Will It Be Possible To Hack Connected Nuclear Weapons?

Nuclear warheads will be networked, with a greater potential for mishaps. Is that wise?

Future nuclear missiles may be siloed but, unlike their predecessors, they’ll exhibit “some level of connectivity to the rest of the warfighting system,” according to Werner J.A. Dahm, the chair of the US Air Force Scientific Advisory Board. 

That opens up new potential for nuclear mishaps that, until now, have never been a part of Pentagon planning. In 2017, the board will undertake a study to see how to meet those concerns. “Obviously the Air Force doesn’t conceptualize systems like that without ideas for how they would address those surety concerns,” said Dahm.

It’s no simple or straight-forward undertaking. The last time the United States designed an intercontinental ballistic missile was 1975. At the end of the December 2016, the Air Force Science Board announced that in 2017 they would explore safety and practical concerns of making a missile for the modern age along with other nuclear weapons that fall under the command of the Air Force.(pictured: Minuteman 3 in silo)

“We have a number of nuclear systems that are in need of recapitalisation,” said Dahm, referring to LRSO, ICBMs and the B-21 stealth bomber. In the future, he said, “these systems are going to be quite different from the ones that they may replace. In particular, they will be much more like all systems today, network connected. They’ll be cyber enabled.” That connectivity will create new concerns in terms of safety and certification that will almost certainly require changes or additions to current DoD directives.

The study comes at a critical time for the future of US Nuclear Weapons. On December 22, Donald Trump confused and alarmed the world when he tweeted that he would both strengthen and expand America’s nuclear weapons capability. But there was less new in the announcement than might actually appear. In fact, the Obama Administration was already working to fulfill the “strengthening” part of that same promise, having already put the United States on track to spend more than $1 trillion on modernisation of US nuclear weapons.

For the United States Air Force, the modernisation list includes replacing LGM-30 Minuteman with a new  intercontinental ballistic missile (also called a ground-based strategic deterrent,) developing a controversial nuclear-armed cruise missile called the long-range standoff weapon, or LRSO, to building and deploying an entirely new B-21 stealth bomber.

What are “surety concerns?”  Read that to mean how do you make sure that your fancy networked nuclear warfare control system can’t be hijacked or go off accidently.

Before the United States can modernise its nuclear weapons it must first make certain it understands everything that can possibly go wrong. 

Think back to the classic film Dr. Strangelove, a story very much about surety failure. A crazed Air Force general sends his B-52 wing to destroy their targets in the Soviet Union.

Of course, only the US President is supposed to be able to call for a nuclear strike, but it is thought that a contingency plan allows a lower level commander to issue the order in the event that the normal command and control has been disrupted.

DefenseOne:     Nuclear Facilities Have Poor Cyber Security:         US Nuclear Weapons Controlled by 8in Floppy Disks:

 

 

« CIOs Are Neglecting Process & Most Efficient Options
Driverless Future Won't Start With Self-driving Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

Accolite Digital

Accolite Digital

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.