• Thanks for stopping by. Logging in to a registered account will remove all generic ads. Please reach out with any questions or concerns.

Predator drones infected by computer virus

Kalatzi

Banned
Banned
Inactive
Reaction score
0
Points
210
link here http://edition.cnn.com/2011/10/10/tech/innovation/virus-hits-drone-fleet-wired/

They say it may be benign. I can't think of any reason for putting a "Benign" virus into an armed drone.

Long suspected that that "Reachback" could be an achilles heel for this technology.

I'm sure the Chinese, if not behind this are very interested.
 
A new defence super-computer called "Skynet" will be used ahead of its planned launch date to get rid of this virus.
 
Neat!!!  Skynet will sort all this stuff out....We're Safe!!
 
How much would your day suck if the drone decided to back track and take out the operator?

And who was surfing porn on the mission computer?
 
cupper said:
How much would your day suck if the drone decided to back track and take out the operator?

And who was surfing porn on the mission computer?
I was wondering the same thing.  My scary thought is that it was purposely placed.
 
http://www.wired.com/dangerroom/2011/10/drone-virus-kept-quiet/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29

"So, humm....yeah........network admin.......humm.......how do i say this......."
 
Some Pred pilot is going to have to review and re-sign his ISSO disclaimer form....
 
I wonder where the General Atomics Aeronautical Systems tech support call centre is located?

"Thank you for calling the GAAS tech support hotline in Lahore, if your infidel Drone has been jacked by a virus, please press 1 now."
 
Staff Weenie said:
"Thank you for calling the GAAS tech support hotline in Lahore, if your infidel Drone has been jacked by a virus, please press 1 now."
"Your call is important to us - please stay on the line for the next available operator."
 
The virus, which records the keystrokes of remote pilots as their drones fly over places like Afghanistan, is now receiving attention at the highest levels; the four-star general who oversees the Air Force’s networks was briefed on the infection this morning. But for weeks, it stayed (you will pardon the expression) below the radar: a local problem that local network administrators were determined to fix on their own.
Depending on if that virus also transmits what it records, that could be a very large leak of information.  You would have flight paths, guesstimate at maximum air time, where it was at the exact moment giving you the ability to plot something on how close it was.
 
Using Windows in mission critical equipment.... that's what you get.
 
That type of 'virus' is pretty ineffective in those particular systems as they are not connected to the outside. However, other parts of the malware - other than the keylogger - could store the information (passwords, access codes, etc.) in a particular form and when the USB device that carried the infection gets connected again to the outside network IOT download the new map or MS updates, the malware in that host could read the stored data and transmit it out disguised as HTTP or other traffic.
 
Hope they read the full End User Agreement before they clicked AGREE. Otherwise they could end up like these poor unfortunate souls.

http://www.southparkstudios.com/full-episodes/s15e01-humancentipad

 
Pleased to say this is a false alarm - everyone stand down

http://www.wired.com/dangerroom/2011/10/drone-virus-nuisance/#disqus_thread

Highlights

Air Force Insists: Drone Cockpit Virus Just a ‘Nuisance’

On 15 September, 24th AF first detected and subsequently notified Creech AFB regarding the malware,” the service said. “The Air Force then began a forensic process to track the origin of the malware and clean the infected systems.”

The malware “is routinely used to steal log-in and password data from people who gamble or play games like Mafia Wars online,” noted the Associated Press, relying on the word of an anonymous defense official. That official did not explain why drone crews were playing Mafia Wars or similar games during their overseas missions

I sincerelly hope thay got this right, note panaeng's comnments

Cynical part of me  notes their current  slogan - "US Air force - nothing comes close"

 
"On 15 September, 24th AF first detected and subsequently notified Creech AFB regarding the malware,” the service said. “The Air Force then began a forensic process to track the origin of the malware and clean the infected systems.”

source my previous post

"The virus, first detected nearly two weeks ago by the military's Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada"

source my first post on this topic

Sept 15 was two weeks ago?

Wow

And, I still hope their right

 
and to actually shut myself up

Military: Computer Virus Wasn't Directed at Drones
http://abcnews.go.com/Technology/wireStory/military-computer-virus-directed-drones-14725058
"The computer virus that hit the Pentagon's drone program last month was not directed at the military systems but was common malware used to steal log-ins and passwords used in online gaming, military officials said Wednesday"

Which seems to make sense
 
Back
Top