Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security The Military Communications Government Software

Pentagon's New Next-Gen Weapons Systems Are Laughably Easy To Hack (zdnet.com) 93

An anonymous reader quotes a report from ZDNet: New computerized weapons systems currently under development by the U.S. Department of Defense (DOD) can be easily hacked, according to a new report published today. The report was put together by the U.S. Government Accountability Office (GAO), an agency that provides auditing, evaluation, and investigative services for Congress. The report detailed some of the most eye-catching hacks GAO testers performed during their analysis: "In one case, it took a two-person test team just one hour to gain initial access to a weapon system and one day to gain full control of the system they were testing. Some programs fared better than others. For example, one assessment found that the weapon system satisfactorily prevented unauthorized access by remote users, but not insiders and near-siders. Once they gained initial access, test teams were often able to move throughout a system, escalating their privileges until they had taken full or partial control of a system. In one case, the test team took control of the operators' terminals. They could see, in real-time, what the operators were seeing on their screens and could manipulate the system. They were able to disrupt the system and observe how the operators responded. Another test team reported that they caused a pop-up message to appear on users' terminals instructing them to insert two quarters to continue operating. Multiple test teams reported that they were able to copy, change, or delete system data including one team that downloaded 100 gigabytes, approximately 142 compact discs, of data."

The report claims the DOD documented many of these "mission-critical cyber vulnerabilities," but Pentagon officials who met with GAO testers claimed their systems were secure, and "discounted some test results as unrealistic." GAO said all tests were performed on computerized weapons systems that are still under development. GAO officials highlighted that hackers can't yet take control over current weapons systems and turn them against the U.S. But if these new weapons systems go live, the threat is more than real, GAO said.

This discussion has been archived. No new comments can be posted.

Pentagon's New Next-Gen Weapons Systems Are Laughably Easy To Hack

Comments Filter:
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Tuesday October 09, 2018 @09:09PM (#57453700)
    Comment removed based on user account deletion
    • by Tablizer ( 95088 ) on Tuesday October 09, 2018 @09:39PM (#57453794) Journal

      To be fair, managers are more likely to be rewarded for delivering a sufficient product on time than ensuring proper safeguards. A missed deadline will almost surely be noticed and put on them, while slipshod security has roughly a 1 in 10 chance of showing its head during a manager's actual reign. (The marketing people negotiated the contract, not the project manager, and the marketers often under-bid to win.)

      They are behaving "rationally" in terms of their OWN risks versus rewards. The managers are following the carrots and sticks which are actually applied to them like donkeys would.

      It's kind of like debt and pensions versus politicians: they won't likely be in office anymore if they muck either of those up bad enough for the public to notice, so they give short-term handouts instead, dumping the long term problem onto the future. In the future, you will hear, "I didn't do it, my predecessors did."

      • by 1369IC ( 935113 )
        >while slipshod security has roughly a 1 in 10 chance of showing its head during a manager's actual reign Systems that handle classified information are usually (perhaps always; only got involved in a few) validated by another, 3-letter, government agency outside the service. So if your system sucks, I would think there's a good chance the 3-letter agency would find it.
        • by Tablizer ( 95088 )

          There's only so much inspection-by-checkbox can do. The actual source-code would have be carefully read (and understood) for a good inspection, and that cost is probably more than most want to pay. (A compromise might be random spot checking.)

      • by Anonymous Coward

        To be fair, managers are more likely to be rewarded for delivering a sufficient product on time than...

        The ellipses at the end seemed appropriate, since you can fill in the blank.

        In short managers, like politicians of late, particularly on the R side are more than happy to burn ethics to fuel their futures, even if the world burns, and a lot of people are happy enough to go along with it, particularly if at the end of it is something they really wanted.

        Is it even possible to teach ethics such that people are truly ethical? I'm doubtful. The hard right seems to have found a way around many of those religiou

      • Correction re: "they won't likely be in office anymore if...

        Corrected version: ...they won't likely be in office down the road. If they muck either of those up bad enough for the public to notice, it will probably be after their reign. Therefore, they give short-term handouts instead, dumping the long term problem onto the future.

      • The managers are following the carrots and sticks which are actually applied to them like donkeys would.

        That says it all, really.

        For better results, a good start would be appointing managers who are smarter (and more moral) than donkeys.

        If they can find any.

    • by AHuxley ( 892839 )
      A multi national wants to get into the mil no bid contracts.
      They set up a front company in the USA with a few staff who have the needed security clearances and the needed legal team.
      The actual products and services then get done in the low cost nations with just enough final US oversight to win a bid.
      Nobody knows who is making what, who worked on what computer system.
      The result is products and services from deep in the EU, China getting passed as from a US company.
    • Re:What? (Score:5, Interesting)

      by ShanghaiBill ( 739463 ) on Tuesday October 09, 2018 @09:43PM (#57453808)

      This smells like the result of MBAs ignoring engineers...

      It is worse in the military, because communication is inherently unidirectional, and they can go years between real world validations (i.e. wars).

      "War games" are setup by the same people that are being tested, so if they fail the test, they can just change the rules and have a do-over. This famously happened during the run up to the 2003 Iraqi invasions, when opfor was repeatedly banned from using unconventional tactics, such as underage bicycle messengers and roadside bombs, because that was "unrealistic".

      I had personal experience with this nonsense when I was a young lieutenant. I was part of the Red Team (opfor), and we were hopelessly out numbered and out gunned since we were playing "insurgents". So we decided to go asymmetric ... and cut off the Blue Team's water supply. I was told that wasn't allowed, and to turn it back on immediately. So then we set up road blocks that targeted their chow trucks. Nope, that wasn't allowed either.

      But we were permitted to launch a hopeless frontal attack directly into their entrenchments, which we did on the last day of the exercise so we could go home early. In the after-action critique, I can remember the colonel getting up and congratulating everyone on a job well done. That's when I decided a military career was not for me, and I am not surprised that America proceeded to lose several wars.

      Semper Fi.

      • by 1369IC ( 935113 )
        >It is worse in the military, because communication is inherently unidirectional, and they can go years between real world validations (i.e. wars). This is not as true, if true at all, on the R&D side. I work in one R&D command and we have almost 14,000 people and fewer than 200 military personnel. So you don't see the classic military structure you see in uniform. Also, in the Army, at least, if you're working on an actual system you're probably working for a Program Manager. PMs can have whoev
      • Re: (Score:1, Insightful)

        That's because the purpose of wargames is to test systems and get people used to doing their jobs under stress. They're not there so that young jackass lieutenants can show off how clever they are. See, if you were actually smart you'd understand wargames and why the military has them. But you don't. IYI in action. [medium.com] The IYI pathologizes others for doing things he doesnâ(TM)t understand without ever realizing it is his understanding that may be limited. He thinks people should act according to their
        • Thanks for the link; very insightful read.
        • Re:What? (Score:4, Insightful)

          by Anonymous Coward on Wednesday October 10, 2018 @10:27AM (#57455710)

          "That's because the purpose of wargames is to test systems and get people used to doing their jobs under stress"

          Im genuinly curious, why do they call it war games then and not system testing?
          Why do they not provide a procedure for the Red team to follow?
          If not a procedure, why do they not provide limitations for the Red team?

          I mean if the purpose is to test the systems under specific circumstances then why not lay those circumstances out ahead of time? If they do, then yes the previous poster that you replied to is an idiot for not following the rules of the game. If not, then isnt it someone else's fault that they didn't define the rules properly in the first place?

          I mean if you go and tell me to perform action X (like attack a base) and then i perform action X, how can anyone call me an IYI if they didn't specify how they want action X done? wouldn't that mean that someone higher up the food-chain is the IYI by assuming that someone else would perform action X in a specific manner? To me it sounds like there were several IYI's in the scenario mentioned.

          note: I do not actually know anything about war-games in the us military, so i am curious how these things are supposed to work.

      • Maybe... Being old enough to witness and understand the invention of nearly all of our modern computing technology, I can tell you that when you are inventing something new you are concerned with getting it to work. Safety and security improvement often comes later (if at all).
  • just enter that as the username

  • ban laughing.

  • by phantomfive ( 622387 ) on Tuesday October 09, 2018 @09:28PM (#57453764) Journal

    GAO said all tests were performed on computerized weapons systems that are still under development.

    You can't add security on as an afterthought. It needs to be a core feature.

    • by 1369IC ( 935113 )
      There are many steps to development, so it's hard to say if they have a case or not. Some of these things go from the most basic research all the way to final engineering. So if you're at the stage where you're trying to get it to "Hello World" and somebody tests your security, you might have a fair complaint. Or if you've got a working prototype as a technology demonstrator so you can try out different components like sensors or smart munitions or propulsion systems to see if they operate in the kinds of c
    • You can't add security on as an afterthought. It needs to be a core feature.

      Adding security in and of itself is dangerous. If the operator can't fire the weapon because he's locked out of the terminal, it is worse than not having that weapon there at all. Because you make your plans assuming the weapon is present, and when it won't work then your plans are fucked.

      Military security comes from people walking around with guns and not plugging everything into the Internet.

  • Quid pro quo (Score:1, Offtopic)

    by PopeRatzo ( 965947 )

    Pentagon's New Next-Gen Weapons Systems Are Laughably Easy To Hack

    Especially since Trump gave Putin and Netanyahu all the passwords.

    • by Anonymous Coward

      PopeRatzo, one of the most legendary hate preachers and conspiracy theorists on Slashdot.

    • Even you should be able to come up with better than that.

      You're losing your edge.

  • by n3r0.m4dski11z ( 447312 ) on Tuesday October 09, 2018 @11:40PM (#57454156) Homepage Journal

    "including one team that downloaded 100 gigabytes, approximately 142 compact discs, of data."

    Not archaic enough. I'm gonna need that in number of baskets of scrolls please.

    • *deep breath in*

      So lets assume a bushel basket as that is fairly easily hand-held and a Torah scroll as a standard (still in use!) scroll. Well in that case your bushel (2150-2219 cu. in.) can hold right at two Torah scrolls (roughly 1100 cu. in. per scroll). Now the Torah scroll contains exactly 304,805 characters. If we use a standard 7-bit ASCII character set that's ((304805 * 7) / 8)/1024 = 260.453 KB per scroll, or 520.91 KB per basket.

      Now 100GB is 104,857,600 KB so you would need 104,857,600 / (5
  • by Greyfox ( 87712 ) on Tuesday October 09, 2018 @11:50PM (#57454186) Homepage Journal
    Something Something government contractors something something lowest bidder.
  • by stealth_finger ( 1809752 ) on Wednesday October 10, 2018 @04:41AM (#57454750)
    "100 gigabytes, approximately 142 compact discs, of data."

    Probably the same type of people that call the internet AOL.
  • Insiders though? (Score:5, Insightful)

    by Gilgaron ( 575091 ) on Wednesday October 10, 2018 @08:15AM (#57455190)
    Not that they shouldn't do better, but, say, if someone can only hack a Phalanx system from inside the aircraft carrier from a secure access terminal then it is probably not going to end up exploited, since if you can get a mole in that deep they can probably do more damage throwing a wrench into the right place.
    • That's really the dumb part of this story. These systems are air-gapped.

      At that point, you have to decide if the air gap is enough or if you want to add more security. When making that decision, you have to consider things like "If we can't fire this when we need to because a certificate expired, we will die".

      And "an operator could sabotage this" doesn't require hacking the computer. As you say, throw a wrench in it. Or unplug it. Or fill the operator's station with bullets.

      • by G00F ( 241765 )

        Well, the fact that a single spy, working as a service member, could make the whole ship unusable. And with out methods to detect, deter, or catch the person doing this.

        Now think of that single person, planting something that accepts remote (like via satellite phone, or even cellular if in port) can now remotely own these billion dollar weapon platforms.

        So while physical is important, that physical should be protected, not just some random terminal on the ship.

        • Now think of that single person, planting something that accepts remote (like via satellite phone, or even cellular if in port) can now remotely own these billion dollar weapon platforms.

          Now think about how they could do this even if you apply any security measures you can come up with.

          "We kept him from hacking the phalanx system! Instead, he planted something that broke the engines, so the phalanx system is down because we have no power."

  • More fun data conversions here: http://www.unitarium.com/data

  • I wonder what "more than real" means. Is it surreal? Is it hyper-real? Wait, this is 2018. The only thing that can be more than something is is when it's Literally Real. Like, "that hack is literally better than my soy chai latte." The data was so much more than real that it was as much data as 10 real Libraries of Congress.
  • by Koreantoast ( 527520 ) on Wednesday October 10, 2018 @10:54AM (#57455858)
    Most of the responsibility of this falls on the Pentagon. The government insists on tightly controlling all the requirements, and so in an environment where cost is king, if the customer doesn't properly write in cyber as a requirement, there isn't any incentive by the contractors to go beyond what is written. That is what the GAO report is primarily criticizing: that the DoD did not take cyber seriously until recently and that they are still trying to figure out how to architect a secure environment and write requirements for it. So even if a contractor says, "Hey, government Contracting Officer, you should tighten security around this system," the government Contracting Officer, if they understand even what's going on, will probably say, "I dunno, does that change the requirements? We're not going to pay you for it."
    • if the customer doesn't properly write in cyber as a requirement

      There's a more important question: Is it proper?

      Computerized gun turret. It is only connected to a network that goes to a small number of secure terminals, which are not connected to any other network.

      Why do you need to encrypt that link? If you control physical access via people with guns, why do you need secure logins?

      "We made this guy change his 16-character password every 2 months and he forgot it while getting shot at. Now he's locked out of the terminal due to three failed login attempts. The loca

  • so only those with physical access can hack them, a remote user can't. nothing is secure from someone with physical access. someone with physical access could pour a gallon of locktite into the mechanism of a weapon too too.

    non-news

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...