Will It Be Possible To Hack Connected Nuclear Weapons?

Nuclear warheads will be networked, with a greater potential for mishaps. Is that wise?

Future nuclear missiles may be siloed but, unlike their predecessors, they’ll exhibit “some level of connectivity to the rest of the warfighting system,” according to Werner J.A. Dahm, the chair of the US Air Force Scientific Advisory Board. 

That opens up new potential for nuclear mishaps that, until now, have never been a part of Pentagon planning. In 2017, the board will undertake a study to see how to meet those concerns. “Obviously the Air Force doesn’t conceptualize systems like that without ideas for how they would address those surety concerns,” said Dahm.

It’s no simple or straight-forward undertaking. The last time the United States designed an intercontinental ballistic missile was 1975. At the end of the December 2016, the Air Force Science Board announced that in 2017 they would explore safety and practical concerns of making a missile for the modern age along with other nuclear weapons that fall under the command of the Air Force.(pictured: Minuteman 3 in silo)

“We have a number of nuclear systems that are in need of recapitalisation,” said Dahm, referring to LRSO, ICBMs and the B-21 stealth bomber. In the future, he said, “these systems are going to be quite different from the ones that they may replace. In particular, they will be much more like all systems today, network connected. They’ll be cyber enabled.” That connectivity will create new concerns in terms of safety and certification that will almost certainly require changes or additions to current DoD directives.

The study comes at a critical time for the future of US Nuclear Weapons. On December 22, Donald Trump confused and alarmed the world when he tweeted that he would both strengthen and expand America’s nuclear weapons capability. But there was less new in the announcement than might actually appear. In fact, the Obama Administration was already working to fulfill the “strengthening” part of that same promise, having already put the United States on track to spend more than $1 trillion on modernisation of US nuclear weapons.

For the United States Air Force, the modernisation list includes replacing LGM-30 Minuteman with a new  intercontinental ballistic missile (also called a ground-based strategic deterrent,) developing a controversial nuclear-armed cruise missile called the long-range standoff weapon, or LRSO, to building and deploying an entirely new B-21 stealth bomber.

What are “surety concerns?”  Read that to mean how do you make sure that your fancy networked nuclear warfare control system can’t be hijacked or go off accidently.

Before the United States can modernise its nuclear weapons it must first make certain it understands everything that can possibly go wrong. 

Think back to the classic film Dr. Strangelove, a story very much about surety failure. A crazed Air Force general sends his B-52 wing to destroy their targets in the Soviet Union.

Of course, only the US President is supposed to be able to call for a nuclear strike, but it is thought that a contingency plan allows a lower level commander to issue the order in the event that the normal command and control has been disrupted.

DefenseOne:     Nuclear Facilities Have Poor Cyber Security:         US Nuclear Weapons Controlled by 8in Floppy Disks:

 

 

« CIOs Are Neglecting Process & Most Efficient Options
Driverless Future Won't Start With Self-driving Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

SquareX

SquareX

Squarex secures your online activities without compromising productivity.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

Merkle Science

Merkle Science

Merkle Science provides next generation risk mitigation, compliance and forensics for crypto-native businesses, DeFi participants, financial institutions & government agencies.