EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.09.11

With Microsoft, Drones Can Crash Into Buildings

Posted in GNU/Linux, Microsoft, Security, Windows at 10:20 am by Dr. Roy Schestowitz

Image by UpstateNYer

Nine eleven

Summary: Deadly drones that depend on Windows become victims of intrusion and potentially control from the outside

DESPITE what Bristol might laughably claim, Microsoft is just about as bad as one can do for security and the monthly reminder (those numbers are fake by the way) should not be ignored. Patches aside, many news sites say that a Windows virus has hit the drone fleet of the US army. There’s a comforting thought, eh? With rockets on board, crackers can play war plane simulator with a real miniature (but well armed) plane. People have rightly started asking, why not just use Linux? One blogger writes: “Because the level of skill required to crack a Unix-like OS is much higher than that needed for a Microsoft OS. Further, properly configured Unix-like systems are much more robust than Microsoft systems. Were Military forces using properly configured and properly secured Unix or Linux systems we would not see items like these below being reported.

“”I just had a, “What were they thinking?!”, moment while reading this article at ars technica: Computer virus hits US Predator and Reaper drone fleet. First, it is not a “computer virus”, it is a Microsoft operating system virus. Second, using Microsoft operating systems for any critical Military computer systems is just wrong. I know the US Military has specifications for rugged computer systems that must be made in the USA. That makes sense. What does not make sense is the fact that the US Military will accept Microsoft operating systems on its critical, sensitive hardware at this date in time. That is like specifying a bank vault that can withstand a nearby nuclear blast, but allowing the builder to install a screen door for access to the vault. It is just a Bad Idea!””

Here is another report about it. Wired says that “Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.”

Not so reassuring.

Drone issues such as this are just another reminder amongst other incidents that we mentioned before — incidents where the US military is put at risk because of Windows . To quote Microsoft’s Allchin, “It is no exaggeration to say that the national security is also implicated by the efforts of hackers to break into computing networks. Computers, including many running Windows operating systems, are used throughout the United States Department of Defense and by the armed forces of the United States in Afghanistan and elsewhere.”

“Microsoft Appears to Have Blacklisted Oxford University” says another report, showing us what Microsoft “security” really is achieving:

Microsoft’s motives for action is unknown, Oxford’s semester is about to start

We received word from Oxford University in the UK today that Microsoft Corp. (MSFT) has blacklisted the campus for unknown reasons.

The reasons are actually known. Microsoft is too incompetent or arrogant to implement security properly.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

2 Comments

  1. Needs Sunlight said,

    October 9, 2011 at 12:16 pm

    Gravatar

    There’s got to be a solid paper trail showing which individuals are responsible for putting Microsoft products onto DoD hardware. Track down the individuals responsible and make sure that the problem cannot recur.

  2. twitter said,

    October 10, 2011 at 11:19 am

    Gravatar

    That the military is operating with a known compromised system is a direct result of non free software propaganda and the moral erosion that comes from using non free software. Non free software hands control over to the software owner, Microsoft and other vendors in this case. The military blindly trusts that Microsoft won’t use that control and is willfully ignorant in trusting that Microsoft can keep the Redmond campus itself clear of intrusion. The evidence is that every organization that uses Microsoft software has systems under botnet control. Microsoft and other non free software companies have conditioned people to believe that it’s OK to have someone else in control of computing as long as the task gets done in a “good enough” way. Replacement with free software is under user control is impractical they routinely tell the world. It’s not such a great leap to where Creech has landed, to call an unknown intrusion “benign” and fly weapons without full control.

What Else is New


  1. Links 22/11/2019: Mesa 19.2.6, webOS OSE 2.1.0

    Links for the day



  2. Understanding Thierry Breton: More Influential Friends in High Places

    "So it comes as no surprise to find Valerie and Thierry rubbing shoulders with members of the Rothschild family at social events."



  3. Links 22/11/2019: Slimbook’s GNU/Linux Laptops, Kubernetes Hype

    Links for the day



  4. Techrights is Still a Team Effort

    Getting involved in what we do is not difficult and it is even encouraged



  5. Guest Post/Off-Topic: Koalas Caught in Australian Bushfire

    Australian volunteers and rescuers need help to rescue helpless animals facing danger



  6. Global Patent Warming

    The old term "Global Patent Warming" comes to mind when one assesses the neoliberal approach of today's EPO, where the sole goal is making piles of money by granting loads and loads of illegal European Patents



  7. IRC Proceedings: Thursday, November 21, 2019

    IRC logs for Thursday, November 21, 2019



  8. Teaser: “Enriching Exchanges”

    Ahead of the fourteenth part in the Breton series this old tweet seems increasingly relevant



  9. Web Site Which Exposed Microsoft Crimes is Gone From the Web, But Copies Still Exist

    Reputation laundering operations of Microsoft tell us that Microsoft is a 'new' and 'reformed' company; but Comes v Microsoft documents serve to show that little has changed



  10. Understanding Thierry Breton: Socialising With the Elite

    "Bernadette Chirac is not the only Presidential widow with whom Valerie has close connections."



  11. Justice Peter Huber Speaking to a Front Group of Team UPC May Compromise the Integrity of the FCC and Its Outcomes

    The public reaction, even from some legal professionals, isn't too positive, seeing how judges from BVerfG (FCC) speak to the mouthpieces of Team UPC (biased and in the pockets of the litigation 'industry')



  12. Injustice at Every Level Would Simply Doom the Entire Patent System

    Repeated failure to restore the Rule of Law and enforce accountability/oversight in Europe's patent system renders the entire system moot; it is a case of adherence to basic constitutional pillars



  13. Understanding Thierry Breton: Thierry and the $100 Billion Man

    Thierry Breton's connections to the tax avoidance ploy of his friend Bernard Arnault



  14. Links 21/11/2019: Mesa 19.3.0 RC4, Canonical SPS

    Links for the day



  15. Links 21/11/2019: Charmed OSM, Mesa 19.2.5, DXVK 1.4.5, Zorin OS 15 Lite

    Links for the day



  16. Understanding Thierry Breton: Atos Healthcare - “The Ugly Face of Business”

    "...2,380 people died after their claim for employment and support allowance (ESA) ended because a work capability assessment (WCA) found that they were found fit for work."



  17. IRC Proceedings: Wednesday, November 20, 2019

    IRC logs for Wednesday, November 20, 2019



  18. Microsoft Tim: Microsoft is Now Defending Linux

    The difference between fiction and reality



  19. Justice Peter Huber of the German Federal Constitutional Court (FCC) Calls 'Bullshit' a Rumour Nobody Really Spreads

    A sort of 'trial by media' (by Team UPC) compromises the integrity of the case (constitutional complaint) and can be interpreted as judges succumbing to lobbying/pressure from those who conspire to violate many constitutions across Europe for personal/financial gain



  20. Understanding Thierry Breton: What Thierry Did Next...

    "Whether by coincidence or not, when Atos announced in 2010 that it would acquire Siemens’ IT unit, it was the 32-year-old Macron at Rothschild who advised Breton on the deal."



  21. Links 20/11/2019: HONOR MagicBook With GNU/Linux, Coreboot 4.11, GNU Health Patchset 3.6.1

    Links for the day



  22. IRC Proceedings: Tuesday, November 19, 2019

    IRC logs for Tuesday, November 19, 2019



  23. EPO Geared Towards Financial Exploitation of Europe Instead of Serving Europe

    For the financial benefit of law firms and patent offices (they profit from processing loads of patents and lawsuits) Europe is being reverted back to Medieval Times when exercising invention and free thought (or free coding) was a luxury of the rich alone



  24. Microsoft and IBM Are the Patent Trolls, They Won't Protect Us From Trolls

    "Microsoft has no taste" and IBM has no taste, either; they're lying to our collective face together with OIN and the 'Linux' Foundation



  25. How Ralph Nader Put It

    Ralph Nader on money in politics



  26. ZDNet (CBS) Associates GNU/Linux Users With ISIS

    Response to "US student was allegedly building a custom Gentoo Linux distro for ISIS," just published by ZDNet and composed by their biggest troll, Catalin Cimpanu



  27. Understanding Thierry Breton: Noël Forgeard and His “Golden Parachute”

    The end of the first half of the Breton series; in this particular part we continue to cover the EADS scandal and the second half of this series will include the EPO connections (the vote in a plenary for Breton's nomination is due 27/11)



  28. Links 19/11/2019: Zswap's B-Tree Search Implementation, WordPress 5.2.4

    Links for the day



  29. We've Already Entered the Era When Patents Should be Presumed Invalid

    The abundance of low-quality patents may mean short-term profits for patent offices and law firms; but we know at whose expense they are profiting and the legitimacy of patent systems suffers as a result



  30. Jean-Luc Breton

    Breton a champion of obstruction and obfuscation


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts