Filled Under:
,

Hacking Nuclear Command and Control

Executive Summary

This paper will analyse the threat of cyber terrorism in regard to nuclear weapons.
Specifically, this research will use open source knowledge to identify the structure
of nuclear command and control centres, how those structures might be
compromised through computer network operations, and how doing so would fit
within established cyber terrorists’ capabilities, strategies, and tactics.  If access to
command and control centres is obtained, terrorists could fake or actually cause
one nuclear-armed state to attack another, thus provoking a nuclear response from
another nuclear power.  This may be an easier alternative for terrorist groups than
building or acquiring a nuclear weapon or dirty bomb themselves.  This would
also act as a force equaliser, and provide terrorists with the asymmetric benefits of
high speed, removal of geographical distance, and a relatively low cost.
Continuing difficulties in developing computer tracking technologies which could
trace the identity of intruders, and difficulties in establishing an internationally
agreed upon legal framework to guide responses to computer network operations,
point towards an inherent weakness in using computer networks to manage
nuclear weaponry.  This is particularly relevant to reducing the hair trigger
posture of existing nuclear arsenals.

         




0 comments:

Post a Comment