US Army's $12bn Mobile Internet Is Vulnerable


A mobile Internet network used by the US Army in Iraq, Afghanistan and Africa contains cybersecurity vulnerabilities, the details about which have surfaced in combat testing.

The network, that costs $12bn (£8.3bn), is said to be the latest defense system to have vulnerabilities.

TWarfighter Information Network-Tactical (WIN-T) Increment 2 provides on-the-move network capability, a mobile infrastructure by employing military and commercial satellite connectivity and line-of-sight (terrestrial) radios and antennas to achieve end-to-end connectivity and dynamic networking operations. The network is deployed to 11 of the Army's combat brigades. Frank Kendall, chief of the Defense Department's acquisitions, approved the production in June.

The Army and contractor General Dynamics Corporation are currently working together to improve the systems and embed updates into the mobile networks that are scheduled to be deployed through 2028, states a Bloomberg report.

Paul Mehney, an Army spokesperson, noted in an email that Johns Hopkins University and the Army Research Laboratory who have conducted the assessment, "recommended both improvements to user training techniques and procedures and hardware and software enhancement to harden against cyber-threat".

In March, the US Government Accountability Office (GAO), in its annual review of major weapons programmes, said that Kendall directed an independent assessment of the mobile network in 2015 as "cybersecurity vulnerabilities reduced the program's operational capability and could incur growth cost and schedule delays if significant changes are necessary".

The GAO, although, did not disclose details about how to gain access to the system or how can it be attacked. Michael Gilmore, the Pentagon's director of operational testing said the vulnerability in the network poses a difficult challenge as it is "dependent upon the cyberdefence capabilities of all mission command systems".

Carol Smith, a spokeswoman for the Falls Church said, "General Dynamics Mission Systems is supporting the Army's efforts" to improve cybersecurity "to address the constantly changing threat environment."
IB Times: http://bit.ly/21bNqfn

« Fear This Man And His Hacking Empire
Disrupting ISIS Online In Africa »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

Totaljobs

Totaljobs

Totaljobs is the UK’s largest hiring platform. We have over 280,000 live jobs adverts on our site, helping you to find any type of job in any industry, including cybersecurity.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

WebOrion

WebOrion

WebOrion is an All-in-One Web Security & Performance Suite. Fortify, accelerate and monitor your website today.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Bugv

Bugv

Bugv is a crowdsourcing cybersecurity platform powered by human intelligence where we connect businesses with cyber security experts, ethical hackers, bug bounty hunters from all around the world.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

FastPassCorp

FastPassCorp

In the world of IT, identity theft is a growing concern. FastPass offers an innovative solution as a cloud or on-premises offering.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.

Cylerian

Cylerian

Cylerian is a Next Generation SaaS Security Platform - One unified cloud platform to achieve your security, compliance, and operational objectives.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.