top of page

Military Scrambles To Patch Vulnerable Drone Software

Drones may be at the center of the U.S. campaign to take out extremists around the globe. But there's a "pervasive vulnerability" in the robotic aircraft, according to the Pentagon's premier science and technology division — a weakness the drones share with just about every car, medical device and power plant on the planet.

The control algorithms for these crucial machines are written in a fundamentally insecure manner, says Dr. Kathleen Fisher, a Tufts University computer scientist and a program manager at the Defense Advanced Research Projects Agency. There's simply no systematic way for programmers to check for vulnerabilities as they put together the software that runs our drones, our trucks or our pacemakers.

In our homes and our offices, this weakness is only a medium-sized deal: developers can release a patched version of Safari or Microsoft Word whenever they find a hole; anti-virus and intrusion-detection systems can handle many other threats. But updating the control software on a drone means practically re-certifying the entire aircraft. And those security programs often introduce all sorts of new vulnerabilities. "The traditional approaches to security won't work," Fisher tells Danger Room.

Comments


NEWSLETTERS

Get Reason In Your Inbox.

Thanks for submitting!

Join the

LIBERTARIAN PARTY

We are funded entirely by Americans who want to help give liberty a voice. By joining the Libertarian Party as a dues-paying member, you are investing in this critical work.

Thanks for submitting!

ADDRESS

1444 Duke St.

Alexandria, VA 22314-3403

PHONE

(800) ELECT-US

(800) 353-2887

EMAIL

bottom of page