Paul Marks, senior technology correspondent
(Image: Drones: computer controlled - and so vulnerable to computer viruses)How did a persistent computer virus come to haunt the pilots of the Predator drones attacking Al Qaeda targets in Afghanistan and Yemen?
No-one yet knows. And most likely we will never be told. What we do know is that the top military technology of the age has proven vulnerable to a persistent keylogger, a virus that stores every keystroke made on a computer and which resists deletion. It was found two weeks ago on the systems that ground pilots use to fly the Reaper and Predator drones at?Creech Air Force Base in Nevada. And deleting the virus reportedly has no effect: it simply clones itself if deleted.?"It keeps coming back," a Creech AFB operative complained to Wired.It is most likely that the recent use of removable hard drives to update mission maps was the source of the malware, which appears to be hiding somewhere within the network at Creech. But since that network is not on the internet, the keylogged data should not be reaching any malefactor.
It is possible that top brass at the Pentagon, National Security Agency or the CIA are monitoring their own drone control staff using logging software - but given the mild panic its discovery has caused, that is unlikely. Experts have also been warning for some time that counterfeit electronics could lead to such problems - and that will doubtless be investigated.?? ? ??
university of texas free samples florida gators football florida gators football oregon state university oregon state university tennessee football
No comments:
Post a Comment