Will It Be Possible To Hack Connected Nuclear Weapons?

Nuclear warheads will be networked, with a greater potential for mishaps. Is that wise?

Future nuclear missiles may be siloed but, unlike their predecessors, they’ll exhibit “some level of connectivity to the rest of the warfighting system,” according to Werner J.A. Dahm, the chair of the US Air Force Scientific Advisory Board. 

That opens up new potential for nuclear mishaps that, until now, have never been a part of Pentagon planning. In 2017, the board will undertake a study to see how to meet those concerns. “Obviously the Air Force doesn’t conceptualize systems like that without ideas for how they would address those surety concerns,” said Dahm.

It’s no simple or straight-forward undertaking. The last time the United States designed an intercontinental ballistic missile was 1975. At the end of the December 2016, the Air Force Science Board announced that in 2017 they would explore safety and practical concerns of making a missile for the modern age along with other nuclear weapons that fall under the command of the Air Force.(pictured: Minuteman 3 in silo)

“We have a number of nuclear systems that are in need of recapitalisation,” said Dahm, referring to LRSO, ICBMs and the B-21 stealth bomber. In the future, he said, “these systems are going to be quite different from the ones that they may replace. In particular, they will be much more like all systems today, network connected. They’ll be cyber enabled.” That connectivity will create new concerns in terms of safety and certification that will almost certainly require changes or additions to current DoD directives.

The study comes at a critical time for the future of US Nuclear Weapons. On December 22, Donald Trump confused and alarmed the world when he tweeted that he would both strengthen and expand America’s nuclear weapons capability. But there was less new in the announcement than might actually appear. In fact, the Obama Administration was already working to fulfill the “strengthening” part of that same promise, having already put the United States on track to spend more than $1 trillion on modernisation of US nuclear weapons.

For the United States Air Force, the modernisation list includes replacing LGM-30 Minuteman with a new  intercontinental ballistic missile (also called a ground-based strategic deterrent,) developing a controversial nuclear-armed cruise missile called the long-range standoff weapon, or LRSO, to building and deploying an entirely new B-21 stealth bomber.

What are “surety concerns?”  Read that to mean how do you make sure that your fancy networked nuclear warfare control system can’t be hijacked or go off accidently.

Before the United States can modernise its nuclear weapons it must first make certain it understands everything that can possibly go wrong. 

Think back to the classic film Dr. Strangelove, a story very much about surety failure. A crazed Air Force general sends his B-52 wing to destroy their targets in the Soviet Union.

Of course, only the US President is supposed to be able to call for a nuclear strike, but it is thought that a contingency plan allows a lower level commander to issue the order in the event that the normal command and control has been disrupted.

DefenseOne:     Nuclear Facilities Have Poor Cyber Security:         US Nuclear Weapons Controlled by 8in Floppy Disks:

 

 

« CIOs Are Neglecting Process & Most Efficient Options
Driverless Future Won't Start With Self-driving Cars »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risk insurance.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Novacoast

Novacoast

Novacoast helps organizations find, create & implement solutions for a powerful security posture through advisory, engineering, development & managed services.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.