The Stryker-Dragoon and the Stryker CROWS-J, or Common Remotely Operated Weapons Station – Javelin have “cybersecurity vulnerabilities that can be exploited.” This according to two annual reports from the Director of Operational Test and Evaluation for the DoD, concerning the US Army.
The annual reports provide a detailed overview of the Army, Navy and Air Force. The Army section contains two dozen systems with reviews and recommendations.
The vulnerabilities highlighted in the report were not simply revealed in testing. “Adversaries demonstrated the ability to degrade select capabilities of the (Stryker-Dragoon) when operating in a contested cyber environment,” according to the report. The same was noted for the CROWS-J model.
While little detail has been made public as to what vulnerabilities were exposed, which adversary exposed them or when this occurred, the shared language for the two systems, and another comment point to something common in the hardware, not the new weaponry, on the Stryker.
“In most cases, the exploited vulnerabilities pre-date the integration of the lethality upgrades,” according to the report.
But the problem isn’t isolated to a handful of vehicles. It’s across what will be basically the fighting edge of the lead mechanized ground reconnaissance anti-armor unit that the Army has in Europe.
The Dragoon variant is the upgunned 30mm-cannon Stryker that emerged from Army decisions back in 2015 to give the vehicles more firepower for a perceived overmatch that soldiers in Europe were facing against Russian vehicles and weaponry.
Once all upgrades are complete, the 81 Stryker-Dragoons will make up half of the rifle and scout platoon fleets in the 2nd Cavalry Regiment.