Raziaar
I Hate Custom Titles
- Joined
- Sep 13, 2003
- Messages
- 29,769
- Reaction score
- 140
http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/
Some crazy shit. I'm a bit confused by what they're saying when they remove it but it keeps coming back. That's typical virus type behavior. Makes me wonder how truly good of a job the people are doing to remove it.
It's kind of bad that our military technicians need to follow step by step instructions from antivirus firms and use externally written software.
Proves the inadequacy of our military to defend itself in such situations.
A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.
The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.
But despite their widespread use, the drone systems are known to have security flaws. Many Reapers and Predators don’t encrypt the video they transmit to American troops on the ground. In the summer of 2009, U.S. forces discovered “days and days and hours and hours” of the drone footage on the laptops of Iraqi insurgents. A $26 piece of software allowed the militants to capture the video.
Some crazy shit. I'm a bit confused by what they're saying when they remove it but it keeps coming back. That's typical virus type behavior. Makes me wonder how truly good of a job the people are doing to remove it.
In the meantime, technicians at Creech are trying to get the virus off the GCS machines. It has not been easy. At first, they followed removal instructions posted on the website of the Kaspersky security firm. “But the virus kept coming back,” a source familiar with the infection says. Eventually, the technicians had to use a software tool called BCWipe to completely erase the GCS’ internal hard drives. “That meant rebuilding them from scratch” — a time-consuming effort.
It's kind of bad that our military technicians need to follow step by step instructions from antivirus firms and use externally written software.
Proves the inadequacy of our military to defend itself in such situations.