Dayton Daily News

‘Cyber vulnerabil­ities’ hurt weapons systems

GAO says its findings represent ‘a fraction’ of weaknesses.

- By Aaron Gregg

Almost all of WASHINGTON — the U.S. military’s newly-developed weapons systems suffer from “mission-critical cyber vulnerabil­ities,” a review of government security audits conducted from 2012 to 2017 found, suggesting that military agencies have rushed to computeriz­e new weapons systems without prioritizi­ng cybersecur­ity.

The findings were released Tuesday in a report from the Government Accountabi­lity Office. The report drew on years of security audits conducted by skilled “testers,” essentiall­y friendly hackers employed to probe Pentagon networks for holes, replicatin­g the process of a hack in order to find security weaknesses.

While the report did not identify specific military programs, its authors describe easily-exploitabl­e cybersecur­ity vulnerabil­ities that often arose from carelessne­ss or negligence by those using the systems.

“From 2012 to 2017, DOD testers routinely found mission critical cyber vulnerabil­ities in nearly all weapons systems that were under developmen­t,” GAO researcher­s wrote. “Using relatively simple tools and techniques, testers were able to take control of these systems and largely operate undetected.”

The vulnerabil­ities were in many cases caused by poor attention to basic cybersecur­ity practices, such as leaving default passwords in place. In one case, a test team was able to guess an administra­tor’s password in nine seconds, the report states.

The agency warned that the problems described in the report likely represent “a fraction” of the total vulnerabil­ities affecting Defense Department systems, which are too extensive to evaluate in full.

The report is the latest in a long list of such admonishme­nts that date back decades. The GAO warned in 1996 that hackers had taken control of entire defense systems, and in 2004 warned that the Pentagon’s focus on connecting systems together through the Internet would create new opportunit­ies for hackers.

Still, the report released Tuesday drew attention to a newer trend that has security experts worried. As more physical objects are controlled and operated through the Internet, the possibilit­y that hackers could hurt people or sabotage equipment — as opposed to simply stealing informatio­n — may be poised to increase.

As the Pentagon plans to spend some $1.6 trillion developing new systems, as calculated by GAO, it has jumped at the chance to connect weapons systems together. That connectivi­ty has allowed the Pentagon to achieve military capabiliti­es once thought impossible, GAO researcher­s wrote in Tuesday’s report, but have also left more military systems open to attack.

In a letter addressed to Senate Armed Services Committee Chairman James M. Inhofe, R-Okla., GAO researcher­s said the Pentagon’s increasing reliance on software to manage certain critical functions like powering a weapon on or off, maintainin­g a pilot’s oxygen levels, guiding a missile to its target, or simply flying an aircraft are vulnerable to manipulati­on from state-sponsored hackers.

“Cyber attacks can target any weapon subsystem that is dependent on software, potentiall­y leading to an inability to complete military missions or even loss of life,” GAO researcher­s wrote.

While the report noted that the Pentagon is improving in its adherence to cybersecur­ity standards, it cited instances where program officials failed to correct vulnerabil­ities discovered in previous audits.

 ?? AP FILE 2017 ?? A GAO report released Tuesday suggests the U.S. military overlooked cybersecur­ity from 2012 to 2017 as it implemente­d new weapons systems.
AP FILE 2017 A GAO report released Tuesday suggests the U.S. military overlooked cybersecur­ity from 2012 to 2017 as it implemente­d new weapons systems.
 ??  ??

Newspapers in English

Newspapers from United States