Computer virus did not target US drone fleet: general
A computer virus that affected the US military's drone fleet last month was not "specifically" aimed at the unmanned aircraft's network, the head of US Strategic Command said Tuesday.
"It was a virus that we believe at this point entered from the wild, if you will, not specifically targeted at the RPA (remotely piloted aircraft) activities but entered through some other process," General Robert Kehler told reporters.
"We're not quite sure how that happened yet," he said.
Discovered in mid-September at Creech Air Force base in Nevada, the virus infected computers in the ground control system for the drones, which is separate from the drones' flight control system.
One possible route for the virus could have come through hard drives in the ground control system, as the removable drives are used to transfer data and moved from "machine to machine," Kehler said.
"So that opens the possibility to get something introduced in the system," he said.
Wired magazine, which first reported the problem, had said the virus spread through removable hard drives used to load map updates and transfer mission videos from one computer to another.
In this case, Kehler said cyber security safeguards had performed successfully.
"All the information that I have would suggest that the systems that we have put in place to detect such viruses worked," he said.
"We were able to quarantine the virus fairly quickly, we are still doing cleaning activities in some isolated machinery."
The general added that US military networks are constantly being probed by outsiders.
"We see multiple deliberate attempts to try to get into our networks, almost daily."
The US military's newly created cyber command falls within Kehler's Strategic Command, which also oversees the country's nuclear arsenal.
(c) 2011 AFP