nuclear-news

The News That Matters about the Nuclear Industry Fukushima Chernobyl Mayak Three Mile Island Atomic Testing Radiation Isotope

The digital danger to nuclear weapons

The argument from cyberspace for eliminating nuclear weapons  NOVEMBER 9, 2018 At the height of the Cold War in 1982, American psychiatrist Robert Jay Lifton argued that the “central existential fact of the nuclear age is vulnerability.” That warning predated the proliferation of computers into almost every aspect of modern life, including nuclear weapons.

Today, the destructiveness of nuclear weapons has been coupled with the vulnerability of computers to create new pathways to disaster.

Specifically, there is now the possibility that hackers could compromise the computers that control nuclear weapons or provide information to officials about impending nuclear attacks.

Weapons security critically flawed

An October 2018 report reinforced this sense of vulnerability. In it, the United States Government Accountability Office (GAO) described a number of problems commonly found in the modern weapons systems developed by the U.S. Department of Defense (DOD). Although the report itself doesn’t say so, officials confirmed that nuclear weapons programs were included in the study.

PIC

The findings of the GAO report echoed earlier warnings of the cyberthreat to nuclear weapons. These included a 2013 DOD report and one by the Nuclear Threat Initiative, a non-governmental nuclear weapon threat reduction organization based in Washington, D.C.

Our research examines the risks associated with nuclear weapons systems, including those of accidental or inadvertent nuclear war. The most pressing concern from the GAO report is the possibility that some of these vulnerabilities might affect “nuclear command and control,” the term used to describe the computer networks that continuously monitor and direct the vast U.S. nuclear arsenal (or Russia).

The recent GAO report broadly criticized all DOD weapons systems. Over the past five years (2012 to 2017), the GAO reported, “DOD testers routinely found mission-critical cyber-vulnerabilities in nearly all weapon systems that were under development. Using relatively simple tools and techniques, testers were able to take control of these systems and largely operate undetected.”

In other words, just about every weapon system being developed by the U.S. military is vulnerable to cyberattack. What stands out are both the scale of the problem and that these problems exist in systems that should be highly protected.

The computerized military

Computers play an outsized role in the U.S. military — from providing information through various sensors to forming the backbone of communications networks. Faster communications and increased access to information are both valuable assets and these goals can be achieved with computers. Computers have become ubiquitous in the military environment as countries demand quick access to information and communications.

But computers also introduce vulnerabilities. As their role grows to include connecting the weapons systems of most advanced countries, so does our vulnerability. The vulnerability of these weapons systems should be seen as an anticipated and, arguably unavoidable, consequence of the computer-filled world we live in.

The GAO report went farther than just identifying vulnerabilities — it identified a culture within the DOD that fails to recognize and adequately address cybersecurity problems. Officials routinely assumed their systems were safe and ignored warnings until very recently.

We have observed a similar overconfidence in the military officials responsible for nuclear command and control.

This is a problem because the command-and-control system relies on complex networks of interconnected computers. These computers connect early warning satellites and radars to the president and will be used to pass on presidential orders to launch nuclear weapons should that fateful decision ever be made.

Computers must also constantly monitor and coordinate the daily operation of U.S. nuclear arsenal. Timelines for decisions in this system are extremely compressed, allowing less than 10 minutes for critical launch decisions to be made. The combination of interactive complexity and the tight timeline is typical of many other technological systems that are susceptible to unpredictable, large-scale accidents……. weapons https://stuff.co.za/the-argument-from-cyberspace-for-eliminating-nuclear-weapons/

Advertisements

November 10, 2018 - Posted by | safety, weapons and war

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: