How did a persistent computer virus come to haunt the pilots of the Predator drones attacking Al Qaeda targets in Afghanistan and Yemen?
No-one yet knows, and most likely we will never be told.
What we do know is that the top military technology of the age has proven vulnerable to a persistent keylogger, a virus that stores every keystroke made on a computer and which resists deletion.
It was found two weeks ago on the systems that ground pilots use to fly the Reaper and Predator drones at Creech Air Force Base in Nevada, and deleting the virus reportedly has no effect: it simply clones itself if deleted. "It keeps coming back," a Creech AFB operative complained to Wired.
It is most likely that the recent use of removable hard drives to update mission maps was the source of the malware, which appears to be hiding somewhere within the network at Creech. But since that network is not on the internet, the keylogged data should not be reaching any malefactor.
It is possible that top brass at the Pentagon, National Security Agency or the CIA are monitoring their own drone control staff using logging software - but given the mild panic its discovery has caused, that is unlikely.
Experts have also been warning for some time that counterfeit electronics could lead to such problems - and that will doubtless be investigated.
This episode shouldn't affect drone missions, however. They will still be as accurate or inaccurate as intelligence allows.
General Atomics, maker of the Predator, claims on its website that the aircraft has "a fault tolerant flight control system" that allows the plane to continue in safe flight even when contact with the remote control pilot is lost.
Monday, October 10, 2011
Drone mission control hit by self-cloning computer virus
Labels:
computer assisted,
Drones,
Mission Control,
UA-Operated,
UAV,
viruses
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment