Pentagon’s New Next-Gen Weapons Systems Are Laughably Easy To Hack

Your tax dollars at work! Well, that’s true if you pay taxes in the USofA.

New computerized weapons systems currently under development by the U.S. Department of Defense (DOD) can be easily hacked, according to a report published by the U.S. Government Accountability Office (GAO), an agency that provides auditing, evaluation, and investigative services for Congress.

The report detailed some of the most eye-catching hacks GAO testers performed during their analysis:

“In one case, it took a two-person test team just one hour to gain initial access to a weapon system and one day to gain full control of the system they were testing. Some programs fared better than others. For example, one assessment found that the weapon system satisfactorily prevented unauthorized access by remote users, but not insiders and near-siders. Once they gained initial access, test teams were often able to move throughout a system, escalating their privileges until they had taken full or partial control of a system. In one case, the test team took control of the operators’ terminals. They could see, in real-time, what the operators were seeing on their screens and could manipulate the system. They were able to disrupt the system and observe how the operators responded. Another test team reported that they caused a pop-up message to appear on users’ terminals instructing them to insert two quarters to continue operating. Multiple test teams reported that they were able to copy, change, or delete system data including one team that downloaded 100 gigabytes, approximately 142 compact discs, of data.”

Congress ordered the GAO report in preparation to approve DOD funding of over $1.66 trillion. Yes, that’s TRILLION.

These systems apparently are not yet ready for prime time! You can read more in the GAO report at: https://www.gao.gov/assets/700/694913.pdf. Unfortunately, that document is written in obscure governmental legalese English. An easier-to-read and understand synopsis may be found in ZDNet at: https://zd.net/2RExYdm.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.