Cyber Arms; Security in Cyberspace by Stanislav Abaimov; Maurizio Martellini

Cyber Arms; Security in Cyberspace by Stanislav Abaimov; Maurizio Martellini

Author:Stanislav Abaimov; Maurizio Martellini
Language: eng
Format: epub
Publisher: CRC Press
Published: 2020-07-13T16:00:00+00:00


2.5.2 Vulnerabilities of Nuclear Weapon Systems and N3C

Today’s NSA secrets become tomorrow’s Ph.D. theses and the next day’s hacker tools

Bruce Schneier

Nuclear Weapons Overview

Nuclear weapons, enhanced by computerized systems, are becoming more dependent on virtual intelligence. Though ensuring the greatest deterrence of all time, with their increased complexity and embedded cyber equipment, they have become vulnerable to stealthy, high speed, unpredictable and anonymous cyberattacks and have expanded the range of attack vectors.

Nuclear weapon means any weapon that derives its destructive force from nuclear reactions. The nuclear reaction may either be fission or a combination of fission and fusion. Nuclear weapons are considered weapons of mass destruction.72

72 Nuclear Weapon Law and Legal Definition, last retrieved on 9 December 2018 at https://definitions.uslegal.com/n/nuclear-weapon/

Cyberattacks on the Nuclear Command, Control, and Communications (NC3) systems could cause false alarms, interrupt critical communications, interfere with the delivery systems, or even lead to full control of a nuclear weapon, targeted launch or detonation within the silo.

It is widely believed that the nuclear systems have the safest design and highest level of protection. However, the human factor remains present and human errors and unauthorized use with the systems, neither can be excluded with errors in design, calculations or equipment failures. Even previously secure air-gapped solutions are no longer the guarantee of protection from cyberattacks.73

73 S. Abaimov and P. Ingram, Hacking UK Trident: The Growing Threat, British-American Security Information Council 2017

There are a number of vulnerabilities and pathways through which a malicious actor may infiltrate a nuclear weapons system without a state’s knowledge. Human error, system failures, design vulnerabilities, and susceptibilities within the supply chain all represent common security issues in nuclear weapons systems. Cyberattack methods such as data manipulation, digital jamming and cyber spoofing could jeopardize the integrity of communication, leading to increased uncertainty in decision-making.74

74 Cybersecurity of Nuclear Weapons Systems Threats, Vulnerabilities and Consequences, Beyza Unal and Patricia Lewis, January 2018, International Security Department, Chatham House, last retrieved on 2 August 2018 at https://www.chathamhouse.org/sites/default/files/publications/research/2018-01-11-cybersecurity-nuclear-weapons-unal-lewis-final.pdf

Cybersecurity of Nuclear Weapons Systems Threats, Vulnerabilities and Consequences, Beyza Unal and Patricia Lewis, Chatham House, 2018

Recognizing the need of the nuclear systems for peaceful purposes, existence and the continuing production of nuclear weapons and their support equipment for military deterrence, the issue of their protection from sophisticated cyber threats is becoming one of paramount importance.

Hackers are targeting nuclear facilities, homeland security dept. and F.B.I. say75

75 N. Perlroth, Hackers are targeting nuclear facilities, 6 July 2017, last retrieved on 1 June 2018 at https://www.nytimes.com/2017/07/06/technology/nuclear-plant-hack-report.html?_r=0

Since May 2017, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries.

Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kan., according to security consultants and an urgent joint report issued by the Department of Homeland Security and the Federal Bureau of Investigation last week.

Information about cyberattacks on nuclear systems is very sensitive and mostly classified, and not available openly. However, it



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.