ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

U.S. Drone Fleet Infected With a Virus; the Future of Warfare?

Updated on November 3, 2017

A computer virus has infected the cockpits of the U.S. military drone fleet at Creech Air Force Base in Nevada, reported.

The virus has not disrupted drone pilots air navigation in their mission overseas, however, it has recorded their every move, and this could potentially be transmitted over the internet to someone outside the military chain of command, meaning countries like Russia or China could have access to one of Americas drone cockpits.

And although the virus was removed, it keeps reappearing, “we keep wiping it off, and it keeps coming back,” says a source familiar with the network infection.

The virus is said to have spread through removable drives which are used inside the cockpits to load map updates and move mission videos from one computer to another.

However, security specialist are uncertain if the virus was started intentionally by someone outside the military or if it was a common malware that incidentally made its way through the military’s heavily guarded networks.

While this story went unreported by most news stations, it’s actually of greater significance than one might think; “the infection underscores the ongoing security risks in what has become the US military’s most important weapons system,” writes.

The “most important weapon” which has only led to a devastating number of civilian deaths, destroyed families and towns, and created enemies faster than the U.S. can kill them.

Yet having remotely piloted aircrafts at risk of being hacked means they could be taken control of by someone other than the pilots in the cockpit, and this means it can be rerouted while in the air, striking places other than its intended target, thus creating more opportunities for civilian deaths, putting everyone in the world in danger of being bombed by a drone.

This raises the bigger question - will the future of warfare be governments trying to hack each other’s drones? While also having to worry about non state actors interfering?

This is just the beginning, although the hackers didn’t actually manage to take control and manipulate the pilots flight path, the next step will be hacking the drones while their in the air, taking full control of it and bombing different targets. As online hackers continue to learn new ways of breaking into government systems, this capability is right around the corner.

Although President Obama oversaw a total of 563 drone strikes over Pakistan, Somalia, and Yemen, in effect killing between 384 and 907 civilians in those countries (undercounting the civilian deaths to 64 in order to hide damning reports, such as the one by The Intercept which showed that nearly 90 percent of people killed in drone strikes in Afghanistan “were not the intended targets” of the attacks), the campaign for more drone strikes is now more active than ever. With Trump looking to loosen Obama’s limits on drone strikes and with the Administration saying they want to increase CIA drone strikes, it seems like the destructive paranoid war on drone hacks is a likely bet for the future.


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)