US Warship Collisions Raise Cyber Attack Questions

A spate of incidents involving United States warships in Asia, including a deadly collision this week off the Singapore coast, has forced the US Navy to consider whether cyber attackers might be to blame.

While some experts believe that being able to engineer such a collision would be unlikely, given the security systems of the US Navy and the logistics of having two ships converge, others say putting the recent incidents down to human error and coincidence is an equally unsatisfactory explanation.

The USS John S. McCain collided with a tanker early on Monday Aug 21st as the warship was on its way for a routine stop in the city-state. The collision tore a huge hole in the hull, and left 10 sailors missing and five injured. The navy said some human bodies were found by divers in flooded compartments on the ship.

Chief of US Naval Operations John Richardson said he could not rule out some kind of outside interference or a cyber-attack being behind the latest collision. However, he added that he did not want to prejudge the inquiry. His broader remarks suggested a focus on "how we do business on the bridge".

Admiral Richardson, when asked about the possibility of a cyber-attack, said: "We're looking at every possibility... as we did with Fitzgerald as well."

Just two months earlier, in June, the USS Fitzgerald and a Philippine-flagged cargo ship crashed into each other near Japan, leaving seven sailors dead and leading to several officers being disciplined.
There were also two more, lesser-known incidents this year. In January, USS Antietam ran aground near its base in Japan, and in May, USS Lake Champlain collided with a South Korean fishing vessel. No one was injured in either incident. 

Admiral Scott Swift, commander of the US Pacific Fleet, refused to rule out sabotage in Monday's incident, saying all possibilities are being examined. "We are not taking any consideration off the table," he told reporters in Singapore, when asked about the possibility of a cyber-attack in the latest incident.

High Tensions 
Analysts are divided on the issue, with some believing US Navy crews may simply be overstretched as they try to tackle myriad threats in the region. There is also the difficulties of sailing through waterways crowded with merchant shipping, they said.

But others believe something more sinister may be going on. Mr Itar Glick, head of the Israeli-based international cyber security firm Votiro, said the spate of incidents suggested that the Global Positioning System of US Navy ships could have been tampered with by hackers, causing them to miscalculate their positions. He said: "I think that hackers could try to do this, and if they are state sponsored they might have the right resources to facilitate this kind of attack."

Mr Glick, who says he used to work on cyber security for Israeli intelligence, said China and North Korea would be the most likely culprits.

Tensions are running high between North Korea and the US as Pyongyang makes strides in its weapons programme, after conducting two successful intercontinental ballistic missile (ICBM) test launches in July.
Pyongyang has also been blamed for recent cyber-attacks, including the 2014 hack of Sony Pictures, and the theft of millions of dollars from the Bangladesh central bank.

The US has repeatedly accused China of carrying out cyber-attacks on American companies, particularly to steal intellectual property. Beijing however says it is also the victim of such attacks.

Spoofing
Mr Glick pointed to a recent incident in June of apparent large-scale GPS interference in the Black Sea to illustrate that such disruptions are possible. The interference, called "spoofing", disrupts GPS signals so ship instruments show inaccurate locations. It caused some 20 vessels to have their signals disrupted, according to reports.

Mr Jeffery Stutzman, chief of intelligence operations for US-based cyber security firm Wapack Labs said he thought the possibility of a cyber-attack being behind the latest incident was "entirely possible".
"I would be very doubtful that it was human error, four times in a row," he said, referring to the four recent incidents.

Still, other observers believe such a scenario to be unlikely. Mr Zachary Fryer-Biggs, from defence consultancy Jane's by IHS Markit, said even if something went wrong with the GPS system of a ship, other safety mechanisms should stop it from crashing, such as having people on watch.
"The collision only occurs if several other safety mechanisms fail," he said.

Mr Daniel Paul Goetz, from US-headquartered cyber security firm Lantium, said causing a collision would be complicated, as it would involve knowing the exact location, speed and bearing of both ships involved. Mr Goetz, who says his background is in US military intelligence, also pointed to the level of technology used to protect the navy from such threats.

"The US military uses a GPS system that is highly secured, highly encrypted, the chances that somebody could take over US military ship is very close to zero," he said.

Straits Times

You Might Also Read:

Modern Fiction: A Novel  Is Required Reading At The Pentagon:

The First Ghost Ship In The US Robotic Navy:

UK’s Trident Nuclear Subs Vulnerability To Hackers:

 

« Carelessness Is Just As Risky As Deliberate Exfiltration
Google Launches GDPR Compliance Site »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

SafeUM Communications

SafeUM Communications

SafeUM Secure Messenger is an encrypted secure communications protection mechanism for instant messaging.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

CyberSecJobs.com

CyberSecJobs.com

CyberSecJobs.com is a career site and job fair company providing services and resources to the cyber security community.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.