When the U.S. fleet of surveillance and attack drones was infected by a virus, the Air Force\u2019s cybersecurity specialists found out from the media\u00a0-- two weeks after the incident began.\n\tWhich is more disturbing: The lax security or the CYA response?\n\tOn Friday, Wired broke the story that \u201ca computer virus has infected the cockpits of America\u2019s Predator and Reaper drones, logging pilots\u2019 every keystroke as they remotely fly missions over Afghanistan and other warzones.\u201d\n\tThe virus had been detected two weeks earlier at Creech Air Force Base in Nevada, which handles the majority of U.S. drone missions around the world. There are no indications the virus has compromised the system \u2013 either by damaging information or transmitting it to an outsider. However, it has proved very difficult to eradicate from the system\u2019s computers.\n\tIt is likely the virus was introduced to the system via a disc or removable drive. Because of the danger these media pose, their use is highly restricted in much of the military. As Wired wrote:\n\t\n\t\tBut the base at Creech was one of the exceptions, until the virus hit. Predator and Reaper crews use removable hard drives to load map updates and transport mission videos from one computer to another. The virus is believed to have spread through these removable drives. Drone units at other Air Force bases worldwide have now been ordered to stop their use.\n\n\tI\u2019d love to know what the protocol was for handling, storing and dis-infecting these drives. Then again, maybe I\u2019m happier not knowing.\n\tWhile it is disturbing to realize that the drones capable of killing large and small groups of people could have been hijacked, it gets worse. Even though the virus had been in the drones\u2019 systems for at least two weeks before the story ran, the 24th Air Force, the unit responsible for the service\u2019s IT security, only found out about it by reading the Wired article.\n\tWithout more information it is impossible to say if this second lapse is because of a cover-your-ass effort or an organizational failure. It does highlight a huge weakness in military IT security.\n\tEach service has a unit like the 24th, which \u201cestablishes, operates, maintains and defends\u201d that service\u2019s networks. These units are then supposed to provide people and info to U.S. Cyber Command, which has overall responsibility for security. Because the Air Force has no centralized network for the 24th to oversee it is difficult to see how it can fulfill its mission without embedding people with every unit or base that has its own network. That would take an awful lot of people.\n\tThe other services face similar issues. It was only last year that the Army, Navy, Marines established commands to coordinate the various cyber security units within each service.\n\tThat\u2019s a lot of gaps to fill.