AGL40▲ 0 (0.00%)AIRLINK129.06▼ -0.47 (0.00%)BOP6.75▲ 0.07 (0.01%)CNERGY4.49▼ -0.14 (-0.03%)DCL8.55▼ -0.39 (-0.04%)DFML40.82▼ -0.87 (-0.02%)DGKC80.96▼ -2.81 (-0.03%)FCCL32.77▲ 0 (0.00%)FFBL74.43▼ -1.04 (-0.01%)FFL11.74▲ 0.27 (0.02%)HUBC109.58▼ -0.97 (-0.01%)HUMNL13.75▼ -0.81 (-0.06%)KEL5.31▼ -0.08 (-0.01%)KOSM7.72▼ -0.68 (-0.08%)MLCF38.6▼ -1.19 (-0.03%)NBP63.51▲ 3.22 (0.05%)OGDC194.69▼ -4.97 (-0.02%)PAEL25.71▼ -0.94 (-0.04%)PIBTL7.39▼ -0.27 (-0.04%)PPL155.45▼ -2.47 (-0.02%)PRL25.79▼ -0.94 (-0.04%)PTC17.5▼ -0.96 (-0.05%)SEARL78.65▼ -3.79 (-0.05%)TELE7.86▼ -0.45 (-0.05%)TOMCL33.73▼ -0.78 (-0.02%)TPLP8.4▼ -0.66 (-0.07%)TREET16.27▼ -1.2 (-0.07%)TRG58.22▼ -3.1 (-0.05%)UNITY27.49▲ 0.06 (0.00%)WTL1.39▲ 0.01 (0.01%)

Cyber threats to nuclear weapons | By Rimsha Malik

Share
Tweet
WhatsApp
Share on Linkedin
[tta_listen_btn]

Cyber threats to nuclear weapons

EACH aspect of society is at risk from cyber-based dangers, including the financial sector, the entertainment industry, departmental stores and insurance organizations. When it comes to cyberattacks on their most important systems, governments face an even more serious threat. A successful cyberattack on a nuclear weapon or related system, such as a nuclear weapon, a delivery system, or the accompanying Nuclear Command, Control and Communications (NC3) systems, might have existential repercussions. Attacks on key infrastructure could have extreme implications. Cyberattacks could result in false attack warnings, disrupt access to information or vital communications, undermine nuclear delivery or planning systems, or even let an enemy gain control of a nuclear weapon. The resilience of nuclear systems may be negatively impacted by the increased use of digital technology. In historically resilient systems, like submarines or mobile missile launchers, new technology can improve performance and dependability but it can also create new vulnerability.

Although there haven’t been any known public cyberattacks on nuclear weapons systems, past occurrences give us some idea of what can happen. For instance, in 1980, missiles were detected to be heading for the United States by warning systems. The warning turned out to be a false alarm brought on by a defective computer chip in the minutes before the President would have had to issue an order for retaliation. More recently, in 2010, a computer system malfunction caused 50 nuclear-armed missiles to go down for about an hour. These missiles were based in Wyoming. These are the kinds of occurrences that, particularly in times of crisis or conflict, could push leaders to the point of deciding to launch a nuclear attack based on incomplete intelligence and weaken their trust in military systems, which is necessary to prevent a serious error.

The human factor is also a significant concern in terms of cyber threats to nuclear weapons. In 2016, a security researcher discovered that the Minuteman III intercontinental ballistic missile system used an unsecured communications protocol that made it vulnerable to hacking. This vulnerability was caused by an insider who deliberately inserted the insecure protocol into the system. Another potential cyber threat to nuclear weapons is through supply chain attacks, where attackers compromise the security of a third-party vendor or supplier that provides critical components or software to the nuclear weapons system. In 2017, malware known as “NotPetya” was able to spread globally through supply chain attacks, affecting several companies and causing billions of dollars in damage. North Korean hackers have been linked to several cyber-attacks on nuclear-related targets. In 2014, a South Korean nuclear power plant operator was hacked, resulting in the leak of blueprints and other sensitive information. In 2017, a cyber-attack on a South Korean defence contractor resulted in the theft of sensitive military information, including plans for joint military exercises with the United States. These incidents demonstrate the potential for cyber threats to physically damage critical infrastructure and the need to maintain robust cybersecurity measures and regularly assess and address potential vulnerabilities in nuclear weapons management systems.

In 2013, a report by the International Institute for Strategic Studies (IISS) highlighted the vulnerability in Pakistan’s nuclear program to cyber-attacks. The report stated that Pakistan had invested relatively little in cybersecurity and relied on outdated technology, making its nuclear facilities vulnerable to cyber-attacks. In 2014, a group of hackers claiming to be from India breached the computer systems of the Pakistan Atomic Energy Commission (PAEC) and leaked sensitive information. The attack was believed to be part of a larger cyber espionage campaign targeting Indian and Pakistani government agencies. In 2015, the FBI arrested a Pakistani national in the United States who was attempting to sell sensitive information about Pakistan’s nuclear program to an undercover FBI agent. The individual had previously worked as a contractor at Pakistan’s Chashma nuclear power plant.

These incidents suggest that Pakistan’s nuclear program is vulnerable to cyber threats and underscore the need for robust cybersecurity measures. However, it is important to note that Pakistan has a policy of maintaining a low profile on its nuclear weapons program and does not publicly disclose details about its nuclear arsenal or its security measures. Therefore, the extent of cyber threats to Pakistan’s nuclear weapons program remains largely unknown. The consequences of a successful cyber-attack could be catastrophic, resulting in physical damage, loss of life and potentially even nuclear war. A concerted global effort will be needed to address the cyber danger of nuclear weapons. Everyone has an interest in averting a cyberattack that either triggers a nuclear launch or explosion or that precedes, exacerbates and intensifies a nuclear catastrophe. Therefore, the most urgent need is to bring nuclear-armed states together and seek consensus on preventing the most hazardous dynamics offered by the new cyber threat.

—The writer is Researcher at Centre for International Strategic Studies, AJK. Working on Cyber Warfare and National Security.

Email: [email protected]

Related Posts

Get Alerts