Computer Spies Breach $300B Fighter-Jet Project 330
suraj.sun writes "Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project — the Defense Department's costliest weapons program ever — according to current and former government officials familiar with the attacks. Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft."
A project for our worst enemies (Score:5, Insightful)
Do not underestimate Western-security procedures. (Score:5, Interesting)
Note that Chinese intruders succeeded in numerous attempts at downloading information related to the F-35 jet fighter. After the 1st such attempt, American intelligence would have become aware of the incident.
If you were a smart intelligence officer, what would you do after the 1st attempt?
You would not publicly announce the breach of security. Rather, you would plant false data into the same computer which was compromised. When the Chinese hacker returns to it to download even more information, then he would get gigabytes of fake data.
The aim is for the Chinese military to develop countermeasures against F-35 performance characteristics that does not exist. When the actual F-35 is deployed, it will defeat those countermeasures and deliver its nuclear payload to Beijing -- on time and on target.
Re:Do not underestimate Western-security procedure (Score:4, Informative)
The rest are in the private sector.
What you have left watching some of your servers can be seen thanks to Gary McKinnon.
http://en.wikipedia.org/wiki/Gary_McKinnon [wikipedia.org]
Re: (Score:3, Insightful)
> "smart American intelligence officer" - in
> Georgia (country), Iraq (red zone) or 'near'
> Pakistan or Latin America.
> The rest are in the private sector.
They are civilians, not "private sector". Who their employer contracts to makes the difference. Civilian psyops specialists have always been a prominent part of theory and field work. The psyops 'bible' was written by a civilian: Dr. Paul "E.E. 'Doc' Smith" Linebarger.
As for the military intelligence people, what was said about planting false
Re:Do not underestimate Western-security procedure (Score:5, Insightful)
Re: (Score:3, Informative)
Fake data? Bah. I'd much rather we plant bad information that will cause the most monumental non-nuclear explosion and fire ever seen from space [slashdot.org].
Do not overestimate Western-security procedure (Score:3, Insightful)
Re: (Score:3, Informative)
"When the actual F-35 is deployed, it will defeat those countermeasures and deliver its nuclear payload to Beijing -- on time and on target."
Nice try. The F-35 is not a nuclear delivery system but a light tactical fighter-bomber.
Re: (Score:3, Insightful)
"Why build one when you can build two for twice the price?"
Re: (Score:3, Insightful)
Yeah--good luck with polishing THAT turd, China.
Speaking of polishing turds. Is anyone else a bit appalled at the fact that we're spending 300 BILLION dollars on a fighter jet project? Come the **** on... We can already kick everyone on the planet's ass with amazing efficiency... Why more?
Lets check the KDR
~100k Iraqis vs ~4k US ... That's 25:1! And that's a very conservative estimate for Iraqi death.
It's not like we're ever going to war with a sophisticated Army anyway, they're all on our side!
300 billion dollars on new jets... I wish I had the $10
Oops, sorry...that was me (Score:5, Funny)
I thought I was downloading the latest Windows 7 beta candidate
boy is my face red.
(ob: what's that knock on my door, I'll be *NO CARRIER*)
Re:Oops, sorry...that was me (Score:5, Funny)
Re: (Score:3, Funny)
Note to AC: do not reply to yourself with a "note to self" using your real ID.
Only a few terabytes? (Score:5, Interesting)
Re:Only a few terabytes? (Score:4, Interesting)
What kind of connection do you need to have to get away with several terabytes of data before someone notices? Users on my network get pissy when someone downloads a few dozen megs.
Probably because they aren't on some residential asynchronous connection. I imagine them to be on at least something near a SONET [wikipedia.org] connection.
Re:Only a few terabytes? (Score:5, Interesting)
Comment removed (Score:5, Funny)
Re:Only a few terabytes? (Score:4, Interesting)
If it was a Plutonium weapon, they likely hid flaws in the implosion timing and geometry designs.
If it was a Uranium "gun" design, your weapon failed because you're an idiot. I mean seriously, a couple first-year engineering students with access to Wikipedia and a few thousand bucks can build those. Weaponizing the ore is the toughest part, and that's not difficult (just dangerous to your health).
Re: (Score:3, Funny)
Re:Only a few terabytes? (Score:5, Funny)
Re: (Score:3, Funny)
Clearly, you simply need to connect the red wire to th
+++NO CARRIER+++
Re: (Score:2)
In the Soviet era, it was common to use this kind of thing for misinformation. Once a project has been compromised, you feed plausible-looking but wrong information down the leaking conduit for as long as possible.
A famous example being Concordski [wikipedia.org].
Re: (Score:3, Funny)
Re:Only a few terabytes? (Score:5, Insightful)
> you feed plausible-looking but wrong information down the leaking conduit for as long as possible.
I assume it would be quite tricky to generate even a few gigabytes of plausible-looking 'data related to design and electronics systems' even if you had a whole day to prepare, and we are talking about multiple terabytes here, and while you are busy preparing the wrong information, the spies are still downloading the correct stuff. So unless you live in a movie where stuff that normally takes days can be done in 5 minutes when our protagonists start randomly pushing buttons on their keyboard with pretty pictures appearing on the screen accompanied by uninformative beeping sounds, it would probably be best to simply terminate the connection and start improving your security, look for backdoors that might have been installed, and so forth.
Re: (Score:3, Informative)
Re: (Score:3, Interesting)
Anyone who uses the stolen data is a fool. Good counter-spies have bad data available for immediate use.
Re:Only a few terabytes? (Score:5, Interesting)
They also did that during the Reagan administration with a software package designed to run the valves on a natural gas pipeline.
http://www.msnbc.msn.com/id/4394002
The software was modified to run just fine for a while, but then go haywire. The end result was "...the most monumental non-nuclear explosion and fire ever seen from space...".
This occurred in 1982. I'm sure they're still doing exactly the same thing today.
Re:Only a few terabytes? (Score:4, Informative)
Turns out we already discussed that 5 years ago. http://slashdot.org/comments.pl?sid=98957&threshold=1&commentsort=0&mode=thread&pid=8438763 [slashdot.org]
The evidence seemed to point to the story being BS.
Re:Only a few terabytes? (Score:5, Insightful)
The more interesting question is why the DoD has sensitive information hooked up to the net in any way. The only way of ensuring net based attacks are unsuccessful is by disconnecting from the net. Sure you still have to ensure that the people using the terminals are on the up and up, but that's a lot easier than keeping a large network full of sekrit goberment stuff secure.
I'm always amazed that this sort of information would be stored and used on internet connected computers, it just seems like asking for trouble. Historically the DoD has done a pretty incompetent job of securing its systems, which really makes one wonder how many of these advancements are now in the works in foreign states.
Re: (Score:2, Interesting)
(Corrected) It's not like the DoD wants to send non-intel agencies massive quantities to data on a regular basis.
Given that agencies are supposed to work together now, I imagine there is a bit more data transfer between agencies today. I'd also imagine that these are only done over secure connections so anything accessible by the public wouldn't get to a critical network by the fact that they aren't connected.
Re:Only a few terabytes? (Score:5, Funny)
(cue spy mike in the cafeteria a few days ago)
"Bob, is it me or is the network reeeeally slow again t'day?"
"Yeah, wonder what the goons in IT are pissin' with today. Wish they'd tell us that before they start rewiring everything."
Re: (Score:2, Funny)
As a Swedish pirate [thepiratebay.org] with a fast cheap Internet connection [slashdot.org] all I can say is:
Future Gripen upgrade is imminent, take that Norway [airliners.net]! :D
Welcome to the future [wikipedia.org].
Re: (Score:3, Interesting)
A few lines of code and a modem.
Its not about downloading "terabytes" in realtime.
You shift it onto other networks and collect it later.
You got in on other networks, other networks can carry your data out.
A few more or less 'terabytes' on many networks is a nights spam.
Nobody is looking. When they do, your data is safe in its new home.
Re: (Score:2, Interesting)
So "someone" had downloaded a few terabytes... Has anyone thought about what if some of the design/code has been changed? I would view that as a major threat also. Imagine a bug in the fire control systems that would prevent a weapon from firing when a certain signal is received? Or a limiter that would impact maneuverability during combat situation? We see this sort of thing with malware/spyware/adware all the time. Is it that inconceivable to see it in this kind of situation? What if the data breech is t
Re: (Score:2, Funny)
Re:Only a few terabytes? (Score:5, Funny)
Try switching to Comcast(TM)! Their advanced security features would have detected this breach and put a stop to it after only a mere 250G was transferred. It's Comcastic(TM)!
(I just hope the spies didn't discover the fighter's only weakness, a small thermal exhaust port...)
Why? (Score:5, Insightful)
Re:Why? (Score:5, Funny)
Why are these sensitive systems connected to the public internet. Either directly or indirectly, whose bright idea was it? If you need a computer in the lab connected to the internet, fine, just keep the infrastructure seperate.
You see, they weren't actually. They were on a private network but they were able to siphon off data by hanging a bucket off of the network cable and cutting a hole in it. The bits fell into the bucket, and the rest is history...
Re:Why? (Score:4, Funny)
Re:Why? (Score:5, Funny)
Re: (Score:2, Funny)
Re: (Score:2)
No you gotta remember, it's not like tubes but like a spider web all of which leads back to the female spider. Take that out and the rest is history.
Re: (Score:2, Interesting)
Because
a) it is easier.
b) it is cheaper.
c) some bigwig from marketing/management "needed it".
d) the el cheapo admins couldn't figure out how to firewall it (or just didn't want to bother because, hey, government job, nobody gets fired just for being lazy).
e) all of the above.
Re:Why? (Score:4, Interesting)
If you need a computer in the lab connected to the internet, fine, just keep the infrastructure seperate.
You live in the past. Haven't you heard of the new airborne virii?
They're technically called. "I work in a lab and don't know shit about computers so I regularly download all info into my personal portable".
Re:Why? (Score:5, Interesting)
the secret data wasn't on the internet, according to the article. It was not compromised. Only "sensitive" data was compromised. So while they might be able to infer information about the fighter, and its capabilities, they don't have the design and code for it.
Not even Jack Bauer can prevent leaks (Score:5, Funny)
It doesn't matter if the data is on the Internet. No matter how well you protect your data there always are rogue agents on the roster who have access to everything and can operate undetected for a long period of time.
I'm not kidding. I have my sources. I watch 24 after all.
Re: (Score:2)
They weren't. Unfortunately, some simpleton decided it was easier to plug his laptop into the secure network without first disabling his Wifi connection to the public network. "Oops."
Re: (Score:2)
Which assumes there is a open wifi connection in the area. That alone is unacceptable for any building/office that houses even "sensitive" data. 802.11b/g/n should all be jammed as well as the walls/windows lined with RF blocking mesh.
The guys running the .mil networks are a bit like union folk -- not actively seeking to make things worse but not staying up late to keep the holes plugged either. They'll have some laughably lopsided security approach -- pressurized conduit piping for CAT5 but servers runn
I call bullshit, maybe (Score:5, Informative)
Any other data that was acquired was probably crap. I strongly suspect that this is another case of fear mongering by an organization trying to get additional funding.
The alternative, which is almost too scary for me to consider, is that we have changed our practices and now leave sensitive information critical to our defense on unprotected systems.
Re:I call bullshit, maybe (Score:4, Informative)
I think to a great extent your perception of what the security around a lot of the F-35 program is a bit over zealous. F-35 is an ITAR program, which mainly means can't be worked on my foreign nationals. All the data is secured, but primarily its not on its own network. My guess is this data probably came out of a hack or someone who got access to something like a DOORS or Team Center server and just started grabbing stuff. Now granted, some things are greater protected than others. But I can say we work extensively on flight controls and other things of importance and security is there as more a nuisance than anything else.
Keep in mind F35 is not a black project. Those get their own network, machines locked behind big doors, big approval list to install programs, etc. F35 is such a large project with so many subcontractors that this doesn't surprise me one bit. Security is largly there to pass an audit, and that's about it.
This whole piece of largely fear mongering to get money approved to create some more bureucracy. Chances are nothing of importance was even gotten as the F35 will be exported to so many countries anyway.
Government Regs on How to Transmit Classified Data (Score:3, Informative)
http://nsi.org/Library/Govt/Nispom.html [nsi.org]
Especially pertinent here is Transmission policy for different types of classified data
http://nsi.org/Library/Govt/Nispom.html#link5 [nsi.org]
and network security
http://nsi.org/Library/Govt/Nispom.html#link8 [nsi.org]
Not exactly scintillating reading, but them's the rules.
Re: (Score:2)
They don't have to be connected to the public internet. Maybe they used some form of vampire tap. [wikipedia.org]
Someone working on the project who has access to the long cable runs between computers could simply attach this thing at any number of hidden junctions. Even if it weren't hidden, the majority of people walking past it wouldn't even know what it is, it looks like regular equipment.
It does mean that for it to work there would have to be moles on
Re: (Score:2)
The computer "spies" have actually downloaded detailed diagrams of a MASHUP of: the Wright Brothers plane, a Porsche 911, the winning America's cup sailboat, and the Apollo 14 command module.
I think it would be funnier if their end product became a Winnebago with wings.
Re: (Score:2)
You mean, like this one [impawards.com]?
I dunno, the thought of the Red Chinese flying one of those sounds rather daunting.
WAIT! (Score:2)
Here's a better shot. [ign.com]
Still don't wanna see the Chi-Coms coming at me in one of those.
Re: (Score:2)
By the time they figure it out, it'll be 2018 and we'll be so far ahead technologically that nobody will catch us.
I would rather think Chinese were in a good mood and have uploaded this mashup, and the Americans still haven't figured out the extend of the hack...
Sloppy espionage ? (Score:5, Insightful)
Re: (Score:2)
Not to downplay this event but I really wonder why we don't hear much about espionage from western countries ? Are they better at it (rather than using malware or commonly avaliable tools) ? I am sure the Chinese etc have equally vulnerable systems.
They're the only ones who get caught.
Re: (Score:3, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
Now, I sit down in my home in China, run some scripts, hack a US government computer, brag to my friends, etc.... Someone from the US government calls..
Re:Sloppy espionage ? (Score:5, Funny)
Now, I sit down in my home in China, run some scripts, hack a US government computer, brag to my friends, etc.... Someone from the US government calls... wait a minute, no they didn't. No one even cared. But lets pretend they did care and they called some official in China and told them what was going on... *LAUGHTER AND LOTS OF POINTING* from the Chinese side.
I sit down in my home in Spain, run some scripts, hack a US government computer, brag to my friends, etc.... Someone from the spanish government takes a sip from his third coffee of the morning while vaguely rememorating the last time he did some work, many years before. Then, he decides it's a perfect day to go home before noon and leaves.
Re: (Score:2)
Someone from the Spanish government takes a sip from his third coffee of the morning
while vaguely rememorating the last time he did some work, many years before in GAL (Anti-terrorist Liberation Groups).
Then, he decides it's a perfect day to go home before noon and leaves.
Re: (Score:2)
Damnit, that sounds like a job for me!!.
Think I can get away with not learning Spanish first?
You, mister hacker sir, I know what you are doing. I need you to give me copies of all your Pr0n to keep me... um... occupied and quiet.
Comment removed (Score:5, Interesting)
Re: (Score:3, Funny)
Yeah, they'd end up looking rather slack-jawed.
Re: (Score:2)
5) It's not really *shocking news* to western news outlets when we do it? [xinhuanet.com]
6) We're a bit less subtle about it. We've already admitted to Echelon [wikipedia.org], extensive wiretapping [npr.org] at the carrier level, etc. We've also got Gitmo, prisoner torture, and two wars going for us. Simple spying barely registers.
Re: (Score:2)
Not to downplay this event but I really wonder why we don't hear much about espionage from western countries ? Are they better at it (rather than using malware or commonly avaliable tools) ? I am sure the Chinese etc have equally vulnerable systems.
Perhaps it's not that western countries are better at it, but that their victims (choose your non-western country) don't have the skills/resources to detect said spying?
Re: (Score:2)
1) Because we are the west
2) For this particular espionage, we are the most vunerable/biggesst target. We spend more on weapons development than the rest of the world combined.
Re: (Score:2)
Everyone gets hacked.
We're just more open about it.
You really think the Chinese or Russian or Iranian or North Korean governments would admit publicly to getting hacked?
Re: (Score:2)
It's probably because most of our enemies are using kit we sold them in the first place.
That or they're flying around in what are effectively lumps of turd that we can't learn anything from anyway.
Re: (Score:2)
Not to downplay this event but I really wonder why we don't hear much about espionage from western countries ? Are they better at it (rather than using malware or commonly avaliable tools) ? I am sure the Chinese etc have equally vulnerable systems.
Western countries spy (also on each other) using stuff like ECHELON, mainly for industrial spionage purposes, and this fact is well-documented and public knowledge. See e.g. the European Parliament's ECHELON report [europa.eu] (search for "Published cases").
counterinteligence (Score:3, Interesting)
There is just as good a chance that the information stolen is bad information, as there is that it is good information. Now the Chinese/Russian spies need to determine what is and isn't good information from what they stole
Open source. (Score:5, Funny)
2009, the year of the open source Jet Fighter.
Re:Open source. (Score:5, Informative)
Re:Open source. (Score:4, Interesting)
It's not the DoD, it's the Department of State. Stupid ITAR. I have to deal with it, because I (used to) manufacture a small amount of small arms ammunition (largely specialty loads for uncommon, or almost extinct cartridges, you might say) for consumption ONLY in the US. Not only do you have to register fingerprints, bodily fluids and your first born son with the BATF to get the license to manufacture ammo for sale, you have to pay the DoS about 1700 a year, to register as a manufacturer.
I didn't know about ITAR upfront, and after updating their policies, and only really began learning about it after the BATF reported me to the DoS after several years of putting along, manufacturing about 6000 rounds a year and having fun--it didn't pay a whole lot, but it was a part time business that was actually growing. The back fees put me out, and I had to rescind my 06 FFL for making ammo to avoid going bankrupt.
The premise is, it's supposed to keep our military secrets from falling into enemy hands, but it has such a broad scope that it effects tons of people who don't work on anything remotely sensitive--and good luck trying to get an exemption. It might not be so bad, but it effects lots of people doing no exporting whatsoever, and it also affects academics doing research in fields which are not always so obviously related to armaments... It only adds insult to injury, to see that all of this registration bullshit fails so completely in protecting the REAL secrets. Though, I'm not surprised to learn that it was a government office which was compromised.
It's all the more more frustrating to know that they won't learn a fucking thing from this. If only the pentagon were forced to pay a multi-million dollar fee to the DoS, like a private corporation would.
Re: (Score:2)
If it's a Linux based fighter it will never crash, fly well, but be missing key features like a fuel guage and gun sites. Oh, and there will be no stick to control the plane, but you will have a command line and scriptable flight controls.
"Quick Ace, j...j I said!"
If I'd spent 300 billion on a project (Score:3, Insightful)
If I'd spent 300 billion on a project that didn't deliver the goods, I might be tempted to stage an internet break in which would force the projects cancellation, saving face for all concerned.
Speaking of, how much money has been wasted on the missile defence shield? 4 years ago, they were saying 50 billion. Today I think it's up to 115 billion. And of course, it still doesn't work. (And most likely never will.)
Will we see a "break in" on that research any time soon?
didn't deliver the goods? (Score:4, Insightful)
The F-35 is barely out of R&D. It hasn't had a chance to "not deliver" yet.
Bang for my buck (Score:3, Interesting)
Re: (Score:2, Insightful)
Re: (Score:2)
Well, it's $300B, but it's not all US Taxpayer money (most of it is). The second biggest backer is the UK, and it's also being funded by Australia, Denmark, Italy, Netherlands, Norway, and Turkey. That's why it's called the JOINT Strike Fighter...we are developing it jointly with other nations.
It's been disigned to be quite versatile with several variants. The most unique thing being Vertical Take-Off and Landing (VTOL) capability, as it is intended to replace the Harrier in the UK. It also has stealth
Comment removed (Score:5, Insightful)
Open Air Policy (Score:5, Insightful)
Again reinforcing the need to return to the "Open Air Policy" that any secret or top secret network must have a "nothing but open air" between the secure system and unsecure system. Prior to the 90s many secure networks had a single cable, usually with a manual breaker, that would be enable only as a specific scheduled time, and the end point on the unsecure side was a single terminal (2 NICs, 1 to unsecure network on one subnet, then the secure network on another) where both network cards were phsyically impossible to operate at the same time (the reason for 2 NICs is the secure NIC is an encrypted card)
Seriously, you should never be able to tget from A -> B -> C where A is a public network and C is a secret or top secret network.
Hell last weekend I was at a shop where the DEV network was self contained and the only way they got code builds was compiled on the DEV network (12th floor) then sneaker-net'ed to the testing environment via optical disk (8th floor).
P.S.F.F The office on the 9th floor still has token ring... WTF who still uses Token Ring? Seriously? I mean it's friggin Token Ring... I remember working on Norwest Mortgage's (bought by Wells Fargo) token ring to ethernet conversion, what 12 years ago now... Jebus Rice that was a long time ago now it seems...
Maybe one day someone will realize... (Score:2)
...that not every network needs to be connected to the Internet. It sounds like an almost absurd idea, I know.
The real story (Score:3, Funny)
I know someone who was involved with this. They stored the project's blueprints on a video game cartridge. It could only be accessed if you played all the way through the end of the game. After that, the blueprints showed, wireframe graphics & all.
Re: (Score:2)
It sounds like you may have spent too much time watching Chuck [wikipedia.org].
What of the Rebellion? (Score:2)
General Tagge: What of the Rebellion? If the Rebels have obtained a complete technical reading of [the Joint Strike Fighter], it is possible, however unlikely, they might find a weakness and exploit it.
Darth Vader: The plans you refer to will soon be back in our hands.
Admiral Motti: Any attack made by the Rebels against [the Joint Strike Fighter] would be a useless gesture, no matter what technical data they have obtained. [The Joint Strike Fighter] is now the ultimate power in the universe. I suggest we us
Why China? (Score:2)
On second thought I didn't but still come onnnnnn...
Looks like a duck, quacks like a duck. (Score:2)
Every time info gets stolen. It's the reds, those commy bastards! Can we please move on its been 20 years.
First the Chinese are always busted with unsubtle spying operations like this, and the Chinese have aspirations of displacing the United States as a superpower. One could argue that the other block, the European Union, would be culpable but they are a JSF partner first, and have better spies anyway. If the Europeans, particularly the British, were spying on us, we just wouldn't know it.
It could be th
Will this delay Half-Life 2? (Score:2)
The question is, will this delay Half-Life 2?
Oh wait, wrong excuse.
RIAA needs to learn something (Score:2)
However it can be extremely difficult to determine the true origin because it is easy to mask identities online.
If the government acted like the RIAA some poor farmer in China with a 10 GB hard drive would already be in jail because it was clearly them who broke in to the network as the intruding IP address belonged to them.
Sometimes it is nice to see a bit of common sense involved.
costliest weapons program? (Score:2)
I'm pretty sure that doesn't hold a torch to the Manhattan project, which cost over $1B at the time. Adjust that for inflation, and it's about $1T.
Disappointed (Score:2)
It's shit like this that shakes my faith in government conspiracies and the existence of men in black.
Top Down Solution (Score:2)
So the solution is to create new high-level posts in the government. Somehow I am skeptical that this will quickly and thoroughly solve the problem.
Counterfeit Cisco Gear Perhaps? (Score:4, Informative)
Feds Seize $78M of Bogus Chinese Cisco Gear
http://slashdot.org/article.pl?sid=08/02/29/1642221 [slashdot.org]
and
FBI Says Military Had Counterfeit Cisco Routers
http://it.slashdot.org/article.pl?sid=08/05/09/164201&from=rss [slashdot.org]
Lets see, extra chips on a piece of equipment that handles all the network traffic, which would include NFS and a variety of other plain text protocols (why would someone use encryption on a "secure" network). Add to that a sprinkling of Teredo
http://en.wikipedia.org/wiki/Teredo_tunneling [wikipedia.org]
And looks to me like it's very likely that someone could steal whatever they wanted.
Good thing all our corporate suppliers are bound by contracts that would totally be enforced by this foreign government who's providing the bogus equipment. Didn't think about that, did you, stupid corporate outsourcing asshat.
-Runz
7.5 million lines of computer code (Score:3, Interesting)
Ohh, fuck
I recall one where the pilot wondered what would happen if he pressed the 'gear up' lever while still on the ground. The gear retracted and the aircraft was severely damaged.
Re: (Score:3, Funny)
There Are So many randomly capped wordS in tHAT post, I thought you were posting in code.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
the marines, the army, the navy: they all have their own fighter wings
Didn't the Air Force start out as the Army Air Force, and then break off as its own military branch?