US Warship Collisions Raise Cyber Attack Questions

A spate of incidents involving United States warships in Asia, including a deadly collision this week off the Singapore coast, has forced the US Navy to consider whether cyber attackers might be to blame.

While some experts believe that being able to engineer such a collision would be unlikely, given the security systems of the US Navy and the logistics of having two ships converge, others say putting the recent incidents down to human error and coincidence is an equally unsatisfactory explanation.

The USS John S. McCain collided with a tanker early on Monday Aug 21st as the warship was on its way for a routine stop in the city-state. The collision tore a huge hole in the hull, and left 10 sailors missing and five injured. The navy said some human bodies were found by divers in flooded compartments on the ship.

Chief of US Naval Operations John Richardson said he could not rule out some kind of outside interference or a cyber-attack being behind the latest collision. However, he added that he did not want to prejudge the inquiry. His broader remarks suggested a focus on "how we do business on the bridge".

Admiral Richardson, when asked about the possibility of a cyber-attack, said: "We're looking at every possibility... as we did with Fitzgerald as well."

Just two months earlier, in June, the USS Fitzgerald and a Philippine-flagged cargo ship crashed into each other near Japan, leaving seven sailors dead and leading to several officers being disciplined.
There were also two more, lesser-known incidents this year. In January, USS Antietam ran aground near its base in Japan, and in May, USS Lake Champlain collided with a South Korean fishing vessel. No one was injured in either incident. 

Admiral Scott Swift, commander of the US Pacific Fleet, refused to rule out sabotage in Monday's incident, saying all possibilities are being examined. "We are not taking any consideration off the table," he told reporters in Singapore, when asked about the possibility of a cyber-attack in the latest incident.

High Tensions 
Analysts are divided on the issue, with some believing US Navy crews may simply be overstretched as they try to tackle myriad threats in the region. There is also the difficulties of sailing through waterways crowded with merchant shipping, they said.

But others believe something more sinister may be going on. Mr Itar Glick, head of the Israeli-based international cyber security firm Votiro, said the spate of incidents suggested that the Global Positioning System of US Navy ships could have been tampered with by hackers, causing them to miscalculate their positions. He said: "I think that hackers could try to do this, and if they are state sponsored they might have the right resources to facilitate this kind of attack."

Mr Glick, who says he used to work on cyber security for Israeli intelligence, said China and North Korea would be the most likely culprits.

Tensions are running high between North Korea and the US as Pyongyang makes strides in its weapons programme, after conducting two successful intercontinental ballistic missile (ICBM) test launches in July.
Pyongyang has also been blamed for recent cyber-attacks, including the 2014 hack of Sony Pictures, and the theft of millions of dollars from the Bangladesh central bank.

The US has repeatedly accused China of carrying out cyber-attacks on American companies, particularly to steal intellectual property. Beijing however says it is also the victim of such attacks.

Spoofing
Mr Glick pointed to a recent incident in June of apparent large-scale GPS interference in the Black Sea to illustrate that such disruptions are possible. The interference, called "spoofing", disrupts GPS signals so ship instruments show inaccurate locations. It caused some 20 vessels to have their signals disrupted, according to reports.

Mr Jeffery Stutzman, chief of intelligence operations for US-based cyber security firm Wapack Labs said he thought the possibility of a cyber-attack being behind the latest incident was "entirely possible".
"I would be very doubtful that it was human error, four times in a row," he said, referring to the four recent incidents.

Still, other observers believe such a scenario to be unlikely. Mr Zachary Fryer-Biggs, from defence consultancy Jane's by IHS Markit, said even if something went wrong with the GPS system of a ship, other safety mechanisms should stop it from crashing, such as having people on watch.
"The collision only occurs if several other safety mechanisms fail," he said.

Mr Daniel Paul Goetz, from US-headquartered cyber security firm Lantium, said causing a collision would be complicated, as it would involve knowing the exact location, speed and bearing of both ships involved. Mr Goetz, who says his background is in US military intelligence, also pointed to the level of technology used to protect the navy from such threats.

"The US military uses a GPS system that is highly secured, highly encrypted, the chances that somebody could take over US military ship is very close to zero," he said.

Straits Times

You Might Also Read:

Modern Fiction: A Novel  Is Required Reading At The Pentagon:

The First Ghost Ship In The US Robotic Navy:

UK’s Trident Nuclear Subs Vulnerability To Hackers:

 

« Carelessness Is Just As Risky As Deliberate Exfiltration
Google Launches GDPR Compliance Site »

Perimeter 81

Directory of Suppliers

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Kaseya

Kaseya

Kaseya Traverse enables you to get to the bottom of problems quickly via root cause analysis, across Cloud, on-premise, hybrid Cloud, virtualized and distributed IT environments.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

Secure Recruitment

Secure Recruitment

Secure Recruitment is a specialist Executive Search business that focuses its efforts on attracting specific exceptional talent in Cyber Security.

The Hive

The Hive

The Hive is a fund and co-creation studio that collaborates with entrepreneurs and corporations to create and launch AI based startups.

Thomsen Trampedach GmbH

Thomsen Trampedach GmbH

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

NexGenT

NexGenT

NexGenT have combined military-style training with decades of network engineering and cyber security experience into an immersive program to get people into cyber security fast and effectively.