Archive for the ‘Things that Went Wrong’ Category

Irony & Sexual Assault Awareness Month at the Naval Academy

April 12, 2014

Sexual Assault Month at the Naval Academy

If you thought the leadership in the U.S. Navy have been making some bad decisions lately, look who they think should lecture future Naval Officers about the evils of sexual assault.

Bill OBill Clinton explaining sexual assault to Naval Cadets at Annapolis

Missed It By That Much

December 14, 2013

According to a former government official who spoke recently with Gen. Keith B. Alexander, the N.S.A. director, the general said that at the time Mr. Snowden was downloading the documents, the spy agency was several months away from having systems in place to catch the activity.

Reality Disconnect

November 23, 2013

Reality Disconnect

(Via Memepix)

Google Image Search Could Use Some Fine Tuning

October 9, 2013

Google Image Search Could Use Some Fine Tuning

Searching for an image of Rear Admiral Alan G. Kirk, I get a pressure cooker, a welder’s helmet, a cash counting machine, a handheld radio, a Nazi-looking guy, some sort of flange, a set of mixing bowls, and a few other things that are  definitely not Rear Admiral Alan G. Kirk.

Death Wears Bunny Slippers

May 21, 2013


Unofficial Patch for the 91st Missile Wing Minot AFB

On 30 August 2007, a B-52 took off from Minot AFB carrying six cruise missiles armed with W-80 nuclear warheads to Barksdale AFB across the country in Louisiana. No base personnel nor the crew knew the nuclear weapons were aboard.  An investigation found that this was an isolated incident and that only a few people had information on the whereabouts of the missiles.

In June 2008. Secretary of Defense Gates fired the Air Force secretary, Michael W. Wynne, and the service’s chief of staff, Gen. T. Michael Moseley, were forced to resign after an investigation into the W-80 warhead incident.

In July 2008, three officers in the 91st fell asleep in their bunny slippers while in possession of classified components containing superceded missile launch codes for Minuteman III ICBMs. The two lieutenants and one captain received Article 15s.

On 31 July 2008, a 91st Missile Wing semi-trailer overturned while carrying a rocket booster for an unarmed Minuteman III intercontinental ballistic missile. The Air Force spent about $5.6 million  to recover the booster rocket. The cause of the accident was judged to be  “driver and safety observer error.”  Again, no mention of bunny slippers, but those little pink ears could get stuck under one of the pedals, and cause a “driver and safety” error.

On 29 August, 2008, the Air Force announced Thursday that two officers who worked at Minot AFB in North Dakota have been taken off the job while the military investigates allegations that they took home classified components used in underground launch control centers.

The officers were supposed to have destroyed the two devices and had signed documents stating that they had, said Maj. Laurie A. Arellano, an Air Force spokeswoman. The Band-Aid-size devices, now obsolete, were used on equipment inside the launch center to detect equipment tampering.

An airman in the 91st also left a safe open in the summer of 2008 for an entire night. The safe contained missile operation procedures. Officials found nothing was removed.

On 31 August 2009, a giant bug caused a 91st Missile Wing truck carrying rocket engine parts for intercontinental ballistic missiles to overturn outside Minot. The “large insect” landed on the driver’s back, and the truck tipped over as the driver tried to remove the insect, according to the report.  The overturned semi-trailer carried rocket engine parts for ICBMs and two 14 gallon tanks of liquid rocket fuel.  It was not clear if the driver was wearing bunny slippers.

Finally, in March of 2013, the unit received what is essentially a “D” on one of the 22 elements of an inspection.

On  27 March 2013, Maj. Gen. Roger Burg, commander of the 20th Air Force, flew to Minot to remove Col. Christopher Ayres from command. Burg also fired Col. Lyman Faith, 91st Maintenance Group commander, and Lt. Col. Andrew Healy, 91st Missile Maintenance Squadron commander.


Does One Remind You of the Other?

February 4, 2012

Still Think One Person Can’t Make a Difference?

November 21, 2011

At Least We Are Consistent

September 28, 2011

2005 – Iraq

WASHINGTON — The number of Iraqi battalions capable of combat without U.S. support has dropped from three to one, the top American commander in Iraq told Congress Thursday, prompting Republicans to question whether U.S. troops will be able to withdraw next year.

More here.

2011 – Afghanistan…

Ten years of war. Two years of an accelerated effort to train Afghans to take over that fight, at an annual cost of $6 billion. And not a single Afghan army battalion can operate without assistance from U.S. or allied units.

That was the assessment made by the officer responsible for training those Afghan soldiers, Lt. Gen. William Caldwell. Out of approximately 180 Afghan National Army battalions, only two operate “independently.” Except that “independently,” in Caldwell’s National Training Mission-Afghanistan command, means something different than “independently” does in the States.

More here.

Medical Costs and You

April 21, 2011

Why Your Stitches Cost $1,500 - Part One
Via: Medical Billing And Coding

Agent.btz – The Enemy May Be Us

December 1, 2008

On November 28, the Los Angeles Times reported on a “Cyber-Attack” on Defense Department networks caused by a virus named, Agent.btz. The Los Angeles Times story indicated that the attackers were possibly from Russia or China.

It might turn out that the culprits are a bit closer to home than Russia or China.  This malware has been around in one form or another for several years, and is not “designed specifically to target military networks.

Agent.btz is a form of the SILLY.FDC which has been around since at least 2007. Agent.btz has the capacity to carry a payload and can execute commands upon infecting a computer.

Did this come from the Russians or the Chinese?


However, consider this possibility – with thousands of military and civilian personnel walking around with thumb drives around their necks, and with CD’s and other memory sticks freely available to stick into networked computers, it just might turn out that the enemy is us and our lax network security practices.

A good number of corporate computer virus infections arise from employees bringing games, software, CD’s and other infected software to work and injecting virus infections into the network. There’s no reason why the same wouldn’t be true for military networks.

The below is from the Symantec Forum for viruses:

There are many policy- and configuration-based mitigations that can be used to adequately limit the propagation of these threats. Network administrators are advised to:

•    Ensure that antivirus software is up to date.
•    Disable AutoRun functionality for removable media, which should be possible using endpoint security systems. For personal computers, there are many detailed tutorials on how to disable AutoRun. Also, holding down the SHIFT key while inserting a USB flash drive can temporarily disable AutoRun.
•    If removable drives are not required, endpoint security systems can distribute policies to prevent removable media from being recognized.
•    User education should be a priority to educate network users about these threats.”
This indicates that Symantec is detecting and removing the infection and its variants…plus provides what is needed to prevent it in the first place.