A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.
The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.
“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”
Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.
Drones have become America’s tool of choice in both its conventional and shadow wars, allowing U.S. forces to attack targets and spy on its foes without risking American lives. Since President Obama assumed office, a fleet of approximately 30 CIA-directed drones have hit targets in Pakistan more than 230 times; all told, these drones have killed more than 2,000 suspected militants and civilians, according to the Washington Post. More than 150 additional Predator and Reaper drones, under U.S. Air Force control, watch over the fighting in Afghanistan and Iraq. American military drones struck 92 times in Libya between mid-April and late August. And late last month, an American drone killed top terrorist Anwar al-Awlaki — part of an escalating unmanned air assault in the Horn of Africa and southern Arabian peninsula.
But despite their widespread use, the drone systems are known to have security flaws. Many Reapers and Predators don’t encrypt the video they transmit to American troops on the ground. In the summer of 2009, U.S. forces discovered “days and days and hours and hours” of the drone footage on the laptops of Iraqi insurgents. A $26 piece of software allowed the militants to capture the video.
We keep wiping it off, and it keeps coming back? That sounds like the Stuxnet virus that hit the Iranian nuclear program, screwing up their computers and, in particular, their centrifuges. Repeated Iranian attempts to remove the virus failed because when they thought they had it removed it kept coming back.
This virus would obviously be different. Stuxnet is believed to have been specifically engineered to attack the Iranian nuclear program, its specific software and hardware. But that does not mean elements of Stuxnet can't be used in creation of other viruses.
By the way, there is no such thing as a "benign" virus, especially if that virus is logging your keystrokes. Someone wants to know what you're doing. And, by extension in this case, what the US military is doing.
This virus would obviously be different. Stuxnet is believed to have been specifically engineered to attack the Iranian nuclear program, its specific software and hardware. But that does not mean elements of Stuxnet can't be used in creation of other viruses.
By the way, there is no such thing as a "benign" virus, especially if that virus is logging your keystrokes. Someone wants to know what you're doing. And, by extension in this case, what the US military is doing.
I can't find a single, credible news source to back up that story -- everyone else seems to have simply echoed the one article from Wired.com.
ReplyDeleteWired was also convinced of an iPhone 5, too, before the 4S eventually appeared.