The Patriot Files Forums  

Go Back   The Patriot Files Forums > Veterans > Veterans Concerns

Post New Thread  Reply
 
Thread Tools Display Modes
  #1  
Old 06-05-2006, 05:10 AM
SuperScout's Avatar
SuperScout SuperScout is offline
Senior Member
 

Join Date: Dec 1969
Location: Out in the country, near Dripping Springs TX
Posts: 5,734
Distinctions
VOM Contributor 
Default Off the radar screen?

Has anyone ever seen the name of the perp who stole the VA database, and then had his laptop computer etc. stolen from his home? I have yet to see his name in print, or any follow-on story about what his motivation might have been for the original theft. My personal bet is that he was filtering the last names to segregate out (no pun intended) all Hispanic surnames and Social Security numbers in order to sell them to existing wetbacks or to future wetbacks. If he's in custody, I hope that the fingernail pullers are at work getting to the bottom of this story.
__________________
One Big Ass Mistake, America

"Political correctness is a doctrine, fostered by a delusional, illogical minority, and rabidly promoted by an unscrupulous mainstream media, which holds forth the proposition that it is entirely possible to pick up a turd by the clean end."
sendpm.gif Reply With Quote
Sponsored Links
  #2  
Old 06-27-2006, 12:42 PM
Boats's Avatar
Boats Boats is offline
Senior Member
 

Join Date: Jul 2002
Location: Sauk Village, IL
Posts: 21,845
Default

Here's a piece I found but it doesn't mention the actual guys name?

Hearing on ?VA Data Privacy Breach: Twenty-Six Million People Deserve Answers?
STATEMENT OF
GEORGE J. OPFER
INSPECTOR GENERAL
DEPARTMENT OF VETERANS AFFAIRS
BEFORE
THE COMMITTEE ON VETERANS? AFFAIRS
AND
THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
UNITED STATES SENATE

MAY 25, 2006


INTRODUCTION

Mr. Chairman, Madam Chairman, and Members of the Committees, thank you for the opportunity to testify today on the loss of Department of Veterans Affairs (VA) sensitive data. I am accompanied by Jon Wooditch, Deputy Inspector General, and Mike Staley, Assistant Inspector General for Auditing. My statement will focus on the incident involving a VA employee who took home sensitive and confidential information, which was stolen when the employee?s home was burglarized. The Office of Inspector General?s (OIG) involvement in this matter involves a three-pronged approach including (1) a criminal investigation, (2) an administrative investigation of the handling of this matter once reported to the Department, and (3) a review of VA policies and procedures for using and protecting privacy data. In addition to discussing each of these reviews, I will also provide an overview of the OIG reports that have shown the need for continued improvements in addressing information security weaknesses in VA, and the status of OIG recommendations for corrective action.

On May 3, 2006, the home of a VA employee was burglarized. According to the employee, the information stolen included the names, birthdates, and social security numbers of approximately 26.5 million veterans that was stored on personally-owned computer hardware. The employee, a data analyst, was authorized access to sensitive VA information in the performance of his duties and responsibilities. He said that he routinely took such data home to work on it, and had been doing so since 2003.

CRIMINAL INVESTIGATION

On Wednesday, May 10, 2006, our Information Security Officer (ISO), while attending a routine meeting at VA Central Office, heard another ISO mention that a VA employee?s home had been burglarized and that VA electronic records may have been stolen. Following the meeting, our ISO gathered additional facts about this incident. On the following day, he submitted a written report to his supervisor for the purpose of alerting our Office of Investigations. On May 12, 2006, a criminal investigation was initiated and efforts commenced to identify and interview the employee.

On Monday, May 15, 2006, we interviewed the employee. The employee advised us that he believed that several electronic files containing veteran information stored on personally-owned computer hardware had been stolen during the burglary at his home on May 3, 2006. He thought the stolen information included the names, birthdates, and social security numbers of approximately 26.5 million veterans.

On May 16, 2006, we met with the Montgomery County Police Department who had initiated an investigation of the burglary when notified on May 3, 2006. We informed them of the suspected loss of millions of veterans? personal identifiers. We learned that detectives were actively pursuing leads developed in a number of recent residential burglaries in the employee?s neighborhood.

On May 17, 2006, we apprised the Federal Bureau of Investigation (FBI) and an Assistant United States Attorney of the details of this burglary and possible loss of data. The next day, we also faxed a letter listing these details to the FBI. Since then, we have been conducting a joint investigation with the FBI and the Montgomery County Police Department focused on the recovery of the stolen data. To date, there has been no indication that this data has been further compromised.

ADMINISTRATIVE INVESTIGATION

We have also initiated an administrative investigation to determine if notifications of the incident were made, and if those notifications were pursued in an appropriate and timely manner. We are developing a chronology of when key staff and managers were informed of the incident, what information was conveyed to these individuals, and what actions they took. We are also identifying what VA electronic data the employee stored at his home, whether the employee had an official need for the data, why he took it to his home, and who in his supervisory chain approved or had knowledge that he had done so.

We have interviewed the employee, his supervisors, project managers, and co-workers; privacy, information security, and VA law enforcement officials; Office of General Counsel attorneys, including the General Counsel; and the VA Chief of Staff. We are also reviewing electronic mail messages pertinent to the incident; notes and memoranda prepared by the employee, General Counsel, and other staff; documentation of the employee?s access to VA databases; and other pertinent documentation.

According to the employee, he likely had VA electronic data stolen during the burglary of his residence, but he was not certain of the type and extent of the specific information taken. He said he believed it contained approximately 26.5 million veterans? names, social security numbers, and dates of birth, extracted from a VA database, and possibly other smaller files containing information about individual veterans was also taken. We are currently reviewing the computer discs he used to take data home to determine what other information may have been stolen.

The employee, a data analyst, had an official need to access the records believed to have been stolen. The nature of his work was project-focused and involved manipulating large quantities of data to address certain policy issues. The employee told us he took the data home for work-related purposes. However, none of his supervisors we talked to said they were aware that the employee had taken the file containing approximately 26.5 million veterans? records to his residence.

As part of our investigation, we will determine if the work the employee was performing at home was related to his official duties, and if he had appropriate authorization to take individually-identifiable data to his residence. We will also determine if the employee complied with relevant policies and procedures in taking this information home and properly protecting it. Our report will identify what breakdowns occurred that may have hindered timely notification and follow-up of this incident. Based on our investigation, we will make recommendations for appropriate action, if warranted.

REVIEW OF LAWS, REGULATIONS, AND VA POLICIES AND PROCEDURES ON SAFEGUARDING CONFIDENTIAL INFORMATION

The recent incident raised concerns about whether the VA has adequate policies and procedures in place to protect confidential and privileged information maintained in VA?s electronic databases. Our concerns are whether VA policies are adequate to ensure compliance with information security laws, the Privacy Act and other confidentiality laws and regulations, and to identify and take action when there is a violation of law or policy. There are two sets of laws and implementing regulations to protect the integrity of confidential data ? computer security laws and confidentiality statutes. While the intent of both sets of laws is the same ? the protection of information ? the approach is different. Computer security laws ensure that the system infrastructure on which the data is maintained electronically is protected against unauthorized intrusions such as viruses and unapproved access. The Privacy Act and other confidentiality laws and regulations protect information by limiting access, use, and disclosure of records without authorization from the individual about whom the record is maintained.

To address the issues, we initiated a review to determine whether VA has effective policies in place to ensure compliance with computer security laws, the Privacy Act and other confidentiality laws and regulations, whether VA employees are aware of the policies; whether VA has adequate procedures in place to monitor compliance with the policies; and, whether the policies include an effective mechanism for reporting violations and taking appropriate action. Two areas that we are addressing in our review are policies relating to the transfer of electronic information from an employee?s VA computer to his home or alternative work site and the impact centralization versus decentralization of VA policy has on ensuring that the integrity of VA computer systems and the information stored on those systems is maintained.

The review includes identifying and reviewing applicable laws, regulations and policies, including Department-wide policies; policies issues by the Veterans Health Administration (VHA), the Veterans Benefits Administration (VBA), and other VA entities, policies issued by local VA facilities; and mandatory training modules. We are also reviewing how policies are disseminated to VA employees; whether VA employees are aware of the policies, and whether VA procedures for identifying, reporting and taking action when data has been improperly accessed or improperly used are adequate.

This review will identify strengths and weaknesses in VA?s policies implementing the provisions of computer security laws and the Privacy Act, and other confidentiality laws. We will also identify strengths and weaknesses in ensuring that VA employees are knowledgeable regarding their obligation to protect VA computer systems and information and that they will be held accountable for violations. We will make recommendations for improvement to ensure that data maintained by VA is protected from unwarranted intrusion and disclosure.

SUMMARY OF OIG REPORTS ADDRESSING INFORMATION SECURITY WEAKNESSES

We have conducted a number of audits and evaluations on information management security and information technology (IT) systems that have shown the need for continued improvements in addressing security weaknesses. My office has reported VA information security controls as a material weakness in its annual Consolidated Financial Statement (CFS) audits since before fiscal year (FY) 2001. Our Federal Information Security Management Act (FISMA) reviews have identified significant information security vulnerabilities since FY 2001 that place VA at risk of denial of service attacks, disruption of mission-critical systems, and unauthorized access to sensitive data. We continue to report security weaknesses and vulnerabilities at VA health care facilities and VA regional offices where security issues were evaluated during our Combined Assessment Program (CAP) reviews.

Consolidated Financial Statement Audits Continue to Report Information Security as a Material Weakness

Pursuant to the Chief Financial Officers Act of 1990, the VA consolidated financial statements are audited annually. We contract with an independent public accounting firm to perform this audit. As part of the audit, the contractor follows Government Accountability Office methodology to assess the effectiveness of computer controls. The contractor conducts audits at VA?s three information technology centers and selected regional offices and medical centers.

As part of the CFS audit, IT security controls have been reported as a material weakness for many years. A material weakness is defined as a weakness in internal control of VA systems that could have a material effect on the financial statements and not be detected by employees in the normal course of their business. We have reported that VA?s program and financial data are at risk due to serious problems related to VA?s control and oversight of access to its information systems. By not controlling and monitoring employee access, not restricting users to only need-to-know data, and not timely terminating accounts upon employee departure, VA has not prevented potential risk. These weaknesses placed sensitive information, including financial data and sensitive veteran medical and benefit information, at risk, possibly without detection of inadvertent or deliberate misuse, fraudulent use, improper disclosure, or destruction.

As a result of these weaknesses, we made recommendations that VA pursue a more centralized approach, apply appropriate resources, and establish a clear chain of command and accountability structure to implement and enforce IT internal controls. We also recommended that VA improve access control policies and procedures for configuring security settings on operating systems, improve administration of user access, and detect and resolve potential access violations. Finally, we recommended that VA conform access privileges to the user?s level of responsibility and position.

VA has implemented some recommendations for specific locations identified but has not proactively made corrections VA-wide. For example, we found violations of password policies which management immediately corrected, but in following years, we found similar violations at other facilities. We also found instances of terminated or separated employees with access to critical systems identified at various locations which management corrected, only to discover similar instances elsewhere.

Evaluations of VA?s Information Security Program Have Identified Serious Vulnerabilities for Several Years that Remain Uncorrected

FISMA requires us to annually review the progress of the information technology and security program of the Department and report the results to the Office of Management and Budget. As part of the FISMA review, we conduct scanning and penetration tests of selected VA systems to assess controls for monitoring and accessing systems, and reviews of physical, personnel, and electronic security. We visit all three major IT centers and selected VHA and VBA sites.

In all four audits of the VA Security Program issued since 2001, we reported serious vulnerabilities that remain uncorrected. These reports highlight specific vulnerabilities that can be exploited, but the recurring themes in these reports are the need for centralization, remediation, and accountability in VA information security. Since the FY 2001 report, we reported weaknesses in physical security, electronic security, wireless security, personnel security, and FISMA reporting. Additionally, we have reported significant issues with implementation of security initiatives VA-wide. The status of unimplemented recommendations was discussed in subsequent audits.

The FY 2004 audit once again emphasized the need to centralize the IT security program, implement security initiatives, and close security vulnerabilities. We recognized that the CIO?s office needed to be fully staffed, and that funding delays and resistance by offices to relinquish their own security functions and activities delayed implementation of the fully centralized CIO contemplated by our prior recommendations. The CIO?s comments to the report referenced an April 2004 VA General Counsel opinion that held the CIO lacked the authority to enforce compliance with the VA information security program as one reason he could not address vulnerabilities. We again recommended that VA fully implement and fund a centralized VA-wide IT security program.

In total, the FY 2004 report included 16 recommendations: (1) centralize IT security programs; (2) implement an effective patch management program; (3) address security vulnerabilities of unauthorized access and misuse of sensitive information and data throughout VA demonstrated during OIG field testing; (4) ensure position descriptions contain proper data access classification; (5) obtain timely, complete background investigations; and complete the following security initiatives on (6) intrusion detection systems, (7) infrastructure protection actions, (8) data center contingency planning, (9) certification and accreditation of systems, (10) upgrading/terminating external connections, (11) improvement of configuration management, (12) moving VACO data center, (13) improvement of application program/operating system change controls, (14) limiting physical access to computer rooms, (15) wireless devices, and (16) electronic transmission of sensitive veteran data. As of May 23, 2006, all recommendations from this report remain open.

Finally, in FY 2006, after Congress mandated full centralization of IT security under the CIO, as we advocated in our reports since 2001, VA is now moving out on a truly empowered centralized CIO. We have provided our draft FY 2005 audit report to the Department and are working with the Department to resolve all outstanding recommendations. We have grouped our recommendations into two categories?the CIO?s authority under centralization and longstanding vulnerabilities. With a centralized CIO with direct line authority to implement the needed fixes, we believe VA has a unique opportunity to successfully address all the vulnerabilities and weaknesses discussed in our reports since 2001.

We believe centralization is essential because standardization is the key to fixing VA information security weaknesses. As long as three stove-piped administrations and other smaller component organizations are free to operate in the IT environment on their own within VA?accountable not to the CIO but to other line managers who themselves are not accountable to the VA CIO?the vulnerabilities cannot be effectively resolved.

CAP Reviews Continue to Show Information System Security Vulnerabilities Continue to Exist

We continue to identify instances where out-based employees send veteran medical information to the VA regional office via unencrypted e-mail; system access for separated employees is not terminated; monitoring remote network access and usage does not routinely occur; and off duty users? access to VA computer systems and sensitive information is not restricted. We continue to make recommendations to improve security and contingency plans, control access to information systems, complete background investigations and annual security awareness training, and improve physical security controls.

While individual and regional managers have concurred with these CAP recommendations, and our follow-up process confirms actions to resolve the specific conditions identified at these sites, we continue to find that corrective actions are not applied to all facilities to correct conditions nationwide. Consequently, we continue to find these systemic conditions at other sites we visit. For example, between FYs 2000 to 2005 the CAP program identified IT and security deficiencies in 141 of 181 VHA facilities. We identified IT and security deficiencies at 37 of 55 VBA facilities.

CLOSING

In closing, I would like to assure the Committee that this matter will remain a very high priority for the OIG until it is resolved. I will ensure that all the resources that are needed to complete our reviews in a thorough and timely manner will remain dedicated to the goal of recovering the stolen data and protecting our Nation?s veterans.

Mr. Chairman, Madam Chairman, and Members of the Committees, thank you again for this opportunity and I would be pleased to answer any questions that you may have.

It's more than I knew a little while ago.
__________________
Boats

O Almighty Lord God, who neither slumberest nor sleepest; Protect and assist, we beseech thee, all those who at home or abroad, by land, by sea, or in the air, are serving this country, that they, being armed with thy defence, may be preserved evermore in all perils; and being filled with wisdom and girded with strength, may do their duty to thy honour and glory; through Jesus Christ our Lord. Amen.

"IN GOD WE TRUST"
sendpm.gif Reply With Quote
  #3  
Old 06-27-2006, 12:47 PM
Boats's Avatar
Boats Boats is offline
Senior Member
 

Join Date: Jul 2002
Location: Sauk Village, IL
Posts: 21,845
Default

Now here's a congressman who speaks on our behalf. I found this article and thought you'd find it interesting.

Jun 14, 2006

VA takes a cussin' from a congressman

By JAMES W. CRAWLEY

Media General News Service

WASHINGTON ? A top Democratic congressman cussed out Veterans Affairs Department officials Tuesday during a news conference staged in front of the VA headquarters.

Rep. Bob Filner, D-Calif., a senior Democrat on the House Veterans Affairs Committee, criticized the VA?s handling of the theft of personal information of 26.5 million veterans and military personnel.

He started swearing when a VA spokesman questioned whether the congressman had served the country and accused Filner of ?political grandstanding.?

?You guys have f----- it up. Get back to work,? said Filner. ?And, don?t cover your a-- with these things,? referring to VA notification letters to veterans.

Filner and Reps. John Salazar, D-Colo., and Darlene Hooley, D-Ore., lambasted the agency?s handling of the May 3 theft of a laptop computer, loaded with names, Social Security numbers and other information about veterans and military personnel.

The theft was announced publicly May 22 and, so far, the stolen data have not been found. No confirmed cases of identity theft connected to the stolen computer have been reported.

Yesterday, VA officials said the agency has finished sending notification letters to affected veterans.

Only 16.5 million notices were mailed out, said VA spokesman Matthew Burns. Another 8 million names without addresses or other information also were on the computer, but VA officials cannot determine where they live. And, Burns added, another 2 million names were duplicates.

The VA has no plans for further mailings.

Tuesday?s news conference started out in typical Washington fashion -- three congressmen, surrounded by a few reporters. They brought two boxes of envelopes as a prop for their news briefing.

The VA?s Burns, Assistant Veterans Affairs Secretary Lisette Mondello and several others hovered nearby.

?This is the Katrina of the VA,? said Filner, who is serving as the senior Democrat on the veterans? panel because Rep. Lane Evans, D-Ill., is incapacitated by Parkinson?s disease.

Salazar and Hooley touted legislation requiring free fraud alerts and freezes on veterans? credit reports and additional free credit monitoring.

?We have to do everything we can to protect our veterans; they?ve protected us,? Hooley said.

After the House members finished, Burns answered questions as Filner listened.

The spokesman accused Filner of political grandstanding and impugning VA Secretary Jim Nicholson?s military service. Burns also questioned the congressman?s service.

?I?ve served this country,? said Filner, a seven-term congressman who is not a veteran. ?Don?t question my service to this country.?

That?s when the profanity started.

Filner used the F-word once and variations of ?cover your a--? at least three times.

The VA?s Mondello said Filner?s comments and demeanor embarrassed her.

It is unusual for a congressman to use profanity in public. It?s also rare for agency officials to openly criticize a senior member of a congressional committee that oversees their department.

The verbal battle may just be starting. VA officials are scheduled to appear five times before the House VA committee during the next two weeks.

James W. Crawley is a national correspondent in Media General's Washington Bureau. E-mail Crawley at jcrawley@mediageneral.com
__________________
Boats

O Almighty Lord God, who neither slumberest nor sleepest; Protect and assist, we beseech thee, all those who at home or abroad, by land, by sea, or in the air, are serving this country, that they, being armed with thy defence, may be preserved evermore in all perils; and being filled with wisdom and girded with strength, may do their duty to thy honour and glory; through Jesus Christ our Lord. Amen.

"IN GOD WE TRUST"
sendpm.gif Reply With Quote
  #4  
Old 06-27-2006, 12:52 PM
Boats's Avatar
Boats Boats is offline
Senior Member
 

Join Date: Jul 2002
Location: Sauk Village, IL
Posts: 21,845
Default

This one seems to be pretty recent you may have already read it before:

Jun 07, 2006

VA data scandal spreads

By JAMES W. CRAWLEY

Media General News Service

WASHINGTON ? The VA?s data scandal exploded Tuesday when officials revealed that nearly 2.2 million active-duty soldiers, National Guardsmen and reservists are also vulnerable to identity theft.

Five weeks ago today, a laptop containing the names, birthdates and Social Security numbers of 26.5 million people was stolen from a Veterans Affairs Department employee?s suburban Maryland home.

VA officials said Tuesday that a comparison of VA and Pentagon databases indicated information on 1.1 million active-duty service members, 430,000 Guardsmen and 645,000 reservists was also in the stolen database.

Details were sketchy, but officials said information about military personnel eligible for the GI Bill and VA home loans was included.

?VA remains committed to providing updates as new information is learned,? said VA Secretary Jim Nicholson in a written statement.

At first, VA officials believed only veterans discharged after 1975 were affected. Last week, officials said names of some spouses, reservists, sailors and older vets exposed to mustard gas during testing also were stolen.

Although no illegal usage has been reported, the laptop is still missing. A $50,000 reward has been offered, and investigations by county police and FBI agents continue.

Tuesday, five veterans? organizations filed a class-action lawsuit against the VA in federal court here. The lawsuit seeks $1,000 for each affected veteran ? totaling $26.5 billion.

?If the VA can?t solve the problem, maybe the courts can help,? said John Rowan, Vietnam Veterans of America president and a plaintiff.

A coalition of health privacy groups wants the Department of Health and Human Services to investigate whether the VA violated the federal health privacy law.

And, the VA has begun mailing out notices to affected veterans regarding the theft, said spokesman Matthew Burns.

Geography matters for veterans and service members worried about their identity being stolen.

Residents of 11 states, including North Carolina, have added protection against identity theft and credit card fraud that other consumers lack.

Someone living in Greenville, N.C., may be better off than a resident of Greenville, S.C. or Greenville, Fla., or Greenville, Ala., because North Carolina allows a ?security freeze? on credit bureau reports while South Carolina, Florida and Alabama do not.

?It serves as a padlock on a credit report to keep thieves from taking out loans in a victim?s name,? said Roy Cooper, North Carolina attorney general.

Security freezes, said privacy rights advocate Beth Givens, ?are the ultimate identity theft protection.?

But only vets living in North Carolina, California, Connecticut, Illinois, Louisiana, Maine, Nevada, New Jersey, Texas, Vermont, and Washington state can place a freeze on their reports.

In effect, a security freeze blocks banks, lenders and retailers from accessing a person?s credit report at the three major credit reporting firms ? Equifax, Experian and TransUnion. Without a report, firms will reject a loan or credit card application, said Givens, director of the Privacy Rights Clearinghouse.

A security freeze is free for identity theft victims in those states. Some of the 11 states also allow anyone to pay $10 to each credit bureau to block unwanted access.

North Carolina?s Cooper said the law is ?a great preventative measure.?

Cooper wants state legislators to amend the law so veterans can get free security freezes. Until then, state vets will have to pay the fee because state law covers only documented cases of identify theft.

Those living in any state may place a fraud alert on their credit file. The alert urges lenders to verify identification.

To assist veterans who want to put an alert or freeze on their credit files, Montgomery County, Md., police have put a letter on its Web site that veterans can download and file with credit bureaus.

The Web site is:http://www.montgomerycountymd.gov/co...ran_Letter.pdf

James W. Crawley is a national correspondent in Media General's Washington Bureau. E-mail Crawley at jcrawley@mediageneral.com
__________________
Boats

O Almighty Lord God, who neither slumberest nor sleepest; Protect and assist, we beseech thee, all those who at home or abroad, by land, by sea, or in the air, are serving this country, that they, being armed with thy defence, may be preserved evermore in all perils; and being filled with wisdom and girded with strength, may do their duty to thy honour and glory; through Jesus Christ our Lord. Amen.

"IN GOD WE TRUST"
sendpm.gif Reply With Quote
  #5  
Old 06-27-2006, 04:39 PM
Gimpy's Avatar
Gimpy Gimpy is offline
Senior Member
 

Join Date: Aug 2001
Location: Baileys Bayou, FL. (tarpon springs)
Posts: 4,498
Distinctions
VOM Contributor 
Default Thanks

Boats.

Looks like you really did a lot of work gathering this info.

Hopefully it'll help other folks understand this situation
__________________


Gimpy

"MUD GRUNT/RIVERINE"


"I ain't no fortunate son"--CCR


"We have shared the incommunicable experience of war..........We have felt - we still feel - the passion of life to its top.........In our youth our hearts were touched with fire"

Oliver Wendell Holmes, Jr.
sendpm.gif Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Similar Threads
Thread Thread Starter Forum Replies Last Post
Screen cleaner QM3steve General Posts 1 05-15-2005 06:08 AM
US Jets Fly Into Iran - Test Iran's Radar Defenses? MORTARDUDE General Posts 11 09-08-2004 06:14 AM
Pearl Harbor Radar Operator Elliott Dies MORTARDUDE General Posts 0 12-24-2003 07:15 AM
Sue Radar Mfrs? JeffL Cold War 0 10-08-2002 01:43 PM
Off the Radar Screen SuperScout Enduring Freedom 5 06-20-2002 12:29 PM

All times are GMT -7. The time now is 05:11 AM.


Powered by vBulletin, Jelsoft Enterprises Ltd.