Government Agencies

 

 

https://adminsm.asisonline.org/Pages/Weapon-Weaknesses.aspxWeapon WeaknessesGP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652019-02-01T05:00:00Zhttps://adminsm.asisonline.org/pages/mark-tarallo.aspx, Mark Tarallo<p>The U.S. Department of Defense (DOD) is planning to spend more than $1.5 trillion to develop its portfolio of major weapon systems. Although the investment may result in a state-of-the-art deterrence program in the future, the weapons currently have a glaring vulnerability–they are relatively easy to hack. <br></p><p>Officials from the U.S. Government Accountability Office (GAO), which was asked to review the state of DOD weapon systems cybersecurity, recently ran some tests to see if they could hack any of the Pentagon’s weapons.  </p><p>They could, without much difficulty. </p><p>“Using relatively simple tools and techniques, testers were able to take control of systems and largely operate undetected, due in part to basic issues such as poor password management and unencrypted communications,” the GAO explains in its report, <a href="https://www.gao.gov/products/GAO-19-128" target="_blank"><em>Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities.</em></a></p><p>It’s likely that the testing revealed only a small number of the actual existing weaknesses. “In addition, vulnerabilities that DOD is aware of likely represent a fraction of total vulnerabilities due to testing limitations. For example, not all programs have been tested and tests do not reflect the full range of threats,” the report says. </p><p>It’s a disconcerting finding, considering that adversaries of the United States are developing increasingly sophisticated cyberespionage and cyberattack capabilities to target DOD weapons. The GAO found several reasons for these vulnerabilities.</p><p>One is that the Pentagon’s weapons systems are increasingly dependent on IT. The amount of software in today’s weapons systems is growing exponentially and is embedded in numerous subsystems. But this dependence on software increases the weapons’ attack surface. </p><p>Similarly, DOD weapons systems are more networked and interconnected than ever before, and they are also connected to some external systems, such as GPS. These factors further increase vulnerability. </p><p>In addition, DOD has only recently made weapon systems cybersecurity a priority. Instead, for many years, DOD focused its cybersecurity efforts on protecting traditional networks, such as accounting systems. “Until around 2014, there was a general lack of emphasis on cybersecurity throughout the weapon systems acquisition process,” the report says. </p><p>This late-to-the-game approach will have long-term consequences, the GAO found. “Numerous officials we met with said that this failure to address weapon systems cybersecurity sooner will have long-lasting effects on the department,” the report explains. “Due to this lack of focus on weapon systems cybersecurity, DOD likely has an entire generation of systems that were designed and built without adequately considering cybersecurity.” </p><p>In the last few years, however, DOD has made progress on some new weapon cybersecurity initiatives and policies. Given this, GAO urged the DOD to press forward with these efforts. “To improve the state of weapon systems cybersecurity, it is essential that DOD sustain its momentum in developing and implementing key initiatives,” the report says. Finally, GAO pledged to continue to evaluate the issue.</p>

Government Agencies

 

 

https://adminsm.asisonline.org/Pages/Weapon-Weaknesses.aspx2019-02-01T05:00:00ZWeapon Weaknesses
https://adminsm.asisonline.org/Pages/A-Shock-to-the-System.aspx2018-12-01T05:00:00ZA Shock to the System
https://adminsm.asisonline.org/Pages/Maritime_Maladies.aspx2018-12-01T05:00:00ZMaritime Maladies
https://adminsm.asisonline.org/Pages/US-Maritime-Security.aspx2018-12-01T05:00:00Zmaritime maladies
https://adminsm.asisonline.org/Pages/Crossed-Wires.aspx2018-11-01T04:00:00ZCrossed Wires
https://adminsm.asisonline.org/Pages/Disastrously-Unprepared.aspx2018-11-01T04:00:00ZDisastrously Unprepared
https://adminsm.asisonline.org/Pages/Cybersecurity-and-Infrastructure.aspx2018-10-01T04:00:00ZQ&A: Cybersecurity and Infrastructure
https://adminsm.asisonline.org/Pages/Portrait-of-a-Shooter.aspx2018-10-01T04:00:00ZPortrait of a Shooter
https://adminsm.asisonline.org/Pages/Zakaria-Touches-on-Turmoil.aspx2018-09-25T04:00:00ZZakaria Touches on Turmoil
https://adminsm.asisonline.org/Pages/Election-Hardening.aspx2018-09-01T04:00:00ZElection Hardening
https://adminsm.asisonline.org/Pages/Soft-Targets,-Hard-Challenges.aspx2018-09-01T04:00:00ZSoft Targets, Hard Challenges
https://adminsm.asisonline.org/Pages/Cyber-Goals-Past-Due.aspx2018-08-01T04:00:00ZCyber Goals: Past Due
https://adminsm.asisonline.org/Pages/Brac-to-the-Future.aspx2018-07-01T04:00:00ZBrac to the Future
https://adminsm.asisonline.org/Pages/Far-Distant-Clearings.aspx2018-06-01T04:00:00ZFar Distant Clearings
https://adminsm.asisonline.org/Pages/Space-Jam.aspx2018-05-01T04:00:00ZSpace Jam
https://adminsm.asisonline.org/Pages/The-Land-of-Plunder.aspx2018-04-01T04:00:00ZThe Land of Plunder?
https://adminsm.asisonline.org/Pages/The-Price-of-Destruction.aspx2018-04-01T04:00:00ZThe Price of Destruction
https://adminsm.asisonline.org/Pages/Paving-the-Way.aspx2018-03-01T05:00:00ZPaving the Way
https://adminsm.asisonline.org/Pages/Containment-Strategies.aspx2018-02-01T05:00:00ZContainment Strategies
https://adminsm.asisonline.org/Pages/Opening-Up.aspx2018-02-01T05:00:00ZOpening Up

 You May Also Like...

 

 

Physical Securityhttps://adminsm.asisonline.org/physical-security{198ff2c5-db82-48f1-a9b9-8e8950e165de}Your source for the latest security news.
National Securityhttps://adminsm.asisonline.org/national-security{198ff2c5-db82-48f1-a9b9-8e8950e165de}Your source for the latest security news.
Employee Managementhttps://adminsm.asisonline.org/physical-security/employee-management{198ff2c5-db82-48f1-a9b9-8e8950e165de}Your source for the latest security news.