Technology

Air Force Drones Infected With Unknown Computer Virus That Won’t Go Away

File this under “disconcerting.”

No matter what military computer technicians do, they can’t seem to remove a virus from the computer systems that control military drones.

The virus infecting ground control stations at Creech Air Force Base in Nevada was identified by military’s Host-Based Security System two weeks ago. It is reported the virus is tracking everything the drones do as they fly over areas like Afghanistan.

Computer Virus Infects Drones, Doesnt Stop Missions

Drone pilots at ground control station use joysticks to remotely operate drones. (Photo: Wired)

Wired’s Danger Room released an exclusive report:

“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”

Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.

[...]

The Air Force declined to comment directly on the virus. “We generally do not discuss specific vulnerabilities, threats, or responses to our computer networks, since that helps people looking to exploit or attack our systems to refine their approach,” says Lt. Col. Tadd Sholtis, a spokesman for Air Combat Command, which oversees the drones and all other Air Force tactical aircraft. “We invest a lot in protecting and monitoring our systems to counter threats and ensure security, which includes a comprehensive response to viruses, worms, and other malware we discover.”

Even still, the virus has not grounded any of the drones from continuing missions and no incidents have been reported of information being lost or sent to other sources, although experts are unsure how far it has spread. Wired goes on to report that drones have been known for security flaws:

Many Reapers and Predators don’t encrypt the video they transmit to American troops on the ground. In the summer of 2009, U.S. forces discovered “days and days and hours and hours” of the drone footage on the laptops of Iraqi insurgents. A $26 piece of software allowed the militants to capture the video.

Computer Virus Infects Drones, Doesnt Stop Missions

MQ-1 Predator (Photo: U.S. Air Force)

The virus, sources believe, were spread through removable drives, the use of which has became restricted by the military after the agent.btz worm was introduced into defense computers with this method. So far, technicians have had to completely erase the hard drives of infected systems to remove the virus and painstakingly rebuild them from scratch.

The photo of the Predator drone in the post was updated from a previous image that was misidentified.

Comments (160)

  • Vapor Trail
    Posted on October 7, 2011 at 5:18pm

    Its because they are using windows as the operating system. Same thing happened when the Russians upgraded their sub the Kursk to windows.
    Transcript of Portions of the Kursk Log

    Captain: Is the new fire control Windows OS installed yet Comrade?
    Seaman: Almost Sir. We just need to finish filling out the
    registration card.
    Captain: Excellent. Soon we will be able to point and click our
    enemies into oblivion. [evil laughter in background]
    Seaman: Comrade Captain! It is booting! Look, it says ‘Preparing to
    run Windows for the first time’. [long pause]
    Seaman: Arrgh! Sir, it wants me to reboot again. That makes the 27th
    time.
    Captain: Hmmm. This is not encouraging. Go ahead and reboot again.

    Seaman: Aye aye, Sir. [another long pause]
    Seaman: Captain, it is up again. It says it found new hardware . . .
    . A CD-ROM drive and that it needs drivers.
    Captain: Where are the drivers?
    Seaman: On the CD-ROM.
    Captain: You are joking, no?
    Seaman: No Sir.
    Captain: Reboot the damn thing again. I am starting not to like this
    Windows. [another long pause]
    Seaman: Sir! It is back! It says it found the Gorby2000 Torpedo and
    is looking for the device drivers. Do we have a driver disk?
    Captain: I do not think so.
    Seaman: I will tell it to use the default drivers. [another long
    pause]
    Seaman: Crap. It wants to reboot again.
    Captain: How many times are we going to reboot today? This is taking
    forever. Our hull is going to rust ou

    Report Post » Vapor Trail  
    • Vapor Trail
      Posted on October 7, 2011 at 5:19pm

      Captain: How many times are we going to reboot today? This is taking
      forever. Our hull is going to rust out before this works. [another
      long pause]
      Seaman: Sir! It is up and this time it is not asking for anything!
      Captain: Really? No device drivers? No registration cards? No user
      profiles?
      Seaman: No Sir. I think it is ready.
      Captain: Good work comrade. Now click on the fire control icon and
      let us see how this works.
      Seaman: Clicking now, Sir. [another long pause]
      Captain: Why does the fire control screen have a dancing paper clip on
      it?
      Seaman: I have no idea Sir.
      Captain: Hmmm, well try clicking on the menu.
      Seaman: Aye aye, Sir. Let us see; Open E-mail, Spam a friend, Mail a
      Virus, Fire a Torpedo . . . .
      Captain: We will spam a friend later. L et us fire a torpedo.
      Seaman: Aye aye, Sir. [another long pause]
      Seaman: It is asking us to load the torpedo and to click when ready.
      Captain: Torpedo room, load a torpedo in tube number 1!
      Intercom: This is the Torpedo room. The torpedo is loaded Sir.
      Captain: Click on the continue button.
      Seaman: Aye aye, Sir. [another long pause]
      Seaman: It is asking for a target Sir.
      Captain: Hmmm, target the Rainbow Warrior.
      Seaman: Aye aye, Sir. Damn! It says the torpedo is low on ink.
      Captain: Click ignore. W e will get some ink when we return to base.
      Seaman: Aye aye, Sir. We are ready to fire.
      Captain: Very good. You may fire when ready comrade.
      Seaman: Firing torpedo,

      Report Post » Vapor Trail  
    • Vapor Trail
      Posted on October 7, 2011 at 5:40pm

      Well sorry last part refuses to post.

      Report Post » Vapor Trail  
    • zman173rd
      Posted on October 8, 2011 at 11:34am

      “Dancing paperclip” FUNNY!!!! LOL’d through the whole thing.

      Report Post » zman173rd  
    • Cheetosareus
      Posted on October 8, 2011 at 11:39am

      NOooooooooo!!!!!!

      Report Post »  
    • Falsegods
      Posted on October 8, 2011 at 4:13pm

      Infected chip bought by congress’ lowest enemy bidder.
      Gov./congress IQ is a threat to every son in our military.
      Get your kids out of our military,
      they are being set up by this backward congress/government .

      Report Post »  
    • 10mmGlockuser
      Posted on October 8, 2011 at 11:03pm

      Linux……..problem solved

      Report Post » 10mmGlockuser  
    • tharpdevenport
      Posted on October 9, 2011 at 5:31pm

      [long pauses]
      Captain: “Why aren’t we firing?”
      Seaman: “I do not know, sir.”
      [pause]
      Captain: “Now what is it, comrad?”
      Seaman: ” ‘Windows has encountered a fatal error and needs to shut down’ .”
      Captain: “Blast! When it reboots, target this … Bill Gates…”

      Report Post » tharpdevenport  
  • PoliticalJunkieToo
    Posted on October 7, 2011 at 5:13pm

    Our founding fathers would be appalled that we are in debt to an enemy communist country and we have a Marxist in the White House.

    This virus reeks of China’s doing or maybe Obama koodies.

    Report Post »  
    • Vital
      Posted on October 8, 2011 at 3:11am

      I think it’s Obama koodies

      Report Post » Vital  
    • Cheetosareus
      Posted on October 8, 2011 at 11:43am

      I vote China. They put a lot of stuff in the thumb drives they import. Maybe somebody took something from home and used it on the system not realizing they were infected.

      Report Post »  
    • liberalescheisskopf
      Posted on October 8, 2011 at 10:26pm

      You likee egg-row?

      Report Post » liberalescheisskopf  
  • BornandBredintheUSA
    Posted on October 7, 2011 at 5:12pm

    It seems as though I read something recently that said that the Air Force had hired a Muslim company as an outside contractor to work on extremely sensitive projects. If that is the case and this is what is happening now, then maybe they need to rethink who they hire in the future.

    Report Post »  
    • The-Monk
      Posted on October 7, 2011 at 8:41pm

      It’s probably the old “USB Flash Drive in the parking lot” trick. Works every time… You guys DO know what the old “USB Flash Drive in the parking lot” trick is I hope?

      Report Post » The-Monk  
    • jb.kibs
      Posted on October 7, 2011 at 9:05pm

      yes i do. ;P

      Report Post »  
    • HumbleMan
      Posted on October 8, 2011 at 5:49am

      Is that like the banana in the tail-pipe trick?

      Or do you mean leaving a viral USB stick on the ground outside a facility, so that someone picks-up and then tries to see what’s on it, thereby infecting their own network. Yes … there are plenty of idiots who would try without sterilizing it first. Plenty of idiots … sadly.

      Report Post » HumbleMan  
  • stringfellow hawk
    Posted on October 7, 2011 at 5:11pm

    Just call me John Conner but this sounds a bit like the plot from the Terminator movies!

    Report Post »  
  • AnAmerican111
    Posted on October 7, 2011 at 4:53pm

    “Bush’s Fault”!…………

    As heard on an another upcoming pathetic OBUMA speech

    Report Post »  
  • Anonymous T. Irrelevant
    Posted on October 7, 2011 at 4:52pm

    Bring in Kevin Mitnick, of whom the Blaze reported on earlier, and let him find it.

    Report Post » Anonymous T. Irrelevant  
    • The-Monk
      Posted on October 8, 2011 at 12:26am

      Bring me in. If I find it and kill it it’s $20K. If I don‘t it’s $0. I’m pretty good at finding and killing stuff like this. What do they have to lose? I suggest an F&R of every system. I’m willing to try it. After all I‘m unemployed and just sitting around looking at jobs that won’t hire me.

      Report Post » The-Monk  
    • MDSBigPaPa
      Posted on October 8, 2011 at 3:56pm

      I cannot believe Mitnick is a “white hat” at one time, many-many years ago he had total control of the power grid from Las Vegas to LA – all UNIX based systems. He used social engineering, dumpster diving,… to gain access to some of the most sensitive Military systems we have. Read The Cuckoo’s Egg by Clifford Stoll and see just how bad this guy really was. I still don’t trust him.

      I think it’s time for an OS change – Dump Windows. There are Operating Systems that have never been cracked AND they’ve been ported into the Windows-based hardware. This is not the place for OS wars so I’m not posting my preference but, I agree, it’s time for a change.

      Report Post » MDSBigPaPa  
  • jimdgriz
    Posted on October 7, 2011 at 4:45pm

    Simple but awkward answer:
    Shut down ALL the computers on the secure network, Wipe ‘em, or better yet destroy their hard drives, and reload software, maps, etc. from scratch (after checking those files/discs are clean), then re-enable the network – after doing a similar format and reload of the drones too.

    There can be no tolerating a virus in a secure network, especially one that controls live fire weapons. One virus can load another from a remote source…
    Can you imagine a drone being fed a US facility as a target and firing on it?

    Report Post »  
    • dalebrendan
      Posted on October 7, 2011 at 4:58pm

      The hard-drive isn’t the only piece of equipment that stores data, especially in incredibly sophisticated equipment like this.

      Report Post » dalebrendan  
    • lel2007
      Posted on October 7, 2011 at 5:06pm

      Nope. The only answer is to call in NCIS Special Agent McGee. I’m sure if the USAF asks really really nice, NCIS would loan him for a short time.

      Report Post » lel2007  
    • WeeDontNeedNoSteeeenkinBadges
      Posted on October 7, 2011 at 5:07pm

      This bandito can imagine even better …
      … like an illegal alien becomes President … no one in Congress or the Judiciary challenges it … he’s a marxist and Progressives (communists) reveal themselves in all parts of government and unions and schools and [fill in the blank] … they’re trying to spend America into collapse … they admire infamous communist leaders … they praise unrest and try to provoke more … and now they have control of our weapons of mass destruction.

      Wake up, Ne̶o̶ America . . .
      The M̶a̶t̶r̶i̶x̶ New World Order has you . .

      Report Post » WeeDontNeedNoSteeeenkinBadges  
    • KevINtampa
      Posted on October 7, 2011 at 5:25pm

      Or worse, an entire wing…attacking a foreign country neighboring Afganistan:

      General “Buck” Turgidson: Mr. President, about, uh, 35 minutes ago, General Jack Ripper, the commanding general of, uh, Burpelson Air Force Base, issued an order to the 34 B-52′s of his Wing, which were airborne at the time as part of a special exercise we were holding called Operation Drop-Kick. Now, it appears that the order called for the planes to, uh, attack their targets inside Russia. The, uh, planes are fully armed with nuclear weapons with an average load of, um, 40 megatons each. Now, the central display of Russia will indicate the position of the planes. The triangles are their primary targets; the squares are their secondary targets. The aircraft will begin penetrating Russian radar cover within, uh, 25 minutes.
      President Merkin Muffley: General Turgidson, I find this very difficult to understand. I was under the impression that I was the only one in authority to order the use of nuclear weapons.
      General “Buck” Turgidson: That’s right, sir, you are the only person authorized to do so. And although I, uh, hate to judge before all the facts are in, it’s beginning to look like, uh, General Ripper exceeded his authority.

      Report Post »  
    • WeeDontNeedNoSteeeenkinBadges
      Posted on October 7, 2011 at 6:53pm

      DR. STRANGELOVE: “Mr President. I have a plan.” [amazed as he stands up from his wheelchair] “Mein Führer! I can walk!”
      [21 nuclear-mega-ton salute]

      Report Post » WeeDontNeedNoSteeeenkinBadges  
    • 1TrueOne55
      Posted on October 8, 2011 at 2:17pm

      I bet that the virus components are stored across many chips on the system board and on the servers that send information to these consoles that control the drones. You can see where this is going. It could also be that spam bots on the Internet are the real problem and that your or my computer (NOT Running UBUNTU LINUX) could be storing the code off site and when ever they clean the drives and then bring them back online that a server some where needs a specific connection to the drone and that is how it reinfects.

      Ever since Micro$haft opened its code to scrutiny by both Russian and Chinese Security Agencies I moved away from the OS completely and recommend we all do that. We could reduce the Spambot community by at least a few million.

      Report Post » 1TrueOne55  
    • Salamander
      Posted on October 10, 2011 at 12:17pm

      Whatever happened to ADA? Why Windows? Microsoft would have a bonanza creating a special Defense Systems division, developing a new operating system and isolating it from commercial systems! Rember the old grey phone/black phone protocol? Nobody speaks on a black phone when a grey phone is off-hook!

      Report Post »  
  • capitalismrocks
    Posted on October 7, 2011 at 4:41pm

    The control system computers should NOT be connected to any outside connections and should not have any form of media ports (not USB ports for thumbdrives or anything else) — these should be isolated systems, there is ZERO reason for them not to be. There logs and video data should all be OUTBOUND to a server farm to record the drone data – WRITE OUT only…

    I fail to see what is so difficult for the MILITARY to understand about its computer systems – what the traitorous moron with his lady gaga copying of files to give to wikileaks hasn’t taught anyone in the military anything?!?!?

    Amateur hour!!!

    Report Post » capitalismrocks  
    • jimdgriz
      Posted on October 7, 2011 at 4:55pm

      Any internet connection is too much. Any “write only” connection to the outside is too much. Bringing any disk, thumb drive, etc. into (or out of) a vault (where I assume these computers reside), should require a careful scan to verify the benign content of all data, including boot sectors, and executable must never be allowed in unless fully checked….

      They KNOW this.
      These are VERY OLD rules.
      Amateur hour indeed.
      Somebody likely took a shortcut, saved an hour for an “urgent” mission, and now they’re paying thousands of man hours for it.

      But I wouldn‘t fly anything that isn’t guaranteed clean – not with live weapons on it.

      Report Post »  
    • The-Monk
      Posted on October 7, 2011 at 9:02pm

      @jimdgriz
      Like the movie, “Real Genius”?
      It’s probably the old “USB Flash Drive in the parking lot” trick. Works every time… Or they are allowed to go online during their lunch breaks to check their e-mail or SHOP ONLINE! I’m wondering if they are using AVG Free to save a few bucks? That’s probably a new White House/DOJ mandate.

      Report Post » The-Monk  
    • CharlesMartel
      Posted on October 8, 2011 at 10:59am

      During the Clinton Administration, General McPeek thought we had too many computer officers and very few of them got promotions and the rest were forced to separate or retire. “Out-sourcing” was a cool buzzword!

      Report Post » CharlesMartel  
    • Falsegods
      Posted on October 8, 2011 at 3:56pm

      The military is beyond this IQ. It is no accident.

      Report Post »  
  • lukerw
    Posted on October 7, 2011 at 4:18pm

    Check the parts… made in China! Dumb DOD!

    Report Post » lukerw  
    • motonutt
      Posted on October 7, 2011 at 4:23pm

      Smells like chinese. It would be unfortunate if one of our drones lost control and went over a blew one of their warships off of Taiwan out of the water…..

      Report Post » motonutt  
    • Chuck Stein
      Posted on October 7, 2011 at 4:33pm

      My thoughts EXACTLY

      Report Post »  
    • BetterDays
      Posted on October 7, 2011 at 5:00pm

      You are correct. Due to an insanely regulated bidding process within the DOD many components that are built into our military systems are of Chineese origon. I’m not sue how it works, but it’s apparent that this is a very serious issue.
      Virus’s and key loggers do not have to be software in origin, they can be plugged into RAM, or iproms, and other boot type firmware by the factory. In Chineese products, more than likely at Uncle Mao’s armed coercion.

      Report Post »  
    • The-Monk
      Posted on October 7, 2011 at 9:16pm

      @BetterDays
      Don’t you mean EPROM? Electrically Programmable Read Only Memory. I haven’t heard of iprom.

      Report Post » The-Monk  
  • NEAF
    Posted on October 7, 2011 at 4:09pm

    I guess they are going to accused the virus by attacking Alakie.

    Report Post » NEAF  
    • teamarcheson
      Posted on October 7, 2011 at 4:20pm

      China!

      This is what happens when you have your software written and the parts for your plane made in China. The US military employs many software and hardware engineers who are not American. This is a acceptable price to pay for Affirmative Action and Diversity. The USAF is lucky the planes were not turned against our own troops or have they?

      Report Post »  
  • felix
    Posted on October 7, 2011 at 4:09pm

    our dear dictator sataro’s work , not doubt !

    Report Post »  
  • V-MAN MACE
    Posted on October 7, 2011 at 4:05pm

    Told ya so.

    Report Post » V-MAN MACE  
  • Lateris
    Posted on October 7, 2011 at 4:01pm

    Steps to take:
    1.) format hard drive
    2.) format chips
    3.) replace hardware and destroy old hardware
    4.) stop training jarheads that come and go when it comes to IT
    5.) stop using open source

    Report Post »  
    • ChiefH
      Posted on October 7, 2011 at 7:31pm

      Your last item (#5) is backwards. Stop using proprietary software and START using Open Source software. An open source operating system would not have allowed the virus to get in to infect the AF drone control systems.

      Report Post »  
    • The-Monk
      Posted on October 8, 2011 at 12:36am

      @ChiefH
      What part of “open source” do you not understand? Open source means that everyone and anyone has full access to the code. You must be from China or the White House and I don’t see the difference.

      Report Post » The-Monk  
  • SacredHonor1776
    Posted on October 7, 2011 at 3:57pm

    Infected by Skynet… Soon it will turn on all mankind, :p.

    Report Post »  
  • biglipnagger
    Posted on October 7, 2011 at 3:52pm

    Lets’s sell more to the Saudis!

    Turkey is getting a bunch next, right? Like the leader of NATO, who is going to invade Syria next, right?

    And didnt one of these just kamikaze into a C-130 from the 107th Air Wing from Schenectady, NY while deployed in Afghanistan?

    Nothing to see here…

    Report Post » biglipnagger  
  • The10thAmendment
    Posted on October 7, 2011 at 3:51pm

    LOL. I work directly on drone projects. The only way to infect a system is by intent. The onboard firewalls are designed to shut down logic applications with malicious intrusions, where the only commands that will enable are a return home. If they are having trouble with invasive scripts, they are there by the tech who directly worked on it/them.

    Same thing with the navigation base. If the Military is allowing its techs to use removable drives, they are purely idiots, and designing disaster by choice.

    Report Post » The10thAmendment  
    • Snowleopard {gallery of cat folks}
      Posted on October 7, 2011 at 4:03pm

      Question, since I know next to nothing about those kind of systems, is it hypothetically possible for a virus to be introduced into different parts of the program, say looking like fragments belonging to the source codes of the software or such, and even after being wiped when the virus is an intact unit, the fragments reassemble once again after key conditions are met? Say a rebooting of the system or such?

      Report Post » Snowleopard {gallery of cat folks}  
    • OhioRifleman
      Posted on October 7, 2011 at 4:17pm

      @ Snow:

      MILITARY SIDE: Not sure, 10th will need to answer that.

      CIVILIAN SIDE: Such viruses exist. They’re called Rootkits, and I deal with them at work on a regular basis. It is possible to get rid of them if you know what you are doing and have the right tools, but it is a painstaking process that usually eats up ~4 man-hours per infected machine.

      Report Post » OhioRifleman  
    • The10thAmendment
      Posted on October 7, 2011 at 4:20pm

      It’s possible, but only if the tech is the one doing it. He can write in script that can be used as a remote command and implement a multi headed worm. The system itself is continually monitoring (sweeping) to repair any broken chains, and eliminate excess. If a virus, or worm remains it’s because the tech is allowing it to remain. The fail safe can’t be prompted by even the best crackers. It’s got to be directly installed live and in person. When we benchmark chips, included in that is ensuring that the formatting is exactly as defined in manufacture with no excess. When it’s installed the only way to change the formatting is by direct application. That’s the way it works throughout the entire structure component by component.

      If a drone malfunctions it either simply quite working, or a tech caused it. Even with the idea of remote access it requires a tech at the source. Drones really do only serve 1 master, the man at the controls.

      Report Post » The10thAmendment  
    • Blackhawk1
      Posted on October 7, 2011 at 4:27pm

      Look for the Tech that joined after 9/11 with the last name of Mohammed.

      Report Post » Blackhawk1  
    • The10thAmendment
      Posted on October 7, 2011 at 4:37pm

      @ Snowleopard.

      I can further state without reserve that if a memory base onboard a drone is infected, it still cannot be prompted except through direct tampering, or replacing active chips. The chips have precise strings of gateways/codes that will only allow activation through source. Remote can only be through the Military side of satellites. The difference between public and private side use is rather dramatic, and it would be impossible to crack the private side without the source being easily traced.

      A real simple example. You have an old electric outlet that has no port for ground. The only way to put the grounded plug into the outlet is to get an adapter, or cut off the ground. With a drone, if you cut off the ground, active script is broken and cannot work. If you try to use an adapter (override preset code of the chip) the extra information is isolated automatically because of pre programmed parameters and the drone won’t start, much less get off the ground. Once telemetry is programmed and locked/targeted there are only specified functions that can effect alter it, and it has to be done from the source, which is the tech overseeing it’s operation.

      Report Post » The10thAmendment  
    • The10thAmendment
      Posted on October 7, 2011 at 4:44pm

      @ Blackhawk1
      Posted on October 7, 2011 at 4:27pm

      Look for the Tech that joined after 9/11 with the last name of Mohammed.
      ————————————————————————————————————————————————–
      That made me laugh. Well played! We had to go to an undisclosed area along the Mexican Border because a drone had “malfunctioned”. When we arrived the drone was of course in millions of tiny little pieces. They tried to blame us for faulty hardware. The drives are virtually indestructible and in 2 minutes we open sourced where the fault began. Some genius, we’ll call him Robocop thought he was computer literate because he had some classes and wanted to alter telemetry with his knowledge. The script is self isolating and showed exactly what Robocop had done, and how he had attempted to make the drone dance to his beat. In his attempts to alter command prompts was secured his IP address and source computer name. He’s no longer Robocop.

      Report Post » The10thAmendment  
    • TH30PH1LUS
      Posted on October 7, 2011 at 4:50pm

      I have seen these up close. Amazing technology that has saved thousands of lives. If a saboteur is able to “watch” our missions from within…

      Report Post » TH30PH1LUS  
    • The10thAmendment
      Posted on October 7, 2011 at 5:28pm

      @ TH30PH1LUS
      Posted on October 7, 2011 at 4:50pm

      I have seen these up close. Amazing technology that has saved thousands of lives. If a saboteur is able to “watch” our missions from within…
      ———————————————————————————————————————————————–
      They are pretty amazing. We’ve worked with a few different Countries deploying them, including Israel, South Africa, Great Britain and to a degree NATO (though not as much as people would think). What we know is that it would take an active element from with-in the Military structure. The charge for that would be treason, and the death penalty would be used.

      Report Post » The10thAmendment  
    • joe1234
      Posted on October 7, 2011 at 6:20pm

      10th…interesting…

      as far as the death penalty….true, unless the perp was a muslim or a black panther….

      Report Post » joe1234  
    • Snowleopard {gallery of cat folks}
      Posted on October 7, 2011 at 6:53pm

      @10th — thank you for the clarification on the matter; not having enough personal, hands on hard experence at times is frustrating. Yet it is good to hear on the matter, thanks again.

      Report Post » Snowleopard {gallery of cat folks}  
  • randy
    Posted on October 7, 2011 at 3:49pm

    “We keep wiping it off, and it keeps coming back,”

    Well, I guess you are not completely wiping it off…..

    That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.

    The Possibility? My Guess? You can be sure data has been transmitted!

    How about you ban USB thumb drives and MAYBE, just maybe you should be looking for another Bradley Manning… or someone in the OBAMA administration for planting the keylogger.

    Report Post » randy  
  • Annie Fields
    Posted on October 7, 2011 at 3:48pm

    I wonder if this is related to the threat to take down the NYSE on Monday…

    http://www.anniefields.com/blog

    PLEASE SEND HERMAN CAIN A CHECK! WHATEVER YOU CAN AFFORD. The link to Herman’s site to do it is at my blog.

    Report Post » Annie Fields  
    • Salamander
      Posted on October 10, 2011 at 12:28pm

      Anniefields–I saw/met Herman Cain this past Saturday and he is as real as they get! He’d be a great President!!! One comment really stuck with me “WE CAN OUTVOTE THE STUPID ONES!” He won’t automatically get the black vote, and he won‘t automatically get the ’reparation’ white vote–but he WILL get the INTELLIGENT vote, regardless of ethnic persuasion!!!

      Report Post »  
  • Locked
    Posted on October 7, 2011 at 3:46pm

    Now see, this has a lot more merit for freaking out than thinking facebook is tracking your internet surfing. If they’re keylogging, they could potentially have access to the drones at any time.

    Or maybe it’s just some Chinese folks trying to hack World of Warcraft accounts. Now that would be hilarious irony.

    Report Post »  
    • Blackhawk1
      Posted on October 7, 2011 at 4:31pm

      Maybe it’s just some Chinese folks trying to hack World of Warcraft accounts

      With any luck they will lock in on some of the Occupy Wall Street folks and save some taxpayer dollars in clean up costs.

      Report Post » Blackhawk1  
  • progressiveslayer
    Posted on October 7, 2011 at 3:46pm

    This is bad and they obviously had a breech somewhere along the line,hope they get it resolved quickly.

    Report Post » progressiveslayer  
  • GWillie
    Posted on October 7, 2011 at 3:45pm

    Let me guess “Made in China”

    Report Post » GWillie  
  • De minimus
    Posted on October 7, 2011 at 3:45pm

    GEEE….

    I wonder if it’s Chinese or Russiam…?

    Report Post » De minimus  
  • dirthead1986
    Posted on October 7, 2011 at 3:44pm

    We kill so many innocent civillians with these predator drones it should be a war crime. I’ve been to Iraq and it is hard to tell who the bad guys are on the ground.

    Report Post »  
    • randy
      Posted on October 7, 2011 at 3:51pm

      If I Was in Iraq, I’d tag you as one of the bad guys

      Report Post » randy  
    • Charbet
      Posted on October 7, 2011 at 4:00pm

      War is hell…

      Report Post » Charbet  
    • CharlesMartel
      Posted on October 8, 2011 at 11:25am

      @dirthead1986 – Did you know that claiming unsubstantiated war crimes meets the criteria of “providing aid and comfort” and having knowledge of specific war crimes and not reporting them is also a war crime (accomplice after the fact)?

      Report Post » CharlesMartel  
    • georgeohwell
      Posted on October 8, 2011 at 11:39am

      Careful. You can go to prison now under the Stolen Valor Act. It was passed by congress largely because of lying reprobates on the internet who claim to have witnessed “war crimes” in war zones while at the same time defaming our military. That’s a felony.

      Report Post »  
    • zman173rd
      Posted on October 8, 2011 at 12:01pm

      Hey Dirthhead 1986, Charlie has a VERY good point. Take an Obama or get off the pot.
      “@dirthead1986 – Did you know that claiming unsubstantiated war crimes meets the criteria of “providing aid and comfort” and having knowledge of specific war crimes and not reporting them is also a war crime (accomplice after the fact)?” C’mon, Let’s hear it. Make an Anonymous call to a newspaper and become Anonyfamous. Or tell us on the Blaze, or shut your lyin lass up.

      Report Post » zman173rd  
    • Salamander
      Posted on October 10, 2011 at 12:37pm

      I’m sorry, but if you‘re an ’innocent civillian‘ and you do nothing to get the ’bad guys’ out of your neighborhood, then you are NOT an innocent civillian, but a bad guy! Don‘t you think the Israeli’s should be able to respond to a rocket attack, by immediately blanketing the launch site with reprisal rounds? If the ‘innocent civillians’ living in that neighborhood aren‘t motivated enough to attack ’their own’ for setting up in their backyards, or smart enough to leave at the first sign of infestation, then they deserve to suffer the counter-attack! Life’s tough–but it wouldn’t be if people behaved civilly to one another! Harbor a terrorist: you are a terrorist! Harbor a combatant: you are a combatant! Each and every one of those IEM’s (Improvised explosive missiles) cost something! And the bozos that are firing them aren’t at work making money! So, where does the money come from? Where do the explosives come from? Maybe EVERY explosive manufacturer ought to include ‘batch tags’ in their product, so it can be traced from manufacture to boom! If it can’t be traced, then it would be easier to take out the uncooperative manufacturers (even ammonium nitrate, fertilizer, can be so tagged–to catch the enterprising amateur bomb maker)!

      Report Post »  
  • Netsurfer2
    Posted on October 7, 2011 at 3:44pm

    Welcome to the new era of technology combat! It could be the Chinese, Russians or even Muslim countries! Time to change gears and track everything everyone does alone the way in our military!

    Report Post » Netsurfer2  
    • Cheetosareus
      Posted on October 8, 2011 at 11:46am

      Expecially in the Pentagon. Too many of them support Obama and I question whether they are loyal to America and the Constitution first.

      Report Post »  
  • poverty.sucks
    Posted on October 7, 2011 at 3:40pm

    United States of America is infected with Obamaitis, it won’t go away.

    Report Post » poverty.sucks  

Sign In To Post Comments! Sign In