Nuclear Command and Control Systems Run on Decades-Old Technology Vulnerable to Failure

defense0 views
The systems that control the United States' nuclear arsenal — including the command, control, and communications (NC3) infrastructure for detecting attacks, conveying presidential orders, and executing launch sequences — rely on computing hardware and software that in some cases dates to the 1970s. A 2016 GAO report found that the Department of Defense's Strategic Automated Command and Control System (SACCS) still used 8-inch floppy disks and ran on an IBM Series/1 computer from the 1970s. While upgrades have been initiated, the modernization program is decades behind schedule and over budget. This matters because these are the systems that prevent accidental nuclear war and ensure that if deterrence fails, the response is authorized, proportional, and directed at the right targets. When the hardware that carries presidential nuclear orders uses technology older than the internet, every component is a potential single point of failure. In 2010, a hardware failure at F.E. Warren Air Force Base caused 50 Minuteman III ICBMs to go offline simultaneously for 45 minutes, during which the missiles could not be monitored or launched. The Air Force initially could not determine whether the outage was a cyberattack, a hardware failure, or an adversary action. The cascading risk is that an NC3 failure during a crisis could be misinterpreted by either side. If the US loses communication with a missile wing during a period of heightened tension, decision-makers must determine whether the outage is technical or the result of an adversary's first strike — with minutes to decide. Conversely, if an adversary detects the US scrambling to restore nuclear communications, they might interpret the activity as preparation for a strike. The aged infrastructure creates ambiguity at precisely the moments when clarity is most critical to preventing nuclear use. This problem persists because nuclear modernization competes for funding with conventional military programs that have more visible constituencies and more immediate operational needs. The NC3 modernization program is estimated to cost $100 billion over 30 years, but the systems are classified, the workforce is small and specialized, and there is no commercial equivalent to leverage. The engineers who built the original systems have retired or died, and documentation is incomplete. Each component upgrade risks introducing new failure modes into a system where failure could mean civilization-ending consequences, creating a bureaucratic paralysis where the risk of changing the system is perceived as comparable to the risk of keeping it.

Evidence

GAO report on federal legacy IT including nuclear floppy disks (GAO-16-468, May 2016): https://www.gao.gov/products/gao-16-468; F.E. Warren AFB ICBM communication outage affecting 50 missiles (October 2010): https://www.theatlantic.com/politics/archive/2010/10/when-50-nuclear-missiles-dropped-off-line/343126/; Congressional Budget Office NC3 modernization cost estimate of $100B+: https://www.cbo.gov/publication/57240; Nuclear Threat Initiative report on NC3 vulnerabilities (2019): https://www.nti.org/analysis/articles/nuclear-command-control-and-communications/; STRATCOM commander testimony to Senate Armed Services Committee on NC3 modernization urgency (2023)

Comments