Air Force Drones Infected With Unknown Computer Virus That Won’t Go Away
- Posted on October 7, 2011 at 3:35pm by
Liz Klimas
- Print »
- Email »
File this under “disconcerting.”
No matter what military computer technicians do, they can’t seem to remove a virus from the computer systems that control military drones.
The virus infecting ground control stations at Creech Air Force Base in Nevada was identified by military’s Host-Based Security System two weeks ago. It is reported the virus is tracking everything the drones do as they fly over areas like Afghanistan.
Wired’s Danger Room released an exclusive report:
“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”
Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.
[...]
The Air Force declined to comment directly on the virus. “We generally do not discuss specific vulnerabilities, threats, or responses to our computer networks, since that helps people looking to exploit or attack our systems to refine their approach,” says Lt. Col. Tadd Sholtis, a spokesman for Air Combat Command, which oversees the drones and all other Air Force tactical aircraft. “We invest a lot in protecting and monitoring our systems to counter threats and ensure security, which includes a comprehensive response to viruses, worms, and other malware we discover.”
Even still, the virus has not grounded any of the drones from continuing missions and no incidents have been reported of information being lost or sent to other sources, although experts are unsure how far it has spread. Wired goes on to report that drones have been known for security flaws:
Many Reapers and Predators don’t encrypt the video they transmit to American troops on the ground. In the summer of 2009, U.S. forces discovered “days and days and hours and hours” of the drone footage on the laptops of Iraqi insurgents. A $26 piece of software allowed the militants to capture the video.
The virus, sources believe, were spread through removable drives, the use of which has became restricted by the military after the agent.btz worm was introduced into defense computers with this method. So far, technicians have had to completely erase the hard drives of infected systems to remove the virus and painstakingly rebuild them from scratch.
The photo of the Predator drone in the post was updated from a previous image that was misidentified.






















Submitting your tip... please wait!
Comments (160)
Vapor Trail
Posted on October 7, 2011 at 5:18pmIts because they are using windows as the operating system. Same thing happened when the Russians upgraded their sub the Kursk to windows.
Transcript of Portions of the Kursk Log
Captain: Is the new fire control Windows OS installed yet Comrade?
Seaman: Almost Sir. We just need to finish filling out the
registration card.
Captain: Excellent. Soon we will be able to point and click our
enemies into oblivion. [evil laughter in background]
Seaman: Comrade Captain! It is booting! Look, it says ‘Preparing to
run Windows for the first time’. [long pause]
Seaman: Arrgh! Sir, it wants me to reboot again. That makes the 27th
time.
Captain: Hmmm. This is not encouraging. Go ahead and reboot again.
Seaman: Aye aye, Sir. [another long pause]
Report Post »Seaman: Captain, it is up again. It says it found new hardware . . .
. A CD-ROM drive and that it needs drivers.
Captain: Where are the drivers?
Seaman: On the CD-ROM.
Captain: You are joking, no?
Seaman: No Sir.
Captain: Reboot the damn thing again. I am starting not to like this
Windows. [another long pause]
Seaman: Sir! It is back! It says it found the Gorby2000 Torpedo and
is looking for the device drivers. Do we have a driver disk?
Captain: I do not think so.
Seaman: I will tell it to use the default drivers. [another long
pause]
Seaman: Crap. It wants to reboot again.
Captain: How many times are we going to reboot today? This is taking
forever. Our hull is going to rust ou
Vapor Trail
Posted on October 7, 2011 at 5:19pmCaptain: How many times are we going to reboot today? This is taking
Report Post »forever. Our hull is going to rust out before this works. [another
long pause]
Seaman: Sir! It is up and this time it is not asking for anything!
Captain: Really? No device drivers? No registration cards? No user
profiles?
Seaman: No Sir. I think it is ready.
Captain: Good work comrade. Now click on the fire control icon and
let us see how this works.
Seaman: Clicking now, Sir. [another long pause]
Captain: Why does the fire control screen have a dancing paper clip on
it?
Seaman: I have no idea Sir.
Captain: Hmmm, well try clicking on the menu.
Seaman: Aye aye, Sir. Let us see; Open E-mail, Spam a friend, Mail a
Virus, Fire a Torpedo . . . .
Captain: We will spam a friend later. L et us fire a torpedo.
Seaman: Aye aye, Sir. [another long pause]
Seaman: It is asking us to load the torpedo and to click when ready.
Captain: Torpedo room, load a torpedo in tube number 1!
Intercom: This is the Torpedo room. The torpedo is loaded Sir.
Captain: Click on the continue button.
Seaman: Aye aye, Sir. [another long pause]
Seaman: It is asking for a target Sir.
Captain: Hmmm, target the Rainbow Warrior.
Seaman: Aye aye, Sir. Damn! It says the torpedo is low on ink.
Captain: Click ignore. W e will get some ink when we return to base.
Seaman: Aye aye, Sir. We are ready to fire.
Captain: Very good. You may fire when ready comrade.
Seaman: Firing torpedo,
Vapor Trail
Posted on October 7, 2011 at 5:40pmWell sorry last part refuses to post.
Report Post »zman173rd
Posted on October 8, 2011 at 11:34am“Dancing paperclip” FUNNY!!!! LOL’d through the whole thing.
Report Post »Cheetosareus
Posted on October 8, 2011 at 11:39amNOooooooooo!!!!!!
Report Post »Falsegods
Posted on October 8, 2011 at 4:13pmInfected chip bought by congress’ lowest enemy bidder.
Report Post »Gov./congress IQ is a threat to every son in our military.
Get your kids out of our military,
they are being set up by this backward congress/government .
10mmGlockuser
Posted on October 8, 2011 at 11:03pmLinux……..problem solved
Report Post »tharpdevenport
Posted on October 9, 2011 at 5:31pm[long pauses]
Report Post »Captain: “Why aren’t we firing?”
Seaman: “I do not know, sir.”
[pause]
Captain: “Now what is it, comrad?”
Seaman: ” ‘Windows has encountered a fatal error and needs to shut down’ .”
Captain: “Blast! When it reboots, target this … Bill Gates…”
PoliticalJunkieToo
Posted on October 7, 2011 at 5:13pmOur founding fathers would be appalled that we are in debt to an enemy communist country and we have a Marxist in the White House.
This virus reeks of China’s doing or maybe Obama koodies.
Report Post »Vital
Posted on October 8, 2011 at 3:11amI think it’s Obama koodies
Report Post »Cheetosareus
Posted on October 8, 2011 at 11:43amI vote China. They put a lot of stuff in the thumb drives they import. Maybe somebody took something from home and used it on the system not realizing they were infected.
Report Post »liberalescheisskopf
Posted on October 8, 2011 at 10:26pmYou likee egg-row?
Report Post »BornandBredintheUSA
Posted on October 7, 2011 at 5:12pmIt seems as though I read something recently that said that the Air Force had hired a Muslim company as an outside contractor to work on extremely sensitive projects. If that is the case and this is what is happening now, then maybe they need to rethink who they hire in the future.
Report Post »The-Monk
Posted on October 7, 2011 at 8:41pmIt’s probably the old “USB Flash Drive in the parking lot” trick. Works every time… You guys DO know what the old “USB Flash Drive in the parking lot” trick is I hope?
Report Post »jb.kibs
Posted on October 7, 2011 at 9:05pmyes i do. ;P
Report Post »HumbleMan
Posted on October 8, 2011 at 5:49amIs that like the banana in the tail-pipe trick?
Or do you mean leaving a viral USB stick on the ground outside a facility, so that someone picks-up and then tries to see what’s on it, thereby infecting their own network. Yes … there are plenty of idiots who would try without sterilizing it first. Plenty of idiots … sadly.
Report Post »stringfellow hawk
Posted on October 7, 2011 at 5:11pmJust call me John Conner but this sounds a bit like the plot from the Terminator movies!
Report Post »TheGreyPiper
Posted on October 7, 2011 at 10:37pm“Skynet IS the virus!”
Report Post »Big Book Harry
Posted on October 9, 2011 at 1:33amWasn’t that Independance Day ?
Report Post »AnAmerican111
Posted on October 7, 2011 at 4:53pm“Bush’s Fault”!…………
As heard on an another upcoming pathetic OBUMA speech
Report Post »Anonymous T. Irrelevant
Posted on October 7, 2011 at 4:52pmBring in Kevin Mitnick, of whom the Blaze reported on earlier, and let him find it.
Report Post »The-Monk
Posted on October 8, 2011 at 12:26amBring me in. If I find it and kill it it’s $20K. If I don‘t it’s $0. I’m pretty good at finding and killing stuff like this. What do they have to lose? I suggest an F&R of every system. I’m willing to try it. After all I‘m unemployed and just sitting around looking at jobs that won’t hire me.
Report Post »MDSBigPaPa
Posted on October 8, 2011 at 3:56pmI cannot believe Mitnick is a “white hat” at one time, many-many years ago he had total control of the power grid from Las Vegas to LA – all UNIX based systems. He used social engineering, dumpster diving,… to gain access to some of the most sensitive Military systems we have. Read The Cuckoo’s Egg by Clifford Stoll and see just how bad this guy really was. I still don’t trust him.
I think it’s time for an OS change – Dump Windows. There are Operating Systems that have never been cracked AND they’ve been ported into the Windows-based hardware. This is not the place for OS wars so I’m not posting my preference but, I agree, it’s time for a change.
Report Post »jimdgriz
Posted on October 7, 2011 at 4:45pmSimple but awkward answer:
Shut down ALL the computers on the secure network, Wipe ‘em, or better yet destroy their hard drives, and reload software, maps, etc. from scratch (after checking those files/discs are clean), then re-enable the network – after doing a similar format and reload of the drones too.
There can be no tolerating a virus in a secure network, especially one that controls live fire weapons. One virus can load another from a remote source…
Report Post »Can you imagine a drone being fed a US facility as a target and firing on it?
dalebrendan
Posted on October 7, 2011 at 4:58pmThe hard-drive isn’t the only piece of equipment that stores data, especially in incredibly sophisticated equipment like this.
Report Post »lel2007
Posted on October 7, 2011 at 5:06pmNope. The only answer is to call in NCIS Special Agent McGee. I’m sure if the USAF asks really really nice, NCIS would loan him for a short time.
Report Post »WeeDontNeedNoSteeeenkinBadges
Posted on October 7, 2011 at 5:07pmThis bandito can imagine even better …
… like an illegal alien becomes President … no one in Congress or the Judiciary challenges it … he’s a marxist and Progressives (communists) reveal themselves in all parts of government and unions and schools and [fill in the blank] … they’re trying to spend America into collapse … they admire infamous communist leaders … they praise unrest and try to provoke more … and now they have control of our weapons of mass destruction.
Wake up, Ne̶o̶ America . . .
Report Post »The M̶a̶t̶r̶i̶x̶ New World Order has you . .
KevINtampa
Posted on October 7, 2011 at 5:25pmOr worse, an entire wing…attacking a foreign country neighboring Afganistan:
General “Buck” Turgidson: Mr. President, about, uh, 35 minutes ago, General Jack Ripper, the commanding general of, uh, Burpelson Air Force Base, issued an order to the 34 B-52′s of his Wing, which were airborne at the time as part of a special exercise we were holding called Operation Drop-Kick. Now, it appears that the order called for the planes to, uh, attack their targets inside Russia. The, uh, planes are fully armed with nuclear weapons with an average load of, um, 40 megatons each. Now, the central display of Russia will indicate the position of the planes. The triangles are their primary targets; the squares are their secondary targets. The aircraft will begin penetrating Russian radar cover within, uh, 25 minutes.
Report Post »President Merkin Muffley: General Turgidson, I find this very difficult to understand. I was under the impression that I was the only one in authority to order the use of nuclear weapons.
General “Buck” Turgidson: That’s right, sir, you are the only person authorized to do so. And although I, uh, hate to judge before all the facts are in, it’s beginning to look like, uh, General Ripper exceeded his authority.
WeeDontNeedNoSteeeenkinBadges
Posted on October 7, 2011 at 6:53pmDR. STRANGELOVE: “Mr President. I have a plan.” [amazed as he stands up from his wheelchair] “Mein Führer! I can walk!”
Report Post »[21 nuclear-mega-ton salute]
1TrueOne55
Posted on October 8, 2011 at 2:17pmI bet that the virus components are stored across many chips on the system board and on the servers that send information to these consoles that control the drones. You can see where this is going. It could also be that spam bots on the Internet are the real problem and that your or my computer (NOT Running UBUNTU LINUX) could be storing the code off site and when ever they clean the drives and then bring them back online that a server some where needs a specific connection to the drone and that is how it reinfects.
Ever since Micro$haft opened its code to scrutiny by both Russian and Chinese Security Agencies I moved away from the OS completely and recommend we all do that. We could reduce the Spambot community by at least a few million.
Report Post »Salamander
Posted on October 10, 2011 at 12:17pmWhatever happened to ADA? Why Windows? Microsoft would have a bonanza creating a special Defense Systems division, developing a new operating system and isolating it from commercial systems! Rember the old grey phone/black phone protocol? Nobody speaks on a black phone when a grey phone is off-hook!
Report Post »capitalismrocks
Posted on October 7, 2011 at 4:41pmThe control system computers should NOT be connected to any outside connections and should not have any form of media ports (not USB ports for thumbdrives or anything else) — these should be isolated systems, there is ZERO reason for them not to be. There logs and video data should all be OUTBOUND to a server farm to record the drone data – WRITE OUT only…
I fail to see what is so difficult for the MILITARY to understand about its computer systems – what the traitorous moron with his lady gaga copying of files to give to wikileaks hasn’t taught anyone in the military anything?!?!?
Amateur hour!!!
Report Post »jimdgriz
Posted on October 7, 2011 at 4:55pmAny internet connection is too much. Any “write only” connection to the outside is too much. Bringing any disk, thumb drive, etc. into (or out of) a vault (where I assume these computers reside), should require a careful scan to verify the benign content of all data, including boot sectors, and executable must never be allowed in unless fully checked….
They KNOW this.
These are VERY OLD rules.
Amateur hour indeed.
Somebody likely took a shortcut, saved an hour for an “urgent” mission, and now they’re paying thousands of man hours for it.
But I wouldn‘t fly anything that isn’t guaranteed clean – not with live weapons on it.
Report Post »The-Monk
Posted on October 7, 2011 at 9:02pm@jimdgriz
Report Post »Like the movie, “Real Genius”?
It’s probably the old “USB Flash Drive in the parking lot” trick. Works every time… Or they are allowed to go online during their lunch breaks to check their e-mail or SHOP ONLINE! I’m wondering if they are using AVG Free to save a few bucks? That’s probably a new White House/DOJ mandate.
CharlesMartel
Posted on October 8, 2011 at 10:59amDuring the Clinton Administration, General McPeek thought we had too many computer officers and very few of them got promotions and the rest were forced to separate or retire. “Out-sourcing” was a cool buzzword!
Report Post »Falsegods
Posted on October 8, 2011 at 3:56pmThe military is beyond this IQ. It is no accident.
Report Post »lukerw
Posted on October 7, 2011 at 4:18pmCheck the parts… made in China! Dumb DOD!
Report Post »motonutt
Posted on October 7, 2011 at 4:23pmSmells like chinese. It would be unfortunate if one of our drones lost control and went over a blew one of their warships off of Taiwan out of the water…..
Report Post »Chuck Stein
Posted on October 7, 2011 at 4:33pmMy thoughts EXACTLY
Report Post »BetterDays
Posted on October 7, 2011 at 5:00pmYou are correct. Due to an insanely regulated bidding process within the DOD many components that are built into our military systems are of Chineese origon. I’m not sue how it works, but it’s apparent that this is a very serious issue.
Report Post »Virus’s and key loggers do not have to be software in origin, they can be plugged into RAM, or iproms, and other boot type firmware by the factory. In Chineese products, more than likely at Uncle Mao’s armed coercion.
The-Monk
Posted on October 7, 2011 at 9:16pm@BetterDays
Report Post »Don’t you mean EPROM? Electrically Programmable Read Only Memory. I haven’t heard of iprom.
NEAF
Posted on October 7, 2011 at 4:09pmI guess they are going to accused the virus by attacking Alakie.
Report Post »teamarcheson
Posted on October 7, 2011 at 4:20pmChina!
This is what happens when you have your software written and the parts for your plane made in China. The US military employs many software and hardware engineers who are not American. This is a acceptable price to pay for Affirmative Action and Diversity. The USAF is lucky the planes were not turned against our own troops or have they?
Report Post »felix
Posted on October 7, 2011 at 4:09pmour dear dictator sataro’s work , not doubt !
Report Post »six6six
Posted on October 7, 2011 at 4:30pmNo, I think we can blame it on HAL.
Report Post »felix
Posted on October 7, 2011 at 5:29pmsame thing !
Report Post »V-MAN MACE
Posted on October 7, 2011 at 4:05pmTold ya so.
Report Post »Lateris
Posted on October 7, 2011 at 4:01pmSteps to take:
Report Post »1.) format hard drive
2.) format chips
3.) replace hardware and destroy old hardware
4.) stop training jarheads that come and go when it comes to IT
5.) stop using open source
ChiefH
Posted on October 7, 2011 at 7:31pmYour last item (#5) is backwards. Stop using proprietary software and START using Open Source software. An open source operating system would not have allowed the virus to get in to infect the AF drone control systems.
Report Post »The-Monk
Posted on October 8, 2011 at 12:36am@ChiefH
Report Post »What part of “open source” do you not understand? Open source means that everyone and anyone has full access to the code. You must be from China or the White House and I don’t see the difference.
SacredHonor1776
Posted on October 7, 2011 at 3:57pmInfected by Skynet… Soon it will turn on all mankind, :p.
Report Post »Snowleopard {gallery of cat folks}
Posted on October 7, 2011 at 4:04pmSo I guess one of these mornings I will turn on my notebook and hear it say “Good morning dave…”
Report Post »Mustangdave
Posted on October 7, 2011 at 4:22pmCareful…there’s a T-1000 looking for you and your reprogrammed T-100
Report Post »WeeDontNeedNoSteeeenkinBadges
Posted on October 7, 2011 at 4:49pmKnock, knock, Neo . . .
Report Post »BetterDays
Posted on October 7, 2011 at 5:02pmWhy do you speak against the collective…..bleep…………bleep………facial recognition engaged………..bleep…………
Report Post »biglipnagger
Posted on October 7, 2011 at 3:52pmLets’s sell more to the Saudis!
Turkey is getting a bunch next, right? Like the leader of NATO, who is going to invade Syria next, right?
And didnt one of these just kamikaze into a C-130 from the 107th Air Wing from Schenectady, NY while deployed in Afghanistan?
Nothing to see here…
Report Post »The10thAmendment
Posted on October 7, 2011 at 3:51pmLOL. I work directly on drone projects. The only way to infect a system is by intent. The onboard firewalls are designed to shut down logic applications with malicious intrusions, where the only commands that will enable are a return home. If they are having trouble with invasive scripts, they are there by the tech who directly worked on it/them.
Same thing with the navigation base. If the Military is allowing its techs to use removable drives, they are purely idiots, and designing disaster by choice.
Report Post »Snowleopard {gallery of cat folks}
Posted on October 7, 2011 at 4:03pmQuestion, since I know next to nothing about those kind of systems, is it hypothetically possible for a virus to be introduced into different parts of the program, say looking like fragments belonging to the source codes of the software or such, and even after being wiped when the virus is an intact unit, the fragments reassemble once again after key conditions are met? Say a rebooting of the system or such?
Report Post »OhioRifleman
Posted on October 7, 2011 at 4:17pm@ Snow:
MILITARY SIDE: Not sure, 10th will need to answer that.
CIVILIAN SIDE: Such viruses exist. They’re called Rootkits, and I deal with them at work on a regular basis. It is possible to get rid of them if you know what you are doing and have the right tools, but it is a painstaking process that usually eats up ~4 man-hours per infected machine.
Report Post »The10thAmendment
Posted on October 7, 2011 at 4:20pmIt’s possible, but only if the tech is the one doing it. He can write in script that can be used as a remote command and implement a multi headed worm. The system itself is continually monitoring (sweeping) to repair any broken chains, and eliminate excess. If a virus, or worm remains it’s because the tech is allowing it to remain. The fail safe can’t be prompted by even the best crackers. It’s got to be directly installed live and in person. When we benchmark chips, included in that is ensuring that the formatting is exactly as defined in manufacture with no excess. When it’s installed the only way to change the formatting is by direct application. That’s the way it works throughout the entire structure component by component.
If a drone malfunctions it either simply quite working, or a tech caused it. Even with the idea of remote access it requires a tech at the source. Drones really do only serve 1 master, the man at the controls.
Report Post »Blackhawk1
Posted on October 7, 2011 at 4:27pmLook for the Tech that joined after 9/11 with the last name of Mohammed.
Report Post »The10thAmendment
Posted on October 7, 2011 at 4:37pm@ Snowleopard.
I can further state without reserve that if a memory base onboard a drone is infected, it still cannot be prompted except through direct tampering, or replacing active chips. The chips have precise strings of gateways/codes that will only allow activation through source. Remote can only be through the Military side of satellites. The difference between public and private side use is rather dramatic, and it would be impossible to crack the private side without the source being easily traced.
A real simple example. You have an old electric outlet that has no port for ground. The only way to put the grounded plug into the outlet is to get an adapter, or cut off the ground. With a drone, if you cut off the ground, active script is broken and cannot work. If you try to use an adapter (override preset code of the chip) the extra information is isolated automatically because of pre programmed parameters and the drone won’t start, much less get off the ground. Once telemetry is programmed and locked/targeted there are only specified functions that can effect alter it, and it has to be done from the source, which is the tech overseeing it’s operation.
Report Post »The10thAmendment
Posted on October 7, 2011 at 4:44pm@ Blackhawk1
Posted on October 7, 2011 at 4:27pm
Look for the Tech that joined after 9/11 with the last name of Mohammed.
Report Post »————————————————————————————————————————————————–
That made me laugh. Well played! We had to go to an undisclosed area along the Mexican Border because a drone had “malfunctioned”. When we arrived the drone was of course in millions of tiny little pieces. They tried to blame us for faulty hardware. The drives are virtually indestructible and in 2 minutes we open sourced where the fault began. Some genius, we’ll call him Robocop thought he was computer literate because he had some classes and wanted to alter telemetry with his knowledge. The script is self isolating and showed exactly what Robocop had done, and how he had attempted to make the drone dance to his beat. In his attempts to alter command prompts was secured his IP address and source computer name. He’s no longer Robocop.
TH30PH1LUS
Posted on October 7, 2011 at 4:50pmI have seen these up close. Amazing technology that has saved thousands of lives. If a saboteur is able to “watch” our missions from within…
Report Post »The10thAmendment
Posted on October 7, 2011 at 5:28pm@ TH30PH1LUS
Posted on October 7, 2011 at 4:50pm
I have seen these up close. Amazing technology that has saved thousands of lives. If a saboteur is able to “watch” our missions from within…
Report Post »———————————————————————————————————————————————–
They are pretty amazing. We’ve worked with a few different Countries deploying them, including Israel, South Africa, Great Britain and to a degree NATO (though not as much as people would think). What we know is that it would take an active element from with-in the Military structure. The charge for that would be treason, and the death penalty would be used.
joe1234
Posted on October 7, 2011 at 6:20pm10th…interesting…
as far as the death penalty….true, unless the perp was a muslim or a black panther….
Report Post »Snowleopard {gallery of cat folks}
Posted on October 7, 2011 at 6:53pm@10th — thank you for the clarification on the matter; not having enough personal, hands on hard experence at times is frustrating. Yet it is good to hear on the matter, thanks again.
Report Post »randy
Posted on October 7, 2011 at 3:49pm“We keep wiping it off, and it keeps coming back,”
Well, I guess you are not completely wiping it off…..
That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.
The Possibility? My Guess? You can be sure data has been transmitted!
How about you ban USB thumb drives and MAYBE, just maybe you should be looking for another Bradley Manning… or someone in the OBAMA administration for planting the keylogger.
Report Post »Annie Fields
Posted on October 7, 2011 at 3:48pmI wonder if this is related to the threat to take down the NYSE on Monday…
http://www.anniefields.com/blog
PLEASE SEND HERMAN CAIN A CHECK! WHATEVER YOU CAN AFFORD. The link to Herman’s site to do it is at my blog.
Report Post »Salamander
Posted on October 10, 2011 at 12:28pmAnniefields–I saw/met Herman Cain this past Saturday and he is as real as they get! He’d be a great President!!! One comment really stuck with me “WE CAN OUTVOTE THE STUPID ONES!” He won’t automatically get the black vote, and he won‘t automatically get the ’reparation’ white vote–but he WILL get the INTELLIGENT vote, regardless of ethnic persuasion!!!
Report Post »Locked
Posted on October 7, 2011 at 3:46pmNow see, this has a lot more merit for freaking out than thinking facebook is tracking your internet surfing. If they’re keylogging, they could potentially have access to the drones at any time.
Or maybe it’s just some Chinese folks trying to hack World of Warcraft accounts. Now that would be hilarious irony.
Report Post »Blackhawk1
Posted on October 7, 2011 at 4:31pmMaybe it’s just some Chinese folks trying to hack World of Warcraft accounts
With any luck they will lock in on some of the Occupy Wall Street folks and save some taxpayer dollars in clean up costs.
Report Post »progressiveslayer
Posted on October 7, 2011 at 3:46pmThis is bad and they obviously had a breech somewhere along the line,hope they get it resolved quickly.
Report Post »GWillie
Posted on October 7, 2011 at 3:45pmLet me guess “Made in China”
Report Post »De minimus
Posted on October 7, 2011 at 3:45pmGEEE….
I wonder if it’s Chinese or Russiam…?
Report Post »dirthead1986
Posted on October 7, 2011 at 3:44pmWe kill so many innocent civillians with these predator drones it should be a war crime. I’ve been to Iraq and it is hard to tell who the bad guys are on the ground.
Report Post »randy
Posted on October 7, 2011 at 3:51pmIf I Was in Iraq, I’d tag you as one of the bad guys
Report Post »Charbet
Posted on October 7, 2011 at 4:00pmWar is hell…
Report Post »CharlesMartel
Posted on October 8, 2011 at 11:25am@dirthead1986 – Did you know that claiming unsubstantiated war crimes meets the criteria of “providing aid and comfort” and having knowledge of specific war crimes and not reporting them is also a war crime (accomplice after the fact)?
Report Post »georgeohwell
Posted on October 8, 2011 at 11:39amCareful. You can go to prison now under the Stolen Valor Act. It was passed by congress largely because of lying reprobates on the internet who claim to have witnessed “war crimes” in war zones while at the same time defaming our military. That’s a felony.
Report Post »zman173rd
Posted on October 8, 2011 at 12:01pmHey Dirthhead 1986, Charlie has a VERY good point. Take an Obama or get off the pot.
Report Post »“@dirthead1986 – Did you know that claiming unsubstantiated war crimes meets the criteria of “providing aid and comfort” and having knowledge of specific war crimes and not reporting them is also a war crime (accomplice after the fact)?” C’mon, Let’s hear it. Make an Anonymous call to a newspaper and become Anonyfamous. Or tell us on the Blaze, or shut your lyin lass up.
Salamander
Posted on October 10, 2011 at 12:37pmI’m sorry, but if you‘re an ’innocent civillian‘ and you do nothing to get the ’bad guys’ out of your neighborhood, then you are NOT an innocent civillian, but a bad guy! Don‘t you think the Israeli’s should be able to respond to a rocket attack, by immediately blanketing the launch site with reprisal rounds? If the ‘innocent civillians’ living in that neighborhood aren‘t motivated enough to attack ’their own’ for setting up in their backyards, or smart enough to leave at the first sign of infestation, then they deserve to suffer the counter-attack! Life’s tough–but it wouldn’t be if people behaved civilly to one another! Harbor a terrorist: you are a terrorist! Harbor a combatant: you are a combatant! Each and every one of those IEM’s (Improvised explosive missiles) cost something! And the bozos that are firing them aren’t at work making money! So, where does the money come from? Where do the explosives come from? Maybe EVERY explosive manufacturer ought to include ‘batch tags’ in their product, so it can be traced from manufacture to boom! If it can’t be traced, then it would be easier to take out the uncooperative manufacturers (even ammonium nitrate, fertilizer, can be so tagged–to catch the enterprising amateur bomb maker)!
Report Post »Netsurfer2
Posted on October 7, 2011 at 3:44pmWelcome to the new era of technology combat! It could be the Chinese, Russians or even Muslim countries! Time to change gears and track everything everyone does alone the way in our military!
Report Post »Cheetosareus
Posted on October 8, 2011 at 11:46amExpecially in the Pentagon. Too many of them support Obama and I question whether they are loyal to America and the Constitution first.
Report Post »poverty.sucks
Posted on October 7, 2011 at 3:40pmUnited States of America is infected with Obamaitis, it won’t go away.
Report Post »UlyssesP
Posted on October 7, 2011 at 4:24pmTake one Cain and call me in the morning.
Report Post »