+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

A top think-tank has warned that cyber attacks on nuclear weapons could lead to accidental launches

Jan 11, 2018, 19:31 IST

The mushroom cloud of the Castle Bravo test device, detonated on March 1, 1954. The 15-megaton bomb was the most powerful nuclear device the US ever detonated. In comparison, the Tsar Bomba was a 50-megaton bomb.Wikimedia Commons

Advertisement
  • Research by Chatham House, a famed UK think-tank, highlighted vulnerabilities in the systems used to maintain nuclear arsenals worldwide.
  • It said the risks from cyber attacks have not been fully appreciated.
  • Systems being compromised could lead to accidental launches, it said.
  • Britain's GCHQ agency said it has been investing hard in offensive cyber capabilities.


Cyber attacks could compromise the nuclear arsenals of countries like Britain and the US, and ultimately trigger nuclear war, according to a paper by a respected think-tank.

Chatham House, a policy discussion group based in London, warned that "inadvertent launches" were a possible consequence of new technology being employed by hostile states and criminals.

In a research paper published on Thursday, two policy experts said that new technology could allow hostile actors to manipulate data feeds to components involved in nuclear launches.

This could have consequences including turning them off, giving them false information, or, in an extreme situation, accidentally firing them, the report warns.

Advertisement

It listed 13 types of data which were open to manipulation, stressing the scale of efforts necessary to protect nuclear systems:

Chatham House/Business Insider

The paper highlighted specific methods of vulnerability, including those related to at-sea nuclear deterrents like the UK's Trident missile system.

While these vessels are generally "air-gapped," meaning their systems are closed to outside input, the report pointed out that they are vulnerable while in port between missions, and could be compromised there.

They also highlighted research by Israeli researchers, who claimed to be able to read information from a computer without being connected to it by listening to the sound of its cooling fans, arguing that keeping systems 100% offline is no longer a feasible strategy.

Advertisement

Security risks to nuclear infrastructure are not new, the report acknowledges, and factors like human error, intelligence breaches and mechanical failure have been concerns since the beginning of the nuclear age.

But it warns that the expansion of cyber warfare programs by militaries and external groups introduces new risks which have yet to be fully appreciated.

A nuclear submarine is seen at the Royal Navy's submarine base at Faslane, Scotland, Aug. 31, 2015Reuters/Russell Cheyne

Details on any capability to meddle in nuclear programs would, inevitably, be kept out of the public domain. But it is certainly plausible that states have cyber weapons specifically designed to interfere with nuclear weapons systems.

Chatham House highlighted reports from spring 2017 that the US infiltrated parts of North Korea's nuclear test infrastructure.

Advertisement

Separately, Britain's GCHQ security agency has confirmed in a report to Parliament that it has a large array of "offensive cyber" capabilities, which are so powerful it would be hesitant to use them.

In comments made to the Intelligence and Security Committee, a GCHQ spokesman described the arsenal included "counter state offensive cyber capabilities which might never be used but are the sort [of] high-end deterrents."

It did not specify their particular capabilities, but the language leaves open the possibility that these could affect nuclear systems.

In conclusion, Chatham House's report called for more thorough testing of cyber resilience in nuclear systems, more failsafes, and a slowing-down of the process involved in launching attacks, which could increase the time available to assess the situation and spot compromised systems.

Business Insider contacted the British Ministry of Defence, and the Pentagon for comment, but did not receive a response from either at time of publication.

Advertisement

NOW WATCH: I tried the 7-minute workout for a month - here's what happened

You are subscribed to notifications!
Looks like you've blocked notifications!
Next Article