US Warship Collisions Raise Cyber Attack Questions

A spate of incidents involving United States warships in Asia, including a deadly collision this week off the Singapore coast, has forced the US Navy to consider whether cyber attackers might be to blame.

While some experts believe that being able to engineer such a collision would be unlikely, given the security systems of the US Navy and the logistics of having two ships converge, others say putting the recent incidents down to human error and coincidence is an equally unsatisfactory explanation.

The USS John S. McCain collided with a tanker early on Monday Aug 21st as the warship was on its way for a routine stop in the city-state. The collision tore a huge hole in the hull, and left 10 sailors missing and five injured. The navy said some human bodies were found by divers in flooded compartments on the ship.

Chief of US Naval Operations John Richardson said he could not rule out some kind of outside interference or a cyber-attack being behind the latest collision. However, he added that he did not want to prejudge the inquiry. His broader remarks suggested a focus on "how we do business on the bridge".

Admiral Richardson, when asked about the possibility of a cyber-attack, said: "We're looking at every possibility... as we did with Fitzgerald as well."

Just two months earlier, in June, the USS Fitzgerald and a Philippine-flagged cargo ship crashed into each other near Japan, leaving seven sailors dead and leading to several officers being disciplined.
There were also two more, lesser-known incidents this year. In January, USS Antietam ran aground near its base in Japan, and in May, USS Lake Champlain collided with a South Korean fishing vessel. No one was injured in either incident. 

Admiral Scott Swift, commander of the US Pacific Fleet, refused to rule out sabotage in Monday's incident, saying all possibilities are being examined. "We are not taking any consideration off the table," he told reporters in Singapore, when asked about the possibility of a cyber-attack in the latest incident.

High Tensions 
Analysts are divided on the issue, with some believing US Navy crews may simply be overstretched as they try to tackle myriad threats in the region. There is also the difficulties of sailing through waterways crowded with merchant shipping, they said.

But others believe something more sinister may be going on. Mr Itar Glick, head of the Israeli-based international cyber security firm Votiro, said the spate of incidents suggested that the Global Positioning System of US Navy ships could have been tampered with by hackers, causing them to miscalculate their positions. He said: "I think that hackers could try to do this, and if they are state sponsored they might have the right resources to facilitate this kind of attack."

Mr Glick, who says he used to work on cyber security for Israeli intelligence, said China and North Korea would be the most likely culprits.

Tensions are running high between North Korea and the US as Pyongyang makes strides in its weapons programme, after conducting two successful intercontinental ballistic missile (ICBM) test launches in July.
Pyongyang has also been blamed for recent cyber-attacks, including the 2014 hack of Sony Pictures, and the theft of millions of dollars from the Bangladesh central bank.

The US has repeatedly accused China of carrying out cyber-attacks on American companies, particularly to steal intellectual property. Beijing however says it is also the victim of such attacks.

Spoofing
Mr Glick pointed to a recent incident in June of apparent large-scale GPS interference in the Black Sea to illustrate that such disruptions are possible. The interference, called "spoofing", disrupts GPS signals so ship instruments show inaccurate locations. It caused some 20 vessels to have their signals disrupted, according to reports.

Mr Jeffery Stutzman, chief of intelligence operations for US-based cyber security firm Wapack Labs said he thought the possibility of a cyber-attack being behind the latest incident was "entirely possible".
"I would be very doubtful that it was human error, four times in a row," he said, referring to the four recent incidents.

Still, other observers believe such a scenario to be unlikely. Mr Zachary Fryer-Biggs, from defence consultancy Jane's by IHS Markit, said even if something went wrong with the GPS system of a ship, other safety mechanisms should stop it from crashing, such as having people on watch.
"The collision only occurs if several other safety mechanisms fail," he said.

Mr Daniel Paul Goetz, from US-headquartered cyber security firm Lantium, said causing a collision would be complicated, as it would involve knowing the exact location, speed and bearing of both ships involved. Mr Goetz, who says his background is in US military intelligence, also pointed to the level of technology used to protect the navy from such threats.

"The US military uses a GPS system that is highly secured, highly encrypted, the chances that somebody could take over US military ship is very close to zero," he said.

Straits Times

You Might Also Read:

Modern Fiction: A Novel  Is Required Reading At The Pentagon:

The First Ghost Ship In The US Robotic Navy:

UK’s Trident Nuclear Subs Vulnerability To Hackers:

 

« Carelessness Is Just As Risky As Deliberate Exfiltration
Google Launches GDPR Compliance Site »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.

Andesite

Andesite

Andesite is delivering sustained advantage to cyber defense teams through technology and community.

Astra Cybertech

Astra Cybertech

At Astra Cybertech, we're more than just cybersecurity experts - we're your partners in safeguarding your digital assets.