US military weapons systems found to have vulnerabilities

Department of Defence "did not prioritise weapon system security", claims report

Armed fighter jet

The trillion-dollar arsenal of advanced weaponry the United States Military owns has been found to have "mission-critical cyber vulnerabilities", according to a report.

Published by the US Government Accountability Office (GOA) the report claims that the US Department of Defence (DOD) had not prioritised cybersecurity when building its advanced weapon systems.

Graphic of an automated weapon - courtesy of the GOA

"Automation and connectivity are fundamental enablers of DOD's modern military capabilities," the report said. "However, they make weapon systems more vulnerable to cyber attacks.

"Although GAO and others have warned of cyber risks for decades, until recently, DOD did not prioritise weapon systems cybersecurity. Finally, DOD is still determining how best to address weapon systems cybersecurity."

The DOD is said to be planning to spend an estimated $1.66 trillion to further develop its current portfolio of major weapons and the GOA had been asked to review the state its current weapons system security.

In operational testing, the GOA found mission-critical cyber vulnerabilities in systems that were under development that program official believed were secure - some even discounted the test results as "unrealistic".

Worryingly, very simple tools and techniques were used to take control of the systems and went largely undetected. Basic issues such as poor password management and unencrypted communications were just some of the vulnerabilities found.

According to the report, the DOD is taking steps to improve its weapon system cybersecurity, which includes issuing and revising policy and guidance, but its remedial work will need to be swift as cyber threats are becoming more advanced.

In August, researchers at Rutgers University revealed that a normal Wi-Fi network could be used to detect weapons, such as firearms, bombs and explosive chemicals and in July, it was revealed that a hacker infiltrated the Air Force and stole files pertaining to a lethal drone, which later leaked onto the dark web.

"It is shocking to find out critical systems especially weapons systems are still using default vendor passwords," said Joseph Carson, chief security scientist at Thycotic. "This report's findings reveal that anyone in the world with sufficient cybersecurity skills could be in control of the worlds most advanced weapon systems within hours."  

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
Jack Dorsey resigns as Twitter CEO
business management

Jack Dorsey resigns as Twitter CEO

29 Nov 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

12 Nov 2021