A Gigantic New ICBM Will Take US Nuclear Missiles Out of the Cold War-Era but Add 21st-Century Risks

Cybersecurity for the software-driven Sentinel nuclear missile has been a top focus of the program.
Those underground capsules are about to be demolished and the missile silos they control will be completely overhauled.
A new nuclear missile is coming, a gigantic ICBM called the Sentinel.
It's the largest cultural shift in the land leg of the Air Force's nuclear missile mission in 60 years.
There are questions as to whether some of the Cold War-era aspects of the Minuteman missiles that the Sentinel will replace should be changed.
Making the silo-launched missile more modern, with complex software and 21st-century connectivity across a vast network, may also mean it's more vulnerable.
The $96 billion Sentinel overhaul involves 450 silos across five states, their control centers, three nuclear missile bases and several other testing facilities.
Nuclear modernization was delayed for years because the United States deferred spending on new missiles, bombers and submarines in order to support the post 9/11 wars overseas.
The Sentinel work is one leg of a larger, nuclear weapons enterprise-wide $750 billion overhaul that is replacing almost every component of U.S. nuclear defenses, including new stealth bombers, submarines and ICBMs in the country's largest nuclear weapons program since the Manhattan Project.
For the Pentagon, there are expectations the modern Sentinel will meet threats from rapidly evolving Chinese and Russian missile systems.
The Sentinel is expected to stay in service through 2075, so designers are taking an approach that will make it easier to upgrade with new technologies in the coming years.
The overhaul touches almost everything, even including new equipment for military chefs who cook for the missile teams.
The changes could improve efficiency and quality of life on the bases but may also create vulnerabilities that the analog Minuteman missiles have never faced.
Those Hardened Intersite Cable Systems, or HICS, cables carry messages back and forth from the missile to the missileer, who receives those messages through a relatively new part of the capsule - a firing control console called REACT, for Rapid Execution and Combat Targeting, that was installed in the mid-1990s.
Any time the Air Force wants to test one of the missiles, it literally has to dig up the cables and splice them, to isolate that test missile's wiring from the rest.
Even when missile crews update targeting codes, it is a mechanical, manual process.
Nuclear missile fields are located in Colorado, Montana, Nebraska, North Dakota and Wyoming.
Those missiles need maintenance even in the winter, and crews spend hours outside in sub-zero field conditions,.
What it means is that even though technology could automate the whole operations process, one critical aspect of missile launch will remain the same.
If the day comes that another nuclear weapon must be fired, it will still be teams of missileers validating the orders and activating a launch.


This Cyber News was published on www.securityweek.com. Publication date: Tue, 12 Dec 2023 03:43:04 +0000


Cyber News related to A Gigantic New ICBM Will Take US Nuclear Missiles Out of the Cold War-Era but Add 21st-Century Risks

A Gigantic New ICBM Will Take US Nuclear Missiles Out of the Cold War-Era but Add 21st-Century Risks - Cybersecurity for the software-driven Sentinel nuclear missile has been a top focus of the program. Those underground capsules are about to be demolished and the missile silos they control will be completely overhauled. A new nuclear missile is ...
6 months ago Securityweek.com
Experts from the United Nations Report North Korean Hackers Have Taken a Large Amount of Digital Assets - Last year, North Korean hackers working for the government stole a record-breaking amount of virtual assets estimated to be worth between $630 million and more than $1 billion, according to a new report from U.N. experts. The panel of experts said ...
1 year ago Securityweek.com
SpaceX Launched Military Satellites Designed to Track Hypersonic Missiles - Two prototype satellites for the Missile Defense Agency and four missile-tracking satellites for the US Space Force rode a SpaceX Falcon 9 rocket into orbit Wednesday from Florida's Space Coast. These satellites are part of a new generation of ...
4 months ago Wired.com
Cyber Insights 2023: The Geopolitical Effect - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. The Russia/Ukraine war that started in early 2022 has been mirrored by a ...
1 year ago Securityweek.com
Sellafield nuclear site hacked by groups linked to Russia and China - The UK's most hazardous nuclear site, Sellafield, has been hacked into by cyber groups closely linked to Russia and China, the Guardian can reveal. Sources said breaches were first detected as far back as 2015, when experts realised sleeper malware - ...
6 months ago Theguardian.com
4 Best War Games You Should Play - Online gaming is a luxury, especially if you are interested in strategic war games. Let this format be better expressed within the framework of games and films and people will perceive it at the multimedia level, and not take part in real combat ...
6 months ago Hackread.com
Information-blocking rule in 21st Century Cures Act redefines data exchange in healthcare - A Verato survey offers perspectives on the data management strategies of healthcare executives, highlighting the crucial role of Healthcare Master Data Management in addressing key gaps, facilitating seamless data exchange, and aligning with the ...
6 months ago Helpnetsecurity.com
How Israel Is Defending Against Iran's Drone Attack - On Saturday, Iran launched more than 200 drones and cruise missiles at Israel. As the drones made their way across the Middle East en route to their target, Israel has invoked a number of defense systems to impede their progress. The Iron Dome, ...
2 months ago Wired.com
Hacktivists breach U.S. nuclear research lab, steal employee data - The Idaho National Laboratory confirms they suffered a cyberattack after 'SiegedSec' hacktivists leaked stolen human resources data online. INL is a nuclear research center run by the U.S. Department of Energy that employs 5,700 specialists in atomic ...
7 months ago Bleepingcomputer.com
DOJ Takes Down Ransomware Group with 21st Century Cyber Stake Out - The Department of Justice (DOJ) announced that it has taken down a major criminal network responsible for launching ransomware attacks against multiple targets across the US and abroad. The network, known as "Pay2Key" or "Yonathan". was made up of ...
1 year ago Zdnet.com
Microsoft to End Malware Delivery In Excel XLL Add-ins - Microsoft has revealed plans to end the malicious use of Excel XLL add-ins, which have been used by some to deliver malware. XLL add-ins are files that can be used to add custom functions to Excel spreadsheets. Unfortunately, these add-ins have been ...
1 year ago Bleepingcomputer.com
Lost in Translation: Mitigating Cybersecurity Risks in Multilingual Environments - With increased connectivity and linguistic diversity comes a new set of cybersecurity risks. This article will delve into the unique cybersecurity challenges in multilingual environments, focusing on solutions and best practices to mitigate such ...
6 months ago Cyberdefensemagazine.com
A Plan to Protect Critical Infrastructure from 21st Century Threats - On April 30th, the White House released National Security Memorandum-22 on Critical Infrastructure Security and Resilience, which updates national policy on how the U.S. government protects and secures critical infrastructure from cyber and ...
1 month ago Cisa.gov
Britain says no evidence of Sellafield nuclear site hacking - LONDON, Dec 4 - Britain has no records or evidence to suggest that networks at the Sellafield nuclear site were the victim of a successful cyber attack by state actors, the government said on Monday following a report by the Guardian newspaper. The ...
6 months ago Reuters.com
Week in review: Terrapin SSH attack, Mr. Cooper breach - Creating a formula for effective vulnerability prioritizationIn this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities. EMBA: Open-source ...
6 months ago Helpnetsecurity.com
Britain Nuclear site Sellafield experiences malware cyber attack - Reports confirm that Sellafield, a prominent nuclear site, has fallen victim to a recent malware attack, with initial investigations suggesting the infiltration of malicious software dating as far back as 2015. Cybersecurity experts are actively ...
7 months ago Cybersecurity-insiders.com
Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report - A Dutch engineer recruited by the country's intelligence services used a water pump to deploy the now-infamous Stuxnet malware in an Iranian nuclear facility, according to a two-year investigation conducted by Dutch newspaper De Volkskrant. Stuxnet, ...
5 months ago Securityweek.com
Idaho National Nuclear Lab Targeted in Major Data Breach - The Idaho National Laboratory, one of the 17 national labs in the US Department of Energy complex, suffered a major data breach on Nov. 19, leaking a host of information, including employee addresses, Social Security numbers, bank account ...
7 months ago Darkreading.com
Product showcase: Apiiro unifies AppSec and SSCS in a deep ASPM - With the rapidly evolving threat landscape and complexity of interconnected applications, identifying real, business-critical application risks is more challenging than ever. Application security teams need a better solution than their current siloed ...
6 months ago Helpnetsecurity.com
US launches nuke spy satellites amid Russia weapon rumors The Register - Last night's launch of six Pentagon missile-detection satellites was well timed as fears mount that Russia is considering putting nuclear weapons into space. The US Department of Defense confirmed its payload included two satellites for the Missile ...
4 months ago Go.theregister.com
In the Trenches of Broadband Policy: 2023 Year In Review - Lawmakers recognized this during the pandemic and set in motion once-in-a-generation opportunities to build the future-proof fiber infrastructure needed to close the digital divide once and for all. Monopolistic internet service providers, with ...
6 months ago Eff.org
How to Do a Risk Analysis Service in a Software Project - Software projects are vulnerable to countless attacks, from the leak of confidential data to exposure to computer viruses, so any development team must work on an effective risk analysis that exposes any vulnerabilities in the software product. A ...
7 months ago Feeds.dzone.com
Anti-Hezbollah Groups Hack Beirut Airport Screens - Beirut's international airport faced a cyber-attack on Sunday, reportedly orchestrated by domestic anti-Hezbollah groups. The attack comes amid escalating tensions between Hezbollah and the Israeli military. According to a press release published on ...
5 months ago Infosecurity-magazine.com
What Are the 6 Types of Risk Assessment and How Do They Work? - Risk assessment is a tool used to help quantify potential risks in a certain situation. It can be used in many different scenarios, including business operations, financial decisions, and also cybersecurity. A risk assessment helps you identify areas ...
1 year ago Thehackernews.com
4 key devsecops skills for the generative AI era - Experts believe that generative AI capabilities, copilots, and large language models are ushering in a new era of how developers, data scientists, and engineers will work and innovate. They expect AI to improve productivity, quality, and innovation, ...
6 months ago Infoworld.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)