Tuesday, October 18, 2011

Military Lavs With Keystroke Logging Computer Virus?

By Mike Vick


There has been some interesting information in the news recently about US Military DAV tee-robotic computer systems with keystroke logger viruses. They believe these to be pretty benign, and erase them when they see them, reboot software, it goes away for a while and then shows back up. There was an interesting piece on this in Wired Magazine, in their Danger Zone section, a special exclusive report titled; "Exclusive: Computer Virus Hits U.S. Drone Fleet" by Noah Shackleton published on October 7, 2011.

The article indicated that the military was even now trying to figure it all out, but was not worried about it, as "who cares if there is a keystroke logger, no 1 can get the information, because it is often a closed loop system," right, that makes sense, still, that details is being recorded begging the question, what other info in other systems is getting hacked into; and why, and who is behind it all? Now then, maybe it's just an old keystroke logger system remnant attached to some patch-ware, or software package in the system, or perhaps not?

Now then, let's up the ante on this conversation a bit. In case you will recall back in 2009 the insurgents learned they could hack into and watch the footage in the UAVs, and there was another exciting article published inside Wall Street Journal on December 17, 2009 titled; "Insurgents Hack US Drones - $26 Computer software is Applied to Breach Key Weapons in Iraq; Iranian Backing Suspected," by Siobhan Gorman, August Cole, and Yochi J. Dreazen. The article stated;

"Senior defense and intelligence officials stated Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq applied software programs for instance SkyGrabber -- obtainable for as little as $25.95 on the net -- to regularly capture drone video feeds, in accordance with an individual familiar with reports on the matter."

When I read that back then, I notion to myself; yah, so what, the insurgents will see they are screwed and watched carefully, and it's going to actually put the fear of Allah into them. Possibly that is a great thing, but is it really? Certainly we require solid protection of our robotic weapons systems, lest they grow to be hacked and turned against us you see. Meanwhile, even though this was a minor issue, it seemed to drop off the media's radar screen. On the other hand this new news of a keystroke logger makes me wonder if our multi-billion dollar weapons systems are safe?

Okay so, you know, as an entrepreneur I like to take in mistakes and problems, and make lemonade. Why not take in these vulnerabilities and turn them into assets for our team? Let me explain.

You see, I propose using individuals key stroke loggers along with the video footage and other date in sequence to determine and record what the tele-robotic pilot did during every circumstance, in each wind turbulence event, during each zooming in in the high-definition camera lens, and of course each time the drone happen to fire a projectile just like a hell-fire missile at a lowly pre-doomed, and pre-destined terrorist. Utilizing all of this information, we can system artificial intelligence computers to fly individuals drones inside future.

This will prevent human error from fatigue, permit a lot more drones to be flown with a smaller amount pilots, and it'll turn out to be the starting of complete autonomous unmanned air vehicles in the future. Thus, we shouldn't delete the keystroke loggers, we need to tap into them, or remove them and install our unique keylogging, and event logging program to help our AI computers discover via hours of mundane computer game like drone flying. Please be considering here.




About the Author:



No comments:

Post a Comment