Nearly
every U.S. arms program found vulnerable to cyber
attacks
Send a link to a friend
[January 21, 2015]
By Andrea Shalal
WASHINGTON (Reuters) - Nearly every U.S.
weapons program tested in fiscal 2014 showed "significant
vulnerabilities" to cyber attacks, including misconfigured, unpatched
and outdated software, the Pentagon's chief weapons tester said in his
annual report released Tuesday.
|
Michael Gilmore, director of operational test and evaluation
(DOT&E), said program managers had worked to resolve problems
discovered in previous years and security was improving, but this
year's testing had revealed new vulnerabilities.
"Cyber adversaries have become as serious a threat to U.S. military
forces as the air, land, sea and undersea threats represented in
operational testing for decades," Gilmore wrote in the 366-page
report.
"The continued development of advanced cyber intrusion techniques
makes it likely that determined cyber adversaries can acquire a
foothold in most (Department of Defense) networks, and could be in a
position to degrade important DOD missions when and if they chose
to," he wrote.
The report comes amid growing attention to cybersecurity within the
U.S. government, and was released days after fresh documents leaked
by former U.S. intelligence contractor Edward Snowden said China had
stolen "many terabytes" of data about the Lockheed Martin Corp F-35
fighter jet.
The Pentagon's F-35 program office said classified data about the
new warplane remained secure.
The report said tests of more than 40 weapons revealed problems with
cybersecurity, and U.S. troops needed to learn to "fight through"
cyber attacks, just as they do now with conventional attacks.
Gilmore said it was troubling that many issues found during
operational testing could have been addressed when programs were
still in development, and also cited numerous violations of Pentagon
password policies.
Even novice techniques had allowed testers to penetrate networks,
the report said.
[to top of second column] |
Gilmore said it was critical to follow up cyber testing of weapons
with an "adversarial assessment," in which officials pose as enemies
and try to hack into systems. He said the U.S. military also had a
critical shortfall of cyber personnel.
Cyber testing had grown more realistic, but current cyber ranges
needed to be expanded, the report said. It said the office had
worked with military officials to develop "cyber playbooks" and
battle drills that allow network "defenders" to practice techniques
and tactics.
Elsewhere in the report, Gilmore cited specific cybersecurity
problems with the U.S. Army's Warfighter Information Network -
Tactical built by General Dynamics Corp, the Navy's Joint High Speed
Vessel, built by Australia's Austal, as well as the Freedom class of
Littoral Combat Ship built by Lockheed.
(Reporting by Andrea Shalal; editing by Andrew Hay)
[© 2014 Thomson Reuters. All rights
reserved.] Copyright 2014 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
|