A Cyberattack Could Lead To A Nuclear Strike

Cyber-attacks on nuclear weapons systems could lead to the "inadvertent" launch of missiles, a defence think tank has warned.

A report by Chatham House identified a "number of vulnerabilities" to nuclear weapons systems across the world, which could leave them open to harmful attacks, including through the use of malware or viruses.

Should a state be unaware that its systems have been compromised, it could lead to decisions being made based on false information, the study said. "Nuclear weapons systems were first developed at a time when computer capabilities were in their infancy and little consideration was given to potential malicious cyber vulnerabilities," the report's authors said.

"At times of heightened tension, cyber-attacks on nuclear weapons systems could cause an escalation, which results in their use.

"Inadvertent nuclear launches could stem from an unwitting reliance on false information and data. Moreover, a system that is compromised cannot be trusted in decision-making."

The report suggests the likelihood of attempted cyber-attacks on nuclear weapons systems is "relatively high", and cites reports the US may have infiltrated parts of North Korea's missile systems last year and caused test failures. It warns that a mistaken missile launch could result in a "significant loss of life".

The authors added: "Cyber vulnerabilities within nuclear weapons systems and structures present a whole set of dangers and risks.

"At best, cyber insecurity in nuclear weapons systems is likely to undermine trust and confidence in military capabilities and in the nuclear weapons infrastructure.
"At worst, cyber-attacks could lead to deliberate misinformation and the inadvertent launch of nuclear weapons.
"In times of crisis, loss of confidence in nuclear weapons capabilities would factor into decision-making and could undermine beliefs in nuclear deterrence - particularly in extending nuclear deterrence to allied countries."

The report, entitled Cybersecurity of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, said the issue required "urgent attention" from the governments of nuclear-armed states, and those that could be affected by the use of nuclear weapons.

It also urged governments to be open about their discussions, adding: "After all, it is the public that will pay the ultimate price for complacency regarding cyber-security of nuclear weapons systems."

According to a Stockholm International Peace Research Institute report from 2014, nine countries have nuclear forces: The United States, Russia, UK, France, China, India, Pakistan, Israel and North Korea.

BreakingNews

You Might Also Read: 

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?:

Nuclear Missiles Are Not N.Korea’s Only Threat:

Cyber Attacks Against Korean Missile Launches:

Cyber Threats & Nuclear Weapons:
 

 

« Smartphone Password Vulnerability Discovered
Healthcare Organisations In The Cloud »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

SentryBay

SentryBay

SentryBay is the global leader in preventative endpoint isolation protection. We protect remote, BYOD and corporate endpoints so they can safely and securely connect with your corporate network.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

SignalRed

SignalRed

SignalRed provides the cutting edge next-generation penetration testing and secure development solutions to startups and large enterprises.

ZehnTek

ZehnTek

ZehnTek is a premier technology solutions provider, committed to offering comprehensive IT services tailored to meet the diverse needs of businesses.