Not fake. Absolutely a real alert, it was just called off about 45 seconds after they started the engines. But this is how they respond – as soon as NORAD sounds the alarm, they rush to the jets and start ‘em up.
This appears to be a drill.
The wheel chocks would have been pulled before the engines start so ground crew would note have to approach the running jet. In addition some those red ribbons would have been pulled off before moving and others in the arming area.
There should have been a crewman assisting to strap in the pilot who was too slow to get his helmet on and the canopy down.
I am also surprised not to see the pilot wearing a G-suit or full gear.
It was nice show
 September 5, 2014 at 1:20pm
As noted in the story, and in the interview, there are several other ACA units that have the same mission. He mentioned the Capitol so many times because it happens to fall under this unit’s area of responsibility. But there are more than a dozen units like this across the country.
Yes, I understood there to be several ACA units around the nation, but that is still a lot of territory to cover, even for "more than a dozen units". Perhaps each of these units covers more expansive territories than what I am thinking. On a positive note, it's good to learn about this unit, and I am very grateful for the skill of these brave men and women willing to risk their lives for our safety. Thanks for your reporting on this. It was a very good article.
 September 5, 2014 at 1:18pm
I don’t understand why “girly” is a negative descriptor here? I’m a girl, and I wouldn’t hesitate shooting down an enemy combatant if was going to save lives.
I live 10 miles south of this. I would have said a gust of wind blew some foam into the air. The sensationalism in your headlines makes the site look like it's run by a bunch of teenage girls. Everything is surprising, amazing, shocking, freaky, and so on... You are writing headlines that belong on the News rags at the grocery store checkout. NO wonder, since your editing is non-existent, and spelling and grammar are optional for publishing a story, I'm not surprised, just disappointed in the lack of professionalism.
How about... " Watch as foam fills a hangar and runway full of Blackhawk Helicopters after an alarm is accidentally set off."
I guess since "foamnado" appears on other websites reporting this story 2 days ago, you could get a pass. I thought it was your own concoction, and didn't realize it was just a copy and paste deal.
"foam devil" (akin to "dirt devil") would work, wouldn't it?
Wow, a thumbs down for an honest critique.... that's pretty thin skin for someone who wants to be a writer.
By the way, I get paid for the stuff I write for work.... The Blaze and a couple other websites are just mental playgrounds used to redirect myself.
 August 22, 2014 at 8:33am
Bearway — you have to look at it both ways, the agents monitoring travelers with this technology also need to know the flaws so they can be extra vigilant. And letting the general public know about the flaws allows for informed decisions when they are voting to fund or defund these programs. Thanks for reading!
 August 7, 2014 at 7:08am
D8ball, you did see that note in the story, right? I’m not sure I understand your comment. Here is the paragraph “The European/Rosetta mission is different from NASA’s Deep Impact spacecraft, which fired a projectile into a comet in 2005 to study the resulting plume of matter. NASA also landed a probe on an asteroid in 2001, but comets are much more volatile places because they constantly release dust and gas that can harm a spacecraft.”
 August 7, 2014 at 7:05am
Annonymous, to be clear, the article doesn’t claim that. The European Space Agency does, which is why I added it. Thanks for reading!
 August 4, 2014 at 2:04pm
I just love the idea of having one of these for when the grid goes down. Or in the winter when the power goes out for a few days. Ya never know :)
July 29, 2014 at 12:01am
Shasta, did you the part of my article where I say that? And link our stories about it?
 July 3, 2014 at 10:23pm
MsMonsoon – I disagree. I love this video. Because I made it :) So there.
 July 1, 2014 at 11:28am
I’ll see what I can do about a follow-up article :) But I kind of agree with GrumpynGrumpier.
Hello Elizabeth - I can't think of any but i was wondering if you could run this by the Blaze Tech team
On a long conversation ( or debate ) thread i was wondering if a " get new comments " tab could be added to all 1st level users, ( only ) ... I find my self scrolling back to get them or refreshing the page.
Just a thought ........
How about a way to fry NSA's computers when they spy on us???
and a comment edit option ...LOL
Are there any tech companies currently contracted with the government that produce bio-, or GPS-, "chips"?
I am really interested in Graphene and if it will do for us in the 21st century what Plastic did in the 20th. Secure email, like Proton mail, is it crap or not. My 2 cents.
My family is getting ready to go to Disney World this summer. I would love to get some insight into Disneyworld's new electronic wrist band system (vs privacy).
 June 26, 2014 at 1:28pm
The technology cloaks your IP address and makes it seem as if someone else from another country is surfing the pages, instead of you. I’ll update the story to explain that better!
It may cloak your IP address but it does not change your MAC address from what I understand. Even if you use VPNs and Tor simultaneously, it's easy to track your packets if you keep track of the MAC address associated with all these IPs.
Furthermore, that packet has to leave an ISP and reach your computer at some point. All you need is a man-in-the-middle set up and you can cloak all you want but it's easy to see what you're doing.
Exactly, torproject.org and tails.baum.org has the info. It's called tor for the onion router because onions have layers. Like an ogre (sorry couldnt resist) the data is encrypted between each layer using keys provided by the previous node. No single noDe can decrypt except the end ones. Mac addresses are spoofed as well. It's not100% but it has its uses . The wiki has lots of info. http://en.m.wikipedia.org/wiki/Tor_(anonymity_network)
ICLOAK does indeed spoof your MAC address every time at boot to an address that is not your actual computer's automatically. ICLOAK does use TOR and the TOR Browser Bundle is infact the only supported browser in the OS. All packets are forced through the TOR Network with no way to send traffic to anywhere else unless you are able to find a Kernel level exploit in ICLOAK, which is a very difficult thing to do.
A man in the middle attack would not be possible at any point if you are using SSL (also known as https:// or the lock icon on browsers) or any other form of End to End encryption. If you are not using SSL it would only be possible to do a man in the middle attack from a Tor exit node.
June 26, 2014 at 1:26pm
Chevelle – your comment shows your have a basic working knowledge of operating systems, and most people don’t even have that.
 May 6, 2014 at 8:22am
That’s what I was thinking Chronic! I want to bring a kite with a GoPro to Yosemite now :)
May 2, 2014 at 8:58am
Hey there – it was my fault, I linked to the wrong video at first – but the right one is up there now. Thanks!
And were the other runners weirded out by seeing the Glass?
“Most people didn’t seem to notice until they quite close to me – then I’d get really enthusiastic comments from other tech-minded folks,” he said.
I rest my case.
April 10, 2014 at 9:31am
Just so you know, none of my stories are ever advertisements. If you read my bio, you’ll see that I’ve had a chance to work closely with these aerobatic champions and I love all things fast. So when I’m filing a story in the entertainment section, just enjoy it! Thanks for reading!