It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Excuse made public first, NOW they are free to drone strike Anything, Anyone, Anywhere

page: 2
13
<< 1   >>

log in

join
share:

posted on Oct, 9 2011 @ 08:21 AM
link   
I call BS all the way, i'm alway amazed about the fairytale they come up with everytime they have to cover up for something. Remind me the Stuxnet crap.

I mean c'mon, this drone system cannot be operated on Windows 7 with AVG Free as antivirus. Forget about home computing this is not Best Buy material.

So



military network security specialists say the are unsure whether the virus and its "key logger" payload were injected intentionally or by accident, with some speculating it may be a common piece of malware that "just happened" to make its way into sensitive networks.


We talk about military grade pieces of hardwares and custom operating system / softwares. Also i highly doubt that the command post / drones are connected to the internet, communications are made through a secured military intranet completely isolated from the regular internet.

What does it mean

"common piece of malware "

Common malwares doesn't infect custom operating system and hardware you have to design them for that specific task.

"that just happened to make its way into sensitive networks "

How ? its a military backbone, IF a connection to the internet have to be made its trough a network of secured servers, i mean SECURED servers, they are not running Norton 360, you have to create a REALLY COMPLEX virus to get through those scanners and firewalls.

"the virus and its key logger payload"

And that beast have a key logger too ! As the name says its log EVERY single key pressed on the keyboard so you got FAR more than just passwords you got everythings !

BUT to be usefull you have to access the key logger mined data no ?, so How ?

We can rule out hardware Key logger since they said the virus have a key logger payload (mean software)

You have to communicate in some way with the infected computers to retreive the data, either you hack your way in or infected computers transmits the data themself to someplace you can access it securely.

But how ? like i said : secured backbone, isolated intranet, military secure servers, custom hardwares / softwares etc... you have to be a hell of a hacker to do this kind of trick !

There is something hidden behind this declaration as pointed out by xuenchen

"We generally do not discuss specific vulnerabilities, threats, or responses to our computer networks, since that helps people looking to exploit or attack our systems to refine their approach" said Lt. Col. Tadd Sholtis, a spokesman for Air Combat Command..."



Then why talk NOW ????


Basically they said their computers are safe as yours and mine against virus and malwares, this is cool except MINE doesn't control frakking killer drones or nuclear warheads.

!



posted on Oct, 9 2011 @ 03:11 PM
link   

Originally posted by Sci-Fi_entist
I don't get it. Aren't the drones still operated remotely? How's a virus gonna take over and fly a remote controlled vehicle. That doesn't make any sense


it makes lots of sense.

the drone has a receiver.

the receiver, receives.

if i can crack the code it receives on.

i control the drone



posted on Oct, 9 2011 @ 04:10 PM
link   
perhaps the "virus" isn't one at all. It's just a simple keylogger utility being used to oversee the operators of the drones for tactical qa and efficiency of operations, now that it's outlived it's usefulness and come to light, they are now claiming it's a virus. Perhaps they are doing so that they can use a virtual pilot remote program to operate the drone into doing a offensive attack against Israel or another friendly target and say it was a "hacker" with the spoofed origin source being the convenient enemy country of choice like Syria or Iran. Easier said than done however, I heard these things are a PITA to fly.



posted on Oct, 9 2011 @ 06:19 PM
link   
reply to post by CitizenNum287119327
 


The virus is probably the one Iran put in to grab the pictures they take.


Not every drone has a missile launcher. Most are just for spies.

Also I doubt you can actually drive one of those things if its infected with a virus.



posted on Oct, 9 2011 @ 07:04 PM
link   

Originally posted by B3lz3buth
We talk about military grade pieces of hardwares and custom operating system / softwares.

You think the military commissions custom hardware and software for ISR man-machine interfaces? That's cute. It's mostly commercial off-the-shelf.


"that just happened to make its way into sensitive networks "
How ? its a military backbone, IF a connection to the internet have to be made its trough a network of secured servers, i mean SECURED servers, they are not running Norton 360, you have to create a REALLY COMPLEX virus to get through those scanners and firewalls.

In the olden days, viruses didn't need the internet to spread. They could copy themselves onto writable media. Olden days, like 2008, the last time this happened.


And that beast have a key logger too ! As the name says its log EVERY single key pressed on the keyboard so you got FAR more than just passwords you got everythings !

If all you're doing is logging keystrokes, you might get a local password, file names, one side of an IRC log, and some grids and frequencies. That's useful for determining what the UAVs are tasked with, and who they're supporting (if the operator uses a unit name instead of a callsign). You won't get the video feed (not that those are always secure) or the crypto keys. I don't think you'd get any data if they hand fly the UAV, manually slew the sensor, or lock it from the hand control. You won't get any voice conversations. You wouldn't be able to interfere in command and control, except maybe by learning a C2 frequency and jamming it.



posted on Oct, 11 2011 @ 03:01 PM
link   
reply to post by FurvusRexCaeli
 





You think the military commissions custom hardware and software for ISR man-machine interfaces? That's cute. It's mostly commercial off-the-shelf.


Thank you for throwing me out of my lazy state of mind, i do my homework instead of assuming and your right they use mostly off-the-frakking-shelf material, im ashtonished !

About the keylogger, its just one usefull tool to have, but like you said not enough to take total control, i get it.


Good post dude, thx for the info.

.



edit on 11/10/2011 by B3lz3buth because: (no reason given)




top topics
 
13
<< 1   >>

log in

join