Cybersecurity Investigations After US Naval Collision

Probing potential cyber tampering and cyber intrusion will now be a standard part of US Navy accident investigation following the Aug. 21 collision of guided missile destroyer USS John S. McCain (pictured) with a chemical tanker, Vice Chief of Naval Operations Adm. Bill Moran told Congress recently.

As part of the investigation into McCain’s collision, a team from the Navy’s US 10th Fleet cyber arm traveled to Singapore to see if a reported steering failure of the destroyer was a result of cyber tampering.

Vice Adm. Jan Tighe elaborated on the effort during a U.S. Naval Institute and CSIS maritime security dialogue on Thursday.

“We will look for a couple of things. One, try to confirm cyber did not have anything to do with the collision and then how do we move forward in making sure these are a normal part of these investigations,” she said.

“It is something that we think about a lot and we have to have both the authorities and the human capital ready to respond.”

Last week, Moran told a joint hearing of the House Armed Services readiness and sea power and projection forces subcommittees that the possibility of a cyber intrusion to either

“It’s relatively new ground for us. This is the first time we’ve sent a team from our cyber command here in Washington, commander 10th fleet, sent a team over there to pull as much data from that ship as possible, that records data to see if there were any disruption or interruptions that are abnormal,” Moran said.

“I would also offer to you that just about every three letter agency in Washington, DC has looked to see if there were indications of an intent or a potential acknowledgement of a cyberattack. We have seen, I have personally not seen any evidence of that. But we’re not stopping there. The team is in place in Singapore today, has been for several days capturing all of the computer and network information to see if they can find any abnormalities or disruptions.”

The effort, called Operation Orion’s Hammer, focused on the reported failure of the aft steering mechanism that early reports say helped cause the collision between McCain and a chemical tanker off the coast of Singapore on Aug. 21 resulting in the death of 10 sailors, several Navy officials have told USNI News.

Much attention has been paid to the possibility that a cyberattack could have been responsible for not only McCain’s collision but also the June 17 collision between USS Fitzgerald (DDG-62) and a merchant ship off the coast of Japan that killed seven sailors.

While investigations into both collisions have not revealed evidence of a cyberattack, the Navy promised to thoroughly investigate the possibility. To allay future concerns of intrusion, the Navy now intends to build in cyber looks into future accident investigations, Moran said.

“This is the first time we’ve done this and we’re not stopping just, we’re, this is to try to institutionalise doing cyber as part of any mishap, aviation, submarine, you name it,” Moran told the panel.

“We need to go look at it as an order of business and not hand wave it toward cyber. So that’s where we’re headed.”

US Naval Institute:   Image: US Navy

You Might Also Read:

US Warship Collisions Raise Cyber Attack Questions:

Britain's Nuclear Subs In Cyber War:

« Global Cyber Conflict Is Close
Is the Flying Car Ready For Take-off? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

Professional Information Security Association (PISA)

Professional Information Security Association (PISA)

PISA is an independent and not-for-profit organization for information security professionals, with the primary objective of promoting information security awareness and best practice.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.