days capturing all of the computer and network information to see if they can find any abnormalities or disruptions.”

The effort, called Operation Orion’s Hammer, focused on the reported failure of the aft steering mechanism that early reports say helped cause the collision between McCain and a chemical tanker off the coast of Singapore on Aug. 21 resulting in the death of 10 sailors, several Navy officials have told USNI News.

Much attention has been paid to the possibility that a cyberattack could have been responsible for not only McCain’s collision but also the June 17 collision between USS Fitzgerald (DDG-62) and a merchant ship off the coast of Japan that killed seven sailors.

While investigations into both collisions have not revealed evidence of a cyberattack, the Navy promised to thoroughly investigate the possibility. To allay future concerns of intrusion, the Navy now intends to build in cyber looks into future accident investigations, Moran said.

“This is the first time we’ve done this and we’re not stopping just, we’re, this is to try to institutionalise doing cyber as part of any mishap, aviation, submarine, you name it,” Moran told the panel.

“We need to go look at it as an order of business and not hand wave it toward cyber. So that’s where we’re headed.”

US Naval Institute:   Image: US Navy

You Might Also Read:

US Warship Collisions Raise Cyber Attack Questions:

Britain's Nuclear Subs In Cyber War:

« Global Cyber Conflict Is Close
Is the Flying Car Ready For Take-off? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Digital Forensics Inc (DFI)

Digital Forensics Inc (DFI)

Digital Forensics Inc. is a nationally recognized High Technology Forensic Investigations and Information System Security firm

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

National Institute of Information and Communications Technology (NICT)

National Institute of Information and Communications Technology (NICT)

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.