Cybersecurity Investigations After US Naval Collision

Probing potential cyber tampering and cyber intrusion will now be a standard part of US Navy accident investigation following the Aug. 21 collision of guided missile destroyer USS John S. McCain (pictured) with a chemical tanker, Vice Chief of Naval Operations Adm. Bill Moran told Congress recently.

As part of the investigation into McCain’s collision, a team from the Navy’s US 10th Fleet cyber arm traveled to Singapore to see if a reported steering failure of the destroyer was a result of cyber tampering.

Vice Adm. Jan Tighe elaborated on the effort during a U.S. Naval Institute and CSIS maritime security dialogue on Thursday.

“We will look for a couple of things. One, try to confirm cyber did not have anything to do with the collision and then how do we move forward in making sure these are a normal part of these investigations,” she said.

“It is something that we think about a lot and we have to have both the authorities and the human capital ready to respond.”

Last week, Moran told a joint hearing of the House Armed Services readiness and sea power and projection forces subcommittees that the possibility of a cyber intrusion to either

“It’s relatively new ground for us. This is the first time we’ve sent a team from our cyber command here in Washington, commander 10th fleet, sent a team over there to pull as much data from that ship as possible, that records data to see if there were any disruption or interruptions that are abnormal,” Moran said.

“I would also offer to you that just about every three letter agency in Washington, DC has looked to see if there were indications of an intent or a potential acknowledgement of a cyberattack. We have seen, I have personally not seen any evidence of that. But we’re not stopping there. The team is in place in Singapore today, has been for several days capturing all of the computer and network information to see if they can find any abnormalities or disruptions.”

The effort, called Operation Orion’s Hammer, focused on the reported failure of the aft steering mechanism that early reports say helped cause the collision between McCain and a chemical tanker off the coast of Singapore on Aug. 21 resulting in the death of 10 sailors, several Navy officials have told USNI News.

Much attention has been paid to the possibility that a cyberattack could have been responsible for not only McCain’s collision but also the June 17 collision between USS Fitzgerald (DDG-62) and a merchant ship off the coast of Japan that killed seven sailors.

While investigations into both collisions have not revealed evidence of a cyberattack, the Navy promised to thoroughly investigate the possibility. To allay future concerns of intrusion, the Navy now intends to build in cyber looks into future accident investigations, Moran said.

“This is the first time we’ve done this and we’re not stopping just, we’re, this is to try to institutionalise doing cyber as part of any mishap, aviation, submarine, you name it,” Moran told the panel.

“We need to go look at it as an order of business and not hand wave it toward cyber. So that’s where we’re headed.”

US Naval Institute:   Image: US Navy

You Might Also Read:

US Warship Collisions Raise Cyber Attack Questions:

Britain's Nuclear Subs In Cyber War:

« Global Cyber Conflict Is Close
Is the Flying Car Ready For Take-off? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Sixteenth Air Force (Air Forces Cyber)

Sixteenth Air Force (Air Forces Cyber)

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

Morpheus Enterprises

Morpheus Enterprises

Morpheus Enterprises offer managed security solutions designed to keep your web applications secure and your business running smoothly.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).