TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

DOD Just Beginning to Grapple with Scale of Weapon Systems Vulnerabilities

414 pointsby moleculeover 6 years ago

24 comments

danielvfover 6 years ago
The good stuff is in the PDF:<p><a href="https:&#x2F;&#x2F;www.gao.gov&#x2F;assets&#x2F;700&#x2F;694913.pdf" rel="nofollow">https:&#x2F;&#x2F;www.gao.gov&#x2F;assets&#x2F;700&#x2F;694913.pdf</a><p>- Running a port scan caused the weapons system to fail<p>- One admin password for a system was guessed in nine seconds<p>- &quot;Nearly all major acquisition programs that were operationally tested between 2012 and 2017 had mission-critical cyber vulnerabilities that adversaries could compromise.&quot;<p>- Taking over systems was pretty much playing on easy mode: &quot;In one case, it took a two-person test team just one hour to gain initial access to a weapon system and one day to gain full control of the system they were testing.&quot;
评论 #18179654 未加载
评论 #18178236 未加载
评论 #18177827 未加载
评论 #18178040 未加载
评论 #18182094 未加载
评论 #18179610 未加载
评论 #18178623 未加载
评论 #18178946 未加载
评论 #18179147 未加载
MrLeapover 6 years ago
I was a dev contractor for the US Army for a few years. None of this surprises me.<p>They had some goofballs policies that made it seem like vulnerabilities were the goal. I could bitch at length. Their TSA style security theater practices were the order of the day. The IA training was an embarrassing joke and they made you do it often enough to make you a little crazy.<p>I just checked the certificate of networthiness page and they don&#x27;t have a valid SSL certificate. I recall that being the case years ago too. I wonder if it&#x27;s been that way for the last 7 years? That&#x27;s a cute little terrarium of the whole biome I remember.<p>Off topic a bit, but that all aside... I am more proud of the work I did there than at any other place in my career. I got a lot of excitement and engaged feedback about the interactive learning materials I created.<p>I&#x27;ll never know if it made any difference, but the mere fact that someone&#x27;s son or daughter COULD have noticed an IED threat they wouldn&#x27;t have otherwise because of my work gives me all sorts of proud fuzzies.<p>That work had way more meaning than all the other CRUD&#x2F;ML&#x2F;Advertainment schlock I&#x27;ll get to do for the rest of my life :)
评论 #18178491 未加载
评论 #18179910 未加载
评论 #18178603 未加载
hliebermanover 6 years ago
If you are interested in helping the US Government fix this particular trashfire, consider joining the Defense Digital Service. We work on a variety of DoD projects as part of the US Digital Service &quot;tech peace corps&quot;. <a href="https:&#x2F;&#x2F;www.dds.mil&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.dds.mil&#x2F;</a><p>If you&#x27;re not ready for that level of commitment (though it&#x27;s amazing work), and you&#x27;re interested in being involved as a security researcher, reach out to me and we can talk about joining our bug bounty program.
评论 #18180979 未加载
评论 #18183329 未加载
评论 #18181199 未加载
unit91over 6 years ago
I was an operator on a weapon system within the last decade that did not use encryption. I was horrified, naturally, but the explanations were:<p>1. Well, this is rapid deployment, we can&#x27;t have everything.<p>2. The enemy here is fairly low-tech. Shouldn&#x27;t be a problem.<p>Needless to say, I&#x27;m not surprised by this report.
评论 #18179120 未加载
评论 #18179616 未加载
the_dukeover 6 years ago
&gt; Nearly all major acquisition programs that were operationally tested between 2012 and 2017 had mission-critical cyber vulnerabilities that adversaries could compromise.<p>It&#x27;s not too surprising and a little reminiscent of the security nightmare that are IoT devices.<p>All those weapon systems come out of hardware&#x2F;engineering companies with little background in software engineering and the accompanying security best practices.
评论 #18181993 未加载
评论 #18179224 未加载
samstaveover 6 years ago
When I was at Lockheed - we were building the RFID tracking systems they used to track various everythings all over - and they were trying to make it a part of the Port Security for every port... and even had Tom Ridge join the board...<p>well, I recall asking about the security of the systems (I was the IT lead and was to help design the global port tracking system which they hoped to track all shipping containers) -- there was no encryption&#x2F;authentication on <i>any</i> of the tags.<p>If you had a reader, you could read&#x2F;write the tags.<p>They had not even thought about securing these systems - and they were trying to tout them as a security system for weapons shipments. They even had tags that had G-sensors that were to be able to tell you if a munition was dropped, if it had armed (some weapons will only arm themselves once a certain g-force is reached which indicates to the weapon they have been launched.)
degenerateover 6 years ago
The graphic on page 26 of the report is kind of cute: <a href="https:&#x2F;&#x2F;i.imgur.com&#x2F;MWrM2i8.png" rel="nofollow">https:&#x2F;&#x2F;i.imgur.com&#x2F;MWrM2i8.png</a><p>The inclusion of this graphic makes me realize the report is not intended to explain the situation to engineers. It&#x27;s to explain the problem to well-decorated higher ups that probably don&#x27;t understand modern technology all that well, yet are calling all the budget shots.
Animatsover 6 years ago
The US is going to lose a war this way.
评论 #18178637 未加载
1001101over 6 years ago
Now they can queue up some multi-billion dollar contracts to fix it. I&#x27;m in the wrong business.
评论 #18179949 未加载
underthelevelover 6 years ago
Telnet: the backbone of our Defense Industry
jvanderbotover 6 years ago
&quot;Another test team reported that they caused a pop-up message to appear on users’ terminals instructing them to insert two quarters to continue operating.&quot;
sesteelover 6 years ago
A ton of commercial systems have similar vulnerabilities. Teslas have gotten hacked remotely a multitude of times over several years. People who attack&#x2F;hack systems are specialized in ways that those engineers that build systems are not. None of this should be all that surprising. New recommendations on proper system design should mean future programs should have budgets to hire people to mitigate these problems. However, it should always be assumed there are vulnerabilities that can be exploited by others; any claims to the contrary should be met with extreme skepticism.
titzerover 6 years ago
It&#x27;s like, on a civilizational level, we&#x27;re just begging for a scenario where we accidentally destroy ourselves.
remarkEonover 6 years ago
Most of the comments outline how awful and dire the situation is (or probably is).<p>I&#x27;m less interested in this than I am in what we could do to fix it. Is it just more money to hire competent security engineers? Is it a more responsive talent acquisitions process that gets the right people in at the right time?
评论 #18181229 未加载
nooberminover 6 years ago
I guess my question then is why have a computer attached to these systems in the first place, or if you must, why not make it as dumb as possible? Why include more points of failure?<p>Also, I couldn&#x27;t help it, the DOD plans to spend 1.66 Trillion on these systems! Perhaps if we instead stop making new fangled, more complicated devices that with have tenfold more vulnerabilities to catch, how about we just stick with the machines we have and make then hardened. I imagine that it would save us loads if we just do that.
Sniffnoyover 6 years ago
Non-mobile link: <a href="https:&#x2F;&#x2F;www.gao.gov&#x2F;products&#x2F;GAO-19-128" rel="nofollow">https:&#x2F;&#x2F;www.gao.gov&#x2F;products&#x2F;GAO-19-128</a>
diogenescynicover 6 years ago
Good luck closing the barn door after the horse has bolted: <a href="https:&#x2F;&#x2F;www.wired.com&#x2F;2011&#x2F;11&#x2F;counterfeit-missile-defense&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.wired.com&#x2F;2011&#x2F;11&#x2F;counterfeit-missile-defense&#x2F;</a><p>I am no military expert, but it seriously looks like China has us in a stranglehold.
dzongaover 6 years ago
$1.7T is a lot of money just to protect your major investments in killing people efficiently. Modern society I guess.
Illniyarover 6 years ago
Are these remotely activated systems that are at risk (like drones)? if not, why is any weapon system that doesn&#x27;t need remote activation actually plugged into a public network?
gpvosover 6 years ago
If I were the Russians, Chinese, or North Koreans, I would heavily invest in offensive hacking capability. Oh wait, they&#x27;re already doing that.
lifeisstillgoodover 6 years ago
Silver lining: when the DOD find good ways to harden their systems, we can all copy them.<p>Cloud: it&#x27;s probably unplug the aerial &#x2F; network cable
评论 #18183346 未加载
ISLover 6 years ago
<i>You&#x27;ll see things here that look odd, even antiquated to modern eyes. Phones with cords, awkward manual valves, computers that barely deserve the name. But all of it is intentional. It&#x27;s all designed to operate in combat against an enemy who could infiltrate and disrupt all but the most basic computer systems.<p>Of course, those attitudes have changed through the years and Galactica is something of a relic. A reminder of a time when we were so frightened by the capabilities of our enemies that we literally looked backward for protection. Modern battlestars resemble Galactica only in the most superficial ways...</i>
评论 #18178901 未加载
评论 #18178584 未加载
评论 #18178847 未加载
microcolonelover 6 years ago
GDC4S (now General Dynamics Mission Systems) and NICTA have been working on seL4, and it at least seems that USDOD has <i>something</i> to build on, if they want to start providing assurances of some form on weapons systems.<p>They&#x27;ll really have to set the passwords properly though.
评论 #18188193 未加载
ourmandaveover 6 years ago
Not to play the Whataboutism card, (proceeds to play whataboutism card), but has anybody pen tested the Soviet&#x27;s or Chinese&#x27; systems?<p>Just thinking this isn&#x27;t a U.S. only problem.
评论 #18179670 未加载
评论 #18180075 未加载