Go Back   Professional Soldiers ® > UWOA > Terrorism

Reply
 
Thread Tools Display Modes
Old 04-09-2009, 09:52   #16
Kyobanim
Moderator
 
Kyobanim's Avatar
 
Join Date: Feb 2004
Location: Central Florida
Posts: 3,045
Quote:
We wrote "BOOM" with a red marker on the bottom of each of the charges
That's priceless!
__________________
"Are you listening or just waiting to talk?"


Light travels faster than sound. This is why some people appear bright until you hear them speak.

"Fate rarely calls upon us at a moment of our choosing."
Optimus Prime
Kyobanim is offline   Reply With Quote
Old 04-09-2009, 11:23   #17
Team Sergeant
Quiet Professional
 
Team Sergeant's Avatar
 
Join Date: Jan 2004
Location: Phoenix, AZ
Posts: 20,929
The only "up" side to this report is that the "attacks" were external. Had then been "internal" I would venture to say some more than a tea-party was afoot.
Then again I believe about 25% of the news I read unless it's verified by multiple sources, then I raise it to 50% believable.

I don't see war with any of the superpowers anytime soon. China is making trillions off the US economy and the last thing Russia wants is another conflict.

That said one of the quickest ways to destabilize a reigning government is to show it's people it has no control of a given situation. Shutting off the power to a major city would do just that......

Want to see some "change" shut off the power to LA or NYC for a week......

Makes me wonder who is really hacking our power grid...

Team Sergeant
__________________
"The Spartans do not ask how many are the enemy, but where they are."
Team Sergeant is offline   Reply With Quote
Old 04-09-2009, 19:50   #18
Richard
Quiet Professional
 
Richard's Avatar
 
Join Date: Aug 2004
Location: NorCal
Posts: 15,370
More to add to this cauldron of e-fire...

Richard's $.02


Cyber spying a threat, and everyone is in on it
AP News, 09 Apr 2009

Ghost hackers infiltrating the computers of Tibetan exiles and the U.S. electric grid have pulled the curtain back on 21st-century espionage as nefarious as anything from the Cold War _ and far more difficult to stop.

Nowadays, a hacker with a high-speed Internet connection, knowledge of computer security and some luck can pilfer information thought to be safely ensconced in a digital locker. And the threat is growing, with countries _ including the U.S. _ pointing fingers at each other even as they ramp up their own cyber espionage.

The Pentagon this week said it spent more than $100 million in the last six months responding to damage from cyber attacks and other computer network problems. And the White House is wrapping up a 60-day review of how the government can better use technology to protect everything from the nation's electrical grid and stock markets to tax data, airline flight systems and nuclear launch codes.

In 2008, there were 5,499 known breaches of U.S. government computers with malicious software, according to the Department of Homeland Security. That's up from 3,928 the previous year, and just 2,172 in 2006.

Serious breaches by what are described as "unknown foreign entities" have occurred in recent years in computers at the Departments of Defense, Homeland Security and Commerce, as well as NASA, according to a report by the Center for Strategic and International Studies, a nonpartisan organization in Washington.

The electrical grid might already have been compromised by spies who left behind computer programs that would let them disrupt service, a former U.S. government official told The Associated Press. The official said the sophistication of the attack meant it was almost certainly state-sponsored, but the government does not know its extent because federal officials lack the authority to monitor the entire grid.

"The vulnerability may be bigger than we think," said the official, who asked not to be identified because he was not authorized to discuss details.

It's not just the United States. In 2007, Russian hackers crippled computer networks in Estonia for nearly three weeks. In response, NATO set up an Estonia-based cyber defense center, and announced in April that cyber defense is being incorporated into NATO exercises.

"NATO takes this threat very seriously," Carmen Romero, a NATO representative in Brussels, told the AP. "NATO has to be ready for the new security challenges, and cyber attacks are one of them."

In Germany, experts have been monitoring Chinese cyber espionage since the 1990s. A counterespionage official with Germany's domestic intelligence agency said the country has verified "many hundreds of attacks per year," and that others had likely gone undetected.

"We expect that the attacks we've seen are only the tip of the iceberg," said the official, who spoke on condition of anonymity because of the sensitive nature of the subject. "We follow the attacks to their source, and many come from China."

Governments are not the only targets.

David Livingstone, author of a report on cyber threats by the London-based Chatham House think tank, said cyber espionage is a problem in all sectors _ businesses, government and individuals.

"Anywhere there is attractive intellectual property and anything that is valuable and useful to someone else will be a target," he said.

In fact, the ubiquity of computers and the need to spread information electronically leaves us all vulnerable. Joel Brenner, head of the U.S. Office of the National Counterintelligence Executive, has warned that skilled cyber attackers can remotely turn on the camera on your home computer, convert your cell phone into a listening device, and even convert the earphones of your iPod into microphones.

Gone are the days when spies like American Whittaker Chambers hid microfilm in a hollowed-out pumpkin or Christopher Boyce spirited classified documents away inside a potted plant. Even Aldrich Ames, perhaps the CIA's most notorious double agent, used both hard documents and disks to betray U.S. secrets to Russia.

"Now, you can walk into many corporate and government offices, slip a thumb drive into an open USB port and download in seconds more information than all these traitors stole together," Brenner said in a recent speech on cyber espionage.

You don't even need a thumb drive. By infiltrating the Dalai Lama group's e-mail system with malware, cyber invaders saw nearly everything his monks did, from discussions of protest plans to documents that could have put activists at risk. And the Chinese hackers went even further, infiltrating 1,295 computers in 103 countries.

The information was used to warn foreign officials against meeting with the Dalai Lama, and to stop at least one Tibetan activist at the airport, according to researchers from the Ottawa-based think tank SecDev Group and the University of Toronto's Munk Centre for International Studies.

"People in Tibet may have died as a result," concluded a bleak assessment by computer engineers at Cambridge University in Britain also involved in the case. The Cambridge security experts recommended the exiles keep any sensitive information on computers that are never used to connect to a network, or better yet, use pen and paper.

"We have seen all sorts of attempts to computerize things that should never have been computerized," Ross Anderson, lead author of the Cambridge report, told the AP. "It takes a professor of computer science to have the confidence to say that some things simply should never be put on a computer."

While China's name pops up most in headlines about cyber espionage, experts say Russian hackers are at least as dangerous.

Last summer, in the weeks leading up to the war between Russia and Georgia, Georgian government and corporate Web sites began to see "denial of service" attacks, in which sites are deluged with traffic so as to effectively take them off-line. The Kremlin denied involvement, but a group of independent Western computer experts traced domain names and Web site registration data to conclude that the Russian top security and military intelligence agencies were involved.

"It is, quite simply, implausible that the parallel attacks by land and by cyberspace were a coincidence _ official denials by Moscow notwithstanding," Eka Tkeshelashvili, the head of the Georgia's National Security Council, said in a speech in Washington last month.

China has denied any involvement in the Tibetan attacks and in cyber espionage. Chinese officials note that cyber invaders can use technology to bounce their identities off IP addresses around the world, making it difficult to pinpoint their whereabouts. And they claim the United States maintains a wide technological superiority in cyberspace.

Chen Wenguang, a Chinese computer expert, said any American accusations of Chinese cyber spying are "just another case of a robber crying 'Stop, thief!'"

"I believe that it is the Americans that steal the most secrets," said Chen, assistant director of the computer science department at Beijing's Tsinghua University. Chinese Foreign Ministry spokeswoman Jiang Yu said Tuesday the recent headlines were an attempt to sully the country's image.

U.S. officials acknowledge that even as they step up the nation's digital defense, they are quietly moving forward with an offense. Military officials in Washington said they had established rules for any offensive cyber strike, but would not say if the Pentagon already has pursued cyber warfare operations.

"A good defense also depends on a good offense," said Air Force Gen. Kevin Chilton, who heads U.S. Strategic Command.


http://townhall.com/Common/PrintPage...1d38b9b832&t=c
__________________
“Sometimes the Bible in the hand of one man is worse than a whisky bottle in the hand of (another)… There are just some kind of men who – who’re so busy worrying about the next world they’ve never learned to live in this one, and you can look down the street and see the results.” - To Kill A Mockingbird (Atticus Finch)

“Almost any sect, cult, or religion will legislate its creed into law if it acquires the political power to do so.” - Robert Heinlein
Richard is offline   Reply With Quote
Old 04-09-2009, 20:37   #19
Sigaba
Area Commander
 
Join Date: Aug 2008
Location: Southern California
Posts: 4,476
Although a certain IT team at an "employer of choice" takes a short-sighted and heavy handed view towards security issues, I agree with the concept that protecting a network's integrity should center around the activities of the end user.

IMHO, what is most needed is approach analogous to the following.
Quote:
Originally Posted by The Reaper View Post
You gun proof the kids, not childproof the guns.
nmap--

What is missing from the story is a discussion of the usage patterns of some of the technicians and engineers in the plants. It wouldn't be the first time that some bored guy in a back room went surfing for this that and the other in the middle of the night.

Or, as many a morning went in the salt mines "[Sigaba], when's the last FedEx pick up? We got servers coming in this morning that have to go back out TODAY." One day, one came in with bees in it.

Last edited by Sigaba; 04-09-2009 at 21:13.
Sigaba is offline   Reply With Quote
Old 04-09-2009, 21:15   #20
nmap
Area Commander
 
nmap's Avatar
 
Join Date: Jun 2007
Location: San Antonio, Texas
Posts: 2,760
Quote:
Originally Posted by Sigaba View Post
It wouldn't be the first time that some bored guy in a back room went surfing for this that and the other in the middle of the night.
That seems very common. But there is a bigger problem - failure to safeguard the system due to time or lack of knowledge.

It seems there are two species of crackers (in this case, hackers are benign, crackers are those who criminally attack systems). One are the script kiddies, who use a tool to attack systems and have no idea what they're doing. They just poke about until they find a vulnerable system. Another type are much more dangerous. They seek out vulnerabilities, and they truly understand - at a deep level - what they're doing.

As an example, years ago (circa 1995), there was a glaring vulnerability in the Unix email system. The manual was (is?) a thick book - but someone who knew the vulnerability could have their way with a system. Not good. When the vulnerability was discovered, a software patch was generated to protect against that vulnerability. Those who applied the patch were protected - and those who failed to do so weren't. You can imagine what happens if an administrator fails to do those patches.

The home user should make a point of applying software patches too - and not just for his or her own sake.

My apologies if I've belabored the obvious.
__________________
Carpe diem quam minimum credula postero

Acronym Key:

MOO: My Opinion Only
YMMV: Your Mileage May Vary
ETF: Exchange Traded Fund


Oil Chart

30 year Treasury Bond
nmap is offline   Reply With Quote
Old 04-09-2009, 21:19   #21
Dozer523
BANNED USER
 
Join Date: Jan 2007
Posts: 3,751
Quote:
Originally Posted by Richard View Post
And is anyone here naive enough to think we're not working to protect our systems while going after their networks, too?

And in the 'nothing new' category:

Our ODA was on a month-long GW exercise in Northern Arizona in the fall of 1972. Once our G's were ready and we were given some DA missions, one of our targets was a microwave telephone relay atop one of the mountain peaks near Flagstaff. We raided the securely fenced target at O'Dark-thirty without encountering any resistance and left our dummy charges on key components of the facility. The security for the site had been alerted to the increased possibility of sabotage, but not by whom or when. Sometime later, a site security guard stumbled upon one of our charges placed on a large propane tank to power the auxilliary power generators, sounded the alarm, and shut down the facility - causing an NCA level panic - until they located all of our charges and had determined they were not a threat. We made Jack Anderson's column Richard's $.02
I'll guess the first defensive measure directed was "Tell those SF guys they can't do that anymore!"
Dozer523 is offline   Reply With Quote
Old 04-09-2009, 21:29   #22
Sigaba
Area Commander
 
Join Date: Aug 2008
Location: Southern California
Posts: 4,476
Quote:
Originally Posted by nmap View Post
My apologies if I've belabored the obvious.
To paraphrase a saying oft used by historians, one disregards your posts at their peril. Your guidance on staying up to date with patches is sound.

At times, though, I do wonder if Microsoft's many patches are actually designed to fill up an end-user's hard drive? If the void space is completely filled, there's no room for malware.
Sigaba is offline   Reply With Quote
Old 04-10-2009, 06:57   #23
Sten
Guerrilla Chief
 
Sten's Avatar
 
Join Date: Aug 2005
Location: Indiana
Posts: 695
Quote:
Originally Posted by Broadsword2004 View Post
Regarding the subjects of the electrical generators and so forth discussed earlier, how would one go about learning about such things (like home electricity) and so forth? Would it behoove me to take a few home electric courses at a local college or something?

http://www.bookmarki.com/Electrical-...ides-s/134.htm

http://www.amazon.com/Electrical-Cou.../dp/0764542001

http://howtowireahouse.com/index.html
Sten is offline   Reply With Quote
Old 04-10-2009, 07:56   #24
SF_BHT
Quiet Professional
 
SF_BHT's Avatar
 
Join Date: Jun 2007
Location: Sneaking back and forth across the Border
Posts: 6,627
We get weekly hacking attempts by China and NKorea. They always trace back to a College lab in one of the big cities but that is probably just a cover. My home PC also gets hit a lot from the same sites but I use the same provider as work........ Funny but it is sorta not funny.

This is why I keep a hell of a firewall (Hardwars and Software) for all our systems at work and home.....

Quote:
Originally Posted by Richard View Post
More to add to this cauldron of e-fire...

Richard's $.02


Cyber spying a threat, and everyone is in on it
AP News, 09 Apr 2009

Ghost hackers infiltrating the computers of Tibetan exiles and the U.S. electric grid have pulled the curtain back on 21st-century espionage as nefarious as anything from the Cold War _ and far more difficult to stop.

Nowadays, a hacker with a high-speed Internet connection, knowledge of computer security and some luck can pilfer information thought to be safely ensconced in a digital locker. And the threat is growing, with countries _ including the U.S. _ pointing fingers at each other even as they ramp up their own cyber espionage.

The Pentagon this week said it spent more than $100 million in the last six months responding to damage from cyber attacks and other computer network problems. And the White House is wrapping up a 60-day review of how the government can better use technology to protect everything from the nation's electrical grid and stock markets to tax data, airline flight systems and nuclear launch codes.

In 2008, there were 5,499 known breaches of U.S. government computers with malicious software, according to the Department of Homeland Security. That's up from 3,928 the previous year, and just 2,172 in 2006.

Serious breaches by what are described as "unknown foreign entities" have occurred in recent years in computers at the Departments of Defense, Homeland Security and Commerce, as well as NASA, according to a report by the Center for Strategic and International Studies, a nonpartisan organization in Washington.

The electrical grid might already have been compromised by spies who left behind computer programs that would let them disrupt service, a former U.S. government official told The Associated Press. The official said the sophistication of the attack meant it was almost certainly state-sponsored, but the government does not know its extent because federal officials lack the authority to monitor the entire grid.

"The vulnerability may be bigger than we think," said the official, who asked not to be identified because he was not authorized to discuss details.

It's not just the United States. In 2007, Russian hackers crippled computer networks in Estonia for nearly three weeks. In response, NATO set up an Estonia-based cyber defense center, and announced in April that cyber defense is being incorporated into NATO exercises.

"NATO takes this threat very seriously," Carmen Romero, a NATO representative in Brussels, told the AP. "NATO has to be ready for the new security challenges, and cyber attacks are one of them."

In Germany, experts have been monitoring Chinese cyber espionage since the 1990s. A counterespionage official with Germany's domestic intelligence agency said the country has verified "many hundreds of attacks per year," and that others had likely gone undetected.

"We expect that the attacks we've seen are only the tip of the iceberg," said the official, who spoke on condition of anonymity because of the sensitive nature of the subject. "We follow the attacks to their source, and many come from China."

Governments are not the only targets.

David Livingstone, author of a report on cyber threats by the London-based Chatham House think tank, said cyber espionage is a problem in all sectors _ businesses, government and individuals.

"Anywhere there is attractive intellectual property and anything that is valuable and useful to someone else will be a target," he said.

In fact, the ubiquity of computers and the need to spread information electronically leaves us all vulnerable. Joel Brenner, head of the U.S. Office of the National Counterintelligence Executive, has warned that skilled cyber attackers can remotely turn on the camera on your home computer, convert your cell phone into a listening device, and even convert the earphones of your iPod into microphones.

Gone are the days when spies like American Whittaker Chambers hid microfilm in a hollowed-out pumpkin or Christopher Boyce spirited classified documents away inside a potted plant. Even Aldrich Ames, perhaps the CIA's most notorious double agent, used both hard documents and disks to betray U.S. secrets to Russia.

"Now, you can walk into many corporate and government offices, slip a thumb drive into an open USB port and download in seconds more information than all these traitors stole together," Brenner said in a recent speech on cyber espionage.

You don't even need a thumb drive. By infiltrating the Dalai Lama group's e-mail system with malware, cyber invaders saw nearly everything his monks did, from discussions of protest plans to documents that could have put activists at risk. And the Chinese hackers went even further, infiltrating 1,295 computers in 103 countries.

The information was used to warn foreign officials against meeting with the Dalai Lama, and to stop at least one Tibetan activist at the airport, according to researchers from the Ottawa-based think tank SecDev Group and the University of Toronto's Munk Centre for International Studies.

"People in Tibet may have died as a result," concluded a bleak assessment by computer engineers at Cambridge University in Britain also involved in the case. The Cambridge security experts recommended the exiles keep any sensitive information on computers that are never used to connect to a network, or better yet, use pen and paper.

"We have seen all sorts of attempts to computerize things that should never have been computerized," Ross Anderson, lead author of the Cambridge report, told the AP. "It takes a professor of computer science to have the confidence to say that some things simply should never be put on a computer."

While China's name pops up most in headlines about cyber espionage, experts say Russian hackers are at least as dangerous.

Last summer, in the weeks leading up to the war between Russia and Georgia, Georgian government and corporate Web sites began to see "denial of service" attacks, in which sites are deluged with traffic so as to effectively take them off-line. The Kremlin denied involvement, but a group of independent Western computer experts traced domain names and Web site registration data to conclude that the Russian top security and military intelligence agencies were involved.

"It is, quite simply, implausible that the parallel attacks by land and by cyberspace were a coincidence _ official denials by Moscow notwithstanding," Eka Tkeshelashvili, the head of the Georgia's National Security Council, said in a speech in Washington last month.

China has denied any involvement in the Tibetan attacks and in cyber espionage. Chinese officials note that cyber invaders can use technology to bounce their identities off IP addresses around the world, making it difficult to pinpoint their whereabouts. And they claim the United States maintains a wide technological superiority in cyberspace.

Chen Wenguang, a Chinese computer expert, said any American accusations of Chinese cyber spying are "just another case of a robber crying 'Stop, thief!'"

"I believe that it is the Americans that steal the most secrets," said Chen, assistant director of the computer science department at Beijing's Tsinghua University. Chinese Foreign Ministry spokeswoman Jiang Yu said Tuesday the recent headlines were an attempt to sully the country's image.

U.S. officials acknowledge that even as they step up the nation's digital defense, they are quietly moving forward with an offense. Military officials in Washington said they had established rules for any offensive cyber strike, but would not say if the Pentagon already has pursued cyber warfare operations.

"A good defense also depends on a good offense," said Air Force Gen. Kevin Chilton, who heads U.S. Strategic Command.


http://townhall.com/Common/PrintPage...1d38b9b832&t=c
SF_BHT is offline   Reply With Quote
Old 04-10-2009, 08:04   #25
D9 (RIP)
Quiet Professional
 
D9 (RIP)'s Avatar
 
Join Date: Jan 2004
Location: Texas
Posts: 514
The other bit of good news is that at least we've got sharp enough people somewhere to figure out we've been exploited. Same goes for a similar exploitation many on here will recall involving the ubiquitous thumb drive.

I have three particular hopes:

1. That we're similarly exploiting their infrastructural vulnerabilities (although it's hard to imagine current POTUS approving things like that).

2. That in some control room, somewhere, there is a switch labeled "ACTIVATE MANUAL BACKUP SYSTEM"

3. As TR said, that people are taking their own precautions (recalling that I'm expecting this from the same John-Q-Publics that produced disaster awareness hits like Katrina, again.... hard to imagine).

One can always hope.
__________________
El Diablo sabe mas por viejo que por diablo.
D9 (RIP) is offline   Reply With Quote
Old 04-10-2009, 08:09   #26
D9 (RIP)
Quiet Professional
 
D9 (RIP)'s Avatar
 
Join Date: Jan 2004
Location: Texas
Posts: 514
Regarding cyber-espionage in general:

It is certainly true that today cyber-spies are collecting more data in seconds than some of the history's most notorious spies accumulated over a career.

But data is not information until it has been analyzed and vetted. I wonder sometimes if the sheer volumes of information does not become its own problem for these agencies.

When Aldrich Ames produced a microfilm, there were an army of analysts waiting on it.

I suspect in China these days, that for each quality analyst there are thousands of terrabytes of data to be scrubbed and analyzed (if estimates of their collection are accurate). One wonders whether or not in spite of the quantity collected, the quality of the end analysis is really any better.
__________________
El Diablo sabe mas por viejo que por diablo.
D9 (RIP) is offline   Reply With Quote
Old 04-10-2009, 08:52   #27
6.8SPC_DUMP
BANNED USER
 
Join Date: Dec 2008
Location: New York
Posts: 353
I have a feeling this news was released to gain public support for the "Cybersecurity Act of 2009", that is comprised of two bills, and will be voted on in the Senate soon.

S.773
A bill to ensure the continued free flow of commerce within the United States and with its global trading partners through secure cyber communications, to provide for the continued development and exploitation of the Internet and intranet communications for such purposes, to provide for the development of a cadre of information technology specialists to improve and maintain effective cybersecurity defenses against disruption, and for other purposes.

S.778
A bill to establish, within the Executive Office of the President, the Office of National Cybersecurity Advisor.

It is the result of:
20 (7) The Cyber Strategic Inquiry 2008, sponsored by Business Executives for National Security and executed by Booz Allen Hamilton, recommended to ‘‘establish a single voice for cybersecurity within government’’ concluding that the ‘‘unique nature of cybersecurity requires a new leadership paradigm.’’ "(p.4/51)"

The bills have gotten some criticism:

"Center for Democracy and Technology":
Quote:
"A cybersecurity bill introduced today in the Senate would give the federal government extraordinary power over private sector Internet services, applications and software. The Cybersecurity Act of 2009 would, for example, give the President unfettered power to shut down Internet traffic in emergencies or disconnect any critical infrastructure system or network on national security grounds. The bill would grant the Commerce Department the ability to override all privacy laws to access any information about Internet usage in connection with a new role in tracking cybersecurity threats. The bill, introduced by Sens. John Rockefeller and Olympia Snowe, would also give the government unprecedented control over computer software and Internet services, threatening innovation, freedom and privacy. CDT President and CEO Leslie Harris said, "The cybersecurity threat is real, but such a drastic federal intervention in private communications technology and networks could harm both security and privacy."
Larry Seltzer, Editor of "eWeek"(an Internet and print news source on technology issues), wrote:
Quote:
"The whole thing smells bad to me, I don't like the chances of the government improving this situation by taking it over generally, and I definitely don't like the idea of politicizing this authority by putting it in the direct control of the president.
What are the critical infrastructure networks? The examples provided are 'banking, utilities, air/rail/auto traffic control, telecommunications.'
Let's think about this, I'm especially curious as to how you take the telecommunications networks off of the Internet when they are, in large part, what the Internet is comprised of. And if my bank were taken offline, I would think about going into my branch and asking for all of my deposits in cash."

Last edited by 6.8SPC_DUMP; 04-10-2009 at 08:57.
6.8SPC_DUMP is offline   Reply With Quote
Old 04-10-2009, 09:48   #28
Richard
Quiet Professional
 
Richard's Avatar
 
Join Date: Aug 2004
Location: NorCal
Posts: 15,370
I'm for hacking into the system and setting all the IRS computers to porn streaming from the Fiji Islands at $3.95/min whenever those size 2 hats start them up to view with our 1040s!

Richard's $.02
__________________
“Sometimes the Bible in the hand of one man is worse than a whisky bottle in the hand of (another)… There are just some kind of men who – who’re so busy worrying about the next world they’ve never learned to live in this one, and you can look down the street and see the results.” - To Kill A Mockingbird (Atticus Finch)

“Almost any sect, cult, or religion will legislate its creed into law if it acquires the political power to do so.” - Robert Heinlein
Richard is offline   Reply With Quote
Old 04-10-2009, 10:18   #29
greenberetTFS
Quiet Professional (RIP)
 
greenberetTFS's Avatar
 
Join Date: May 2007
Location: Carriere,Ms.
Posts: 6,922
Quote:
Originally Posted by Richard View Post
I'm for hacking into the system and setting all the IRS computers to porn streaming from the Fiji Islands at $3.95/min whenever those size 2 hats start them up to view with our 1040s!

Richard's $.02
Richard.

That is priceless and made me LMAO.................

GB TFS
__________________
I believe that SF is a 'calling' - not too different from the calling missionaries I know received. I knew instantly that it was for me, and that I would do all I could to achieve it. Most others I know in SF experienced something similar. If, as you say, you HAVE searched and read, and you do not KNOW if this is the path for you --- it is not....
Zonie Diver

SF is a calling and it requires commitment and dedication that the uninitiated will never understand......
Jack Moroney

SFA M-2527, Chapter XXXVII
greenberetTFS is offline   Reply With Quote
Old 04-10-2009, 11:02   #30
ZonieDiver
Quiet Professional
 
ZonieDiver's Avatar
 
Join Date: Apr 2008
Location: Georgetown, SC
Posts: 4,204
Quote:
Originally Posted by Richard View Post
I'm for hacking into the system and setting all the IRS computers to porn streaming from the Fiji Islands at $3.95/min whenever those size 2 hats start them up to view with our 1040s!

Richard's $.02
And how, praytell, do you know about this "porn streaming from the Fiji Islands at $3.95/min"???
__________________
"I took a different route from most and came into Special Forces..." - Col. Nick Rowe
ZonieDiver is offline   Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Forum Jump



All times are GMT -6. The time now is 10:46.



Copyright 2004-2022 by Professional Soldiers ®
Site Designed, Maintained, & Hosted by Hilliker Technologies