Flying operations of remotely piloted aircraft unaffected by malware – USAF

2227

The United States Air Force has said that the computer virus detected at Creech Air Force Base has not affected the flight operations of its unmanned aerial vehicles.

The Air Force on Wednesday made the statement ‘to correct recent reporting’. Wired magazine first reported the virus infection on its website last Friday and said it was logging pilots’ every keystroke as they remotely flew missions over Afghanistan and elsewhere.

The Air Force said that on September 15, 24th Air Force first detected and subsequently notified Creech AFB regarding the malware on their portable hard drives approved for transferring information between systems. It was detected and isolated by the 24th Air Force using standard tools and processes for monitoring and protecting Air Force computer systems and networks. The Air Force then began a forensic process to track the origin of the malware and clean the infected systems.

The malware was detected on a stand-alone mission support network using a Windows-based operating system. The malware in question is a credential stealer, not a keylogger, found routinely on computer networks and is considered more of a nuisance than an operational threat, the Air Force said. “It is not designed to transmit data or video, nor is it designed to corrupt data, files or programs on the infected computer. Our tools and processes detect this type of malware as soon as it appears on the system, preventing further reach.”
“The infected computers were part of the ground control system that supports remotely piloted aircraft (RPA) operations. The ground system is separate from the flight control system Air Force pilots use to fly the aircraft remotely; the ability of the RPA pilots to safely fly these aircraft remained secure throughout the incident.”
“It’s standard policy not to discuss the operational status of our forces,” said Colonel Kathleen Cook, spokesperson for Air Force Space Command. “However, we felt it important to declassify portions of the information associated with this event to ensure the public understands that the detected and quarantined virus posed no threat to our operational mission and that control of our remotely piloted aircraft was never in question.”
“We continue to strengthen our cyber defenses, using the latest anti-virus software and other methods to protect Air Force resources and assure our ability to execute Air Force missions. Continued education and training of all users will also help reduce the threat of malware to Department of Defense systems.”

The U.S. military and intelligence communities have used Predator and Reaper drones, built by privately held General Atomics in San Diego, to carry out increasingly precise attacks on top Al Qaeda officials and other U.S. targets in Pakistan, Afghanistan and Yemen.

The U.S. military has achieved its goal of flying 60 combat air patrols overseas with the unmanned planes, according to one U.S. defense official.



The CIA now operates Predator and Reaper unmanned aircraft over at least five countries including Yemen, Afghanistan and Libya.