Jump to content

US weapons systems can be 'easily hacked' - General Hangout & Discussions - InviteHawk - Your Only Source for Free Torrent Invites

Buy, Sell, Trade, or Find Free Invites for top private trackers like redacted, blutopia, losslessclub, femdomcult, filelist, Chdbits, Uhdbits, empornium, iptorrents, hdbits, gazellegames, animebytes, privatehd, myspleen, torrentleech, morethantv, bibliotik, alpharatio, blady, passthepopcorn, brokenstones, pornbay, cgpeers, cinemageddon, broadcasthenet, learnbits, torrentseeds, beyondhd, cinemaz, u2.dmhy, Karagarga, PTerclub, Nyaa.si, Polishtracker, and many more.

US weapons systems can be 'easily hacked'


Recommended Posts

 

Some of the most cutting-edge weapons in the US's military arsenal can be "easily hacked" using "basic tools", a government report has concluded.

The Government Accountability Office (GAO) found "mission-critical" cyber-vulnerabilities in nearly all weapons systems tested between 2012 and 2017.

That includes the newest F-35 jet as well as missile systems.

Pentagon officials had no immediate response to the 50-page report from the Senate Armed Services Committee.

The committee's members expressed concerns about how protected weapon systems were against cyber-attacks.

The report's main findings were:

the Pentagon did not change the default passwords on multiple weapons systems - and one changed password was guessed in nine seconds

a team appointed by the GAO was able to easily gain control of one weapons system and watch in real time as the operators responded to the hackers

it took another two-person team only one hour to gain initial access to a weapons system and one day to gain full control

many of the test teams were able to copy, change or delete system data with one team downloading 100 gigabytes of information

The GAO added that the Pentagon "does not know the full scale of its weapons system vulnerabilities".

Ken Munro, an expert at security firm Pen Test Partners, said he was "not at all surprised" by the findings.

"It takes a long time to develop a weapons system, often based on iterations of much older systems. As a result, the components and software can be based on very old, vulnerable code.

"Developers often overlook 'hardening' the security of systems after they've got them operating, with the philosophy, 'it's working, so don't mess with it'.
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Customer Reviews

  • Similar Topics

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.