Home War Room War Room Computer Virus Infects United States Drone Fleet
Computer Virus Infects United States Drone Fleet PDF Print E-mail
Written by The Watchman   
Friday, 07 October 2011 11:28
AddThis Social Bookmark Button

Computer Virus Infects United States Drone Fleet

This is a new one.  I guess this goes to show you that no one is in-hackable.  For the sake of these operations success I do hope that our talented men and women in the military can wipe this virus out.  Nothing could be worse in this scenario than the enemy knowing the wherabouts of this advanced fleet of United States Predators and Reapers.  

The Strong Watchman

Original article at: 

http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/

Computer Virus Affects United States Drone Fleet

Computer Virus Infects United States Drone Fleet

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.

“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”

Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.

Drones have become America’s tool of choice in both its conventional and shadow wars, allowing U.S. forces to attack targets and spy on its foes without risking American lives. Since President Obama assumed office, a fleet of approximately 30 CIA-directed drones have hit targets in Pakistan more than 230 times; all told, these drones have killed more than 2,000 suspected militants and civilians, according to the Washington Post. More than 150 additional Predator and Reaper drones, under U.S. Air Force control, watch over the fighting in Afghanistan and Iraq. American military drones struck 92 times in Libya between mid-April and late August. And late last month, an American drone killed top terrorist Anwar al-Awlaki — part of an escalating unmanned air assault in the Horn of Africa and southern Arabian peninsula.

But despite their widespread use, the drone systems are known to have security flaws. Many Reapers and Predators don’t encrypt the video they transmit to American troops on the ground. In the summer of 2009, U.S. forces discovered “days and days and hours and hours” of the drone footage on the laptops of Iraqi insurgents. A $26 piece of software allowed the militants to capture the video.

The lion’s share of U.S. drone missions are flown by Air Force pilots stationed at Creech, a tiny outpost in the barren Nevada desert, 20 miles north of a state prison and adjacent to a one-story casino. In a nondescript building, down a largely unmarked hallway, is a series of rooms, each with a rack of servers and a “ground control station,” or GCS. There, a drone pilot and a sensor operator sit in their flight suits in front of a series of screens. In the pilot’s hand is the joystick, guiding the drone as it soars above Afghanistan, Iraq, or some other battlefield.

Some of the GCSs are classified secret, and used for conventional warzone surveillance duty. The GCSs handling more exotic operations are top secret. None of the remote cockpits are supposed to be connected to the public internet. Which means they are supposed to be largely immune to viruses and other network security threats.

But time and time again, the so-called “air gaps” between classified and public networks have been bridged, largely through the use of discs and removable drives. In late 2008, for example, the drives helped introduce the agent.btz worm to hundreds of thousands of Defense Department computers. The Pentagon is still disinfecting machines, three years later.

Use of the drives is now severely restricted throughout the military. But the base at Creech was one of the exceptions, until the virus hit. Predator and Reaper crews use removable hard drives to load map updates and transport mission videos from one computer to another. The virus is believed to have spread through these removable drives. Drone units at other Air Force bases worldwide have now been ordered to stop their use.

In the meantime, technicians at Creech are trying to get the virus off the GCS machines. It has not been easy. At first, they followed removal instructions posted on the website of the Kaspersky security firm. “But the virus kept coming back,” a source familiar with the infection says. Eventually, the technicians had to use a software tool called BCWipe to completely erase the GCS’ internal hard drives. “That meant rebuilding them from scratch” — a time-consuming effort.

The Air Force declined to comment directly on the virus. “We generally do not discuss specific vulnerabilities, threats, or responses to our computer networks, since that helps people looking to exploit or attack our systems to refine their approach,” says Lt. Col. Tadd Sholtis, a spokesman for Air Combat Command, which oversees the drones and all other Air Force tactical aircraft. “We invest a lot in protecting and monitoring our systems to counter threats and ensure security, which includes a comprehensive response to viruses, worms, and other malware we discover.”

However, insiders say that senior officers at Creech are being briefed daily on the virus.

“It’s getting a lot of attention,” the source says. “But no one’s panicking. Yet.”

Photo courtesy of Bryan William Jones

 

Economic Outlook

Economic Outlook
 
Members : 1081
Content : 885
Content View Hits : 2262749
Copyright © 2014 The Strong Watchman. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.
 

Who's Online

We have 346 guests online

Help. Donate.

Hey you...the reader! Help support this site! We need your help. Thanks! Google+

Amount: 

Armageddon Map

Banner
Banner

RSS War Room

Secrecy News
from the FAS Project on Government Secrecy
  • Intelligence Directive Bars Unauthorized Contacts with News Media

    The Director of National Intelligence has forbidden most intelligence community employees from discussing “intelligence-related information” with a reporter unless they have specific authorization to do so, according to an Intelligence Community Directive that was issued last month. “IC employees… must obtain authorization for contacts with the media” on intelligence-related matters,...

  • Iran-North Korea-Syria Cooperation, and More from CRS

    The executive branch today provides less unclassified information to Congress concerning proliferation of weapons mass destruction than it used to do, a new report from the Congressional Research Service observes. “The number of unclassified reports to Congress on WMD-related issues has decreased considerably in recent years,” the report said. “Congress...

  • History of 1953 CIA Covert Action in Iran to be Published

    In 1989, the Department of State published a notorious volume that purported to document U.S. foreign policy towards Iran in the early Eisenhower Administration. The volume triggered an avalanche of criticism because it omitted any mention of the CIA’s role in a 1953 covert action that helped overthrow the government...

  • U.S. Prisons Are Bursting at the Seams, and More From CRS

    The U.S. federal prison population has been growing steadily for decades, and it now exceeds the capacity of the prison system to properly house and maintain it, according to an updated report from the Congressional Research Service on the Bureau of Prisons [BOP]. “The number of inmates under the BOP’s...

  • Countering CIA’s Conflict of Interest in Declassification

    Last week the Senate Intelligence Committee voted to submit the 480-page executive summary, findings and conclusions of its five-year investigation into the post-9/11 CIA Detention and Interrogation Program for declassification review. But in an obvious conflict of interest, the review is expected to be performed by the CIA itself. “The...

  • CIA Agrees to Provide Softcopy Records to Requester

    After the Central Intelligence Agency refused to release records requested under the Freedom of Information Act in softcopy format, requester Jeffrey Scudder filed a lawsuit against the Agency demanding that it comply, and he received a rather sympathetic hearing from the judge. (CIA’s Refusal to Release Softcopy Records Challenged in...

  • Garwin: The Movie

    Physicist and problem solver extraordinaire Richard L. Garwin is the subject of a new documentary film, Garwin. A screening of the film, sponsored by FAS and the American Association for the Advancement of Science, will be held on April 22 in Washington, DC.

    The post Garwin: The Movie appears...

  • Book: Secrets and Leaks by Rahul Sagar

    Secrets and Leaks: The Dilemma of State Secrecy is the title of a new (2013) book by Princeton political scientist Rahul Sagar. The book has many interesting features and develops some novel arguments on leaks. I reviewed it for the Lawfare blog.

    The post Book: Secrets and Leaks by...

  • “Too Mild a Nuclear Option”? National Security in the 1970s

    U.S. nuclear weapons strategy evolved during the Nixon administration from a reflexive policy of massive retaliation against a Soviet attack to a diverse range of options for more limited nuclear strikes. The transition was not without some bumps. A declassified 1974 memo recorded that National Security Adviser Henry Kissinger at...

  • Constitutional Challenges to NSA Collection, and More from CRS

    New and updated reports from the Congressional Research Service that Congress has withheld from online public distribution include the following. Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments, April 1, 2014 Reform of the Foreign Intelligence Surveillance Courts: A Brief Overview, March 31, 2014 The Debate Over...

  • Classified Nuclear Weapon Drawings Missing at Labs

    Classified design drawings used in the manufacture of nuclear weapons have not been properly and reliably maintained by nuclear weapons labs managed by the National Nuclear Security Administration (NNSA), the Department of Energy Inspector General said in a report last week. “NNSA sites could not always locate as-built product definitions...

  • Missing the Open Source Center / World News Connection

    The decision by the Central Intelligence Agency to terminate public access to its translations of foreign news reports at the end of 2013 continues to reverberate among frustrated former consumers. The translations had been performed by the Open Source Center (OSC) at CIA, and marketed to subscribers through the NTIS...

  • US-Vietnam Nuclear Cooperation, and More from CRS

    Noteworthy new and updated reports from the Congressional Research Service that Congress has withheld from online public distribution include the following. U.S.-Vietnam Nuclear Cooperation Agreement: Issues for Congress, March 24, 2014 Ukraine: Current Issues and U.S. Policy, March 24, 2014 Central Asia: Regional Developments and Implications for U.S. Interests, March...

  • Intelligence Whistleblower Law Has Been Used Infrequently

    The Intelligence Community Whistleblower Protection Act (ICWPA) has rarely been relied upon by intelligence agency whistleblowers, according to a newly released 2009 report from the Office of the Director of National Intelligence Inspector General. During the ten year period after the Act came into effect in January 1999, intelligence agency...

  • Newly Declassified Intelligence Satellite Imagery is Hard to Access

    The declassification of historical intelligence satellite imagery has been a boon to scientists, environmentalists and other researchers since it began with President Clinton’s executive order 12951. So, for example, “The declassification of imagery from CORONA and subsequent intelligence satellite programs has inspired a revolution in landscape archaeology in the Near...