US military weapons systems found to have vulnerabilities

Department of Defence "did not prioritise weapon system security", claims report

Armed fighter jet

The trillion-dollar arsenal of advanced weaponry the United States Military owns has been found to have "mission-critical cyber vulnerabilities", according to a report.

Published by the US Government Accountability Office (GOA) the report claims that the US Department of Defence (DOD) had not prioritised cybersecurity when building its advanced weapon systems.

Graphic of an automated weapon - courtesy of the GOA

Advertisement - Article continues below

"Automation and connectivity are fundamental enablers of DOD's modern military capabilities," the report said. "However, they make weapon systems more vulnerable to cyber attacks.

"Although GAO and others have warned of cyber risks for decades, until recently, DOD did not prioritise weapon systems cybersecurity. Finally, DOD is still determining how best to address weapon systems cybersecurity."

The DOD is said to be planning to spend an estimated $1.66 trillion to further develop its current portfolio of major weapons and the GOA had been asked to review the state its current weapons system security.

In operational testing, the GOA found mission-critical cyber vulnerabilities in systems that were under development that program official believed were secure - some even discounted the test results as "unrealistic".

Worryingly, very simple tools and techniques were used to take control of the systems and went largely undetected. Basic issues such as poor password management and unencrypted communications were just some of the vulnerabilities found.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

According to the report, the DOD is taking steps to improve its weapon system cybersecurity, which includes issuing and revising policy and guidance, but its remedial work will need to be swift as cyber threats are becoming more advanced.

In August, researchers at Rutgers University revealed that a normal Wi-Fi network could be used to detect weapons, such as firearms, bombs and explosive chemicals and in July, it was revealed that a hacker infiltrated the Air Force and stole files pertaining to a lethal drone, which later leaked onto the dark web.

"It is shocking to find out critical systems especially weapons systems are still using default vendor passwords," said Joseph Carson, chief security scientist at Thycotic. "This report's findings reveal that anyone in the world with sufficient cybersecurity skills could be in control of the worlds most advanced weapon systems within hours."  

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/cloud/355098/ibm-dedicates-supercomputing-power-to-coronavirus-researchers
high-performance computing (HPC)

IBM dedicates supercomputing power to coronavirus research

24 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020