US Warship Collisions Raise Cyber Attack Questions

A spate of incidents involving United States warships in Asia, including a deadly collision this week off the Singapore coast, has forced the US Navy to consider whether cyber attackers might be to blame.

While some experts believe that being able to engineer such a collision would be unlikely, given the security systems of the US Navy and the logistics of having two ships converge, others say putting the recent incidents down to human error and coincidence is an equally unsatisfactory explanation.

The USS John S. McCain collided with a tanker early on Monday Aug 21st as the warship was on its way for a routine stop in the city-state. The collision tore a huge hole in the hull, and left 10 sailors missing and five injured. The navy said some human bodies were found by divers in flooded compartments on the ship.

Chief of US Naval Operations John Richardson said he could not rule out some kind of outside interference or a cyber-attack being behind the latest collision. However, he added that he did not want to prejudge the inquiry. His broader remarks suggested a focus on "how we do business on the bridge".

Admiral Richardson, when asked about the possibility of a cyber-attack, said: "We're looking at every possibility... as we did with Fitzgerald as well."

Just two months earlier, in June, the USS Fitzgerald and a Philippine-flagged cargo ship crashed into each other near Japan, leaving seven sailors dead and leading to several officers being disciplined.
There were also two more, lesser-known incidents this year. In January, USS Antietam ran aground near its base in Japan, and in May, USS Lake Champlain collided with a South Korean fishing vessel. No one was injured in either incident. 

Admiral Scott Swift, commander of the US Pacific Fleet, refused to rule out sabotage in Monday's incident, saying all possibilities are being examined. "We are not taking any consideration off the table," he told reporters in Singapore, when asked about the possibility of a cyber-attack in the latest incident.

High Tensions 
Analysts are divided on the issue, with some believing US Navy crews may simply be overstretched as they try to tackle myriad threats in the region. There is also the difficulties of sailing through waterways crowded with merchant shipping, they said.

But others believe something more sinister may be going on. Mr Itar Glick, head of the Israeli-based international cyber security firm Votiro, said the spate of incidents suggested that the Global Positioning System of US Navy ships could have been tampered with by hackers, causing them to miscalculate their positions. He said: "I think that hackers could try to do this, and if they are state sponsored they might have the right resources to facilitate this kind of attack."

Mr Glick, who says he used to work on cyber security for Israeli intelligence, said China and North Korea would be the most likely culprits.

Tensions are running high between North Korea and the US as Pyongyang makes strides in its weapons programme, after conducting two successful intercontinental ballistic missile (ICBM) test launches in July.
Pyongyang has also been blamed for recent cyber-attacks, including the 2014 hack of Sony Pictures, and the theft of millions of dollars from the Bangladesh central bank.

The US has repeatedly accused China of carrying out cyber-attacks on American companies, particularly to steal intellectual property. Beijing however says it is also the victim of such attacks.

Spoofing
Mr Glick pointed to a recent incident in June of apparent large-scale GPS interference in the Black Sea to illustrate that such disruptions are possible. The interference, called "spoofing", disrupts GPS signals so ship instruments show inaccurate locations. It caused some 20 vessels to have their signals disrupted, according to reports.

Mr Jeffery Stutzman, chief of intelligence operations for US-based cyber security firm Wapack Labs said he thought the possibility of a cyber-attack being behind the latest incident was "entirely possible".
"I would be very doubtful that it was human error, four times in a row," he said, referring to the four recent incidents.

Still, other observers believe such a scenario to be unlikely. Mr Zachary Fryer-Biggs, from defence consultancy Jane's by IHS Markit, said even if something went wrong with the GPS system of a ship, other safety mechanisms should stop it from crashing, such as having people on watch.
"The collision only occurs if several other safety mechanisms fail," he said.

Mr Daniel Paul Goetz, from US-headquartered cyber security firm Lantium, said causing a collision would be complicated, as it would involve knowing the exact location, speed and bearing of both ships involved. Mr Goetz, who says his background is in US military intelligence, also pointed to the level of technology used to protect the navy from such threats.

"The US military uses a GPS system that is highly secured, highly encrypted, the chances that somebody could take over US military ship is very close to zero," he said.

Straits Times

You Might Also Read:

Modern Fiction: A Novel  Is Required Reading At The Pentagon:

The First Ghost Ship In The US Robotic Navy:

UK’s Trident Nuclear Subs Vulnerability To Hackers:

 

« Carelessness Is Just As Risky As Deliberate Exfiltration
Google Launches GDPR Compliance Site »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Security Current

Security Current

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

LinOTP

LinOTP

LinOTP is an enterprise level, innovative, flexible and versatile OTP-platform for strong authentication.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

VanishID

VanishID

VanishID (formerly Picnic) is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

Forsyte IT Solutions

Forsyte IT Solutions

Forsyte Guardian 365 provides 24x7x365 personalized protection to keep your most valuable assets safe.