What's new

Kill Switch Killed in Kamra

Putting a kill switch on a major weapon system is akin to signing your own death warrant or bankruptcy as a defense manufacturer. Nobody will EVER buy from that company again.

As such this fiction needs to be kept in the fiction section. What suppliers can possibly do is to provide specifications/frequencies and encryption algorithms of systems provided to the end users to a third party under political pressure. In that case too, it does not render the systems useless.

An example of this is what the French did for the British with regards to the Exocet system during the Falklands war.

It is no longer a fiction. America do implant "beacons" in its equipment. No It didnt kill the reputation of the company back then and it is still a fortune 500 company. Because people and governments dont care that America is implanting chips in to the hardware being shipped to them.

Photos of an NSA “upgrade” factory show Cisco router getting implant
Servers, routers get “beacons” implanted at secret locations by NSA’s TAO team.

SEAN GALLAGHER - 5/14/2014, 10:30 PM

nsa-pwn-cisco-640x373.jpg

NSA techs perform an unauthorized field upgrade to Cisco hardware in these 2010 photos from an NSA document.
259WITH 170 POSTERS PARTICIPATING
FURTHER READING
NSA hacker in residence dishes on how to “hunt” system admins
A document included in the trove of National Security Agency files released with Glenn Greenwald’s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers, and other network gear being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they’re delivered.

These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”

The document, a June 2010 internal newsletter article by the chief of the NSA’s Access and Target Development department (S3261) includes photos (above) of NSA employees opening the shipping box for a Cisco router and installing beacon firmware with a “load station” designed specifically for the task.

The NSA manager described the process:

Here’s how it works: shipments of computer network devices (servers, routers, etc,) being delivered to our targets throughout the world are intercepted. Next, they are redirected to a secret location where Tailored Access Operations/Access Operations (AO-S326) employees, with the support of the Remote Operations Center (S321), enable the installation of beacon implants directly into our targets’ electronic devices. These devices are then re-packaged and placed back into transit to the original destination. All of this happens with the support of Intelligence Community partners and the technical wizards in TAO.

https://arstechnica.com/tech-policy...show-cisco-router-getting-implant/?comments=1



How the NSA snooped on encrypted Internet traffic for a decade
Exploit against Cisco's PIX line of firewalls remotely extracted crypto keys.

DAN GOODIN - 8/19/2016, 11:11 PM

nsa-hq-800x624.jpg

Enlarge
NSA
120WITH 70 POSTERS PARTICIPATING, INCLUDING STORY AUTHOR
In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have uncovered an attack that remotely extracts decryption keys from the company's now-decommissioned line of PIX firewalls.

The discovery is significant because the attack code, dubbed BenignCertain, worked on PIX versions Cisco released in 2002 and supported through 2009. Even after Cisco stopped providing PIX bug fixes in July 2009, the company continued offering limited service and support for the product for an additional four years. Unless PIX customers took special precautions, virtually all of them were vulnerable to attacks that surreptitiously eavesdropped on their VPN traffic. Beyond allowing attackers to snoop on encrypted VPN traffic, the key extraction also makes it possible to gain full access to a vulnerable network by posing as a remote user.

BenignCertain's capabilities were tentatively revealed in this blog post from Thursday, and they were later confirmed to work on real-world PIX installations by three separate researchers. Before the confirmation came, Ars asked Cisco to investigate the exploit. The company declined, citing this policy for so-called end-of-life products. The exploit helps explain documents leaked by NSA contractor Edward Snowden and cited in a 2014 article that appeared in Der Spiegel. The article reported that the NSA had the ability to decrypt more than 1,000 VPN connections per hour.

"It shows that the NSA had the ability to remotely extract confidential keys from Cisco VPNs for over a decade," Mustafa Al-Bassam, a security researcher at payments processing firm Secure Trading, told Ars. "This explains how they were able to decrypt thousands of VPN connections per minute as shown in documents previously published by Der Spiegel."

The revelation is also concerning because data returned by the Shodan search engine indicate more than 15,000 networks around the world still use PIX, with the Russian Federation, the US, and Australia being the top three countries affected. Last weekend's release of BenignCertain and dozens of other NSA-connected attack tools means even relatively low-skilled hackers can now carry out the same advanced attack. Analysis of the exploit binary shows BenignCertain targeted PIX versions 5.3(9) through 6.3(4). The researchers, however, were able to make the key-extraction technique work against version 6.3(5) as well.

https://arstechnica.com/information...-exploit-shows-how-nsa-decrypted-vpn-traffic/


This is just the tip of iceberg how Americans exploited their own products to spy on allies and adversaries alike. Do you know the Whatever American Network/IT gear that is shipped comes with a warning? that cryptography in the device is intentionally weak than what is used in America? Because As per american laws , exporting stronger cryptographic devices is prohibited.

So defense systems can have Beacons installed in it which sends data back to its Master source. Not a kill switch but a device to keep tabs on someone

Link-16, MIDS, Sniper and EW pods of PAF F-16 requires encryption keys to work. And these keys are provided to Pakistan by USA. So IF USA dont provide the encryption keys, the equipment will not work as intended and if they the provide the keys it means they got an upper hand in knowing what you are doing. So Yes, American firms doesnt care about such things because they know No one will stop from buying them and this is true!



USA last year Reprimanded Pakistan for Transferring Block-52 to Unauthorized Bases and FOB's It was a wartime scenario hence they let it slide and didnt needle Pakistan much

State Department Reprimanded Pakistan for Misusing F-16s, Document Shows

A source who viewed the August letter, written by Andrea Thompson, then-undersecretary of State for Arms Control and International Security Affairs,

Addressed to the head of the Pakistani air force, Air Chief Marshal Mujahid Anwar Khan, the letter began by relaying the State Department's confirmation that Pakistan had moved the F-16s and accompanying American-made missiles to unapproved forward operating bases in defiance of its agreement with the U.S. Using diplomatic language, Thompson, who has since left government, warned the Pakistanis that their behavior risked allowing these weapons to fall into the hands of malign actors and "could undermine our shared security platforms and infrastructures."

Thompson, a career military intelligence officer who first entered the administration as Vice President Mike Pence's national security adviser, admonished Pakistan in the letter for having "relocated, maintained and operated" the American made F-16s and the AMRAAM missiles they use from forward operating bases not approved under the original terms of the sale. The former Army colonel, who left the White House in September, also expressed concern at the access Pakistani officials allowed American weapons inspectors.
The History Behind Kashmir

"While we understand from you that these aircraft movements were done in support of national defense objectives," Thompson wrote in the letter, "the U.S. government considers the relocation of aircraft to non-U.S. government authorized bases concerning and inconsistent with the F-16 Letter of Offer and Acceptance."

"Such actions could subject sensitive U.S.-technologies to diversion to or access by third parties, and could undermine our shared security platforms and infrastructures," Thompson wrote.

In her letter, Thompson raised concerns about American access to the bases and the U.S.-made equipment there. She said it had been four years since Office of Defense Representative–Pakistan – the office that carries out defense cooperation with partner countries – had been allowed to perform an assessment of the security vulnerabilities on the Pakistani bases

https://www.usnews.com/news/world-r...n-in-august-for-misusing-f-16s-document-shows


So If we are seeing a fully loaded Block-52 in Kamra, it simply means that Kamra is on the approved and authorized list of Airbases that it can visit peacetime. And doesnt let Americans moans once again that Pakistan is violating the agreement by not reporting f-16 movement.



 
.
Putting a kill switch on a major weapon system is akin to signing your own death warrant or bankruptcy as a defense manufacturer. Nobody will EVER buy from that company again.

As such this fiction needs to be kept in the fiction section. What suppliers can possibly do is to provide specifications/frequencies and encryption algorithms of systems provided to the end users to a third party under political pressure. In that case too, it does not render the systems useless.

An example of this is what the French did for the British with regards to the Exocet system during the Falklands war.
You are stating this because Now you know about it. You will talk about kill switch capability when it’s too late. Now I don’t think US will do any such thing, unless it’s own national interest are Directly threatened.

I have noticed a mind set difference, Gora draw conclusions on possibilities, do assessments on calculated risk and work around it to mitigate negative consequences. Our Desi pundit mentality is of denial. Finding excuses in the past, and hoping it will never happened.

Putting a kill switch on a major weapon system is akin to signing your own death warrant or bankruptcy as a defense manufacturer. Nobody will EVER buy from that company again.


#1. Kill switch doesn’t mean, there will be Kill switch activated message appear on the hood and boom, world will line up to isolate US.

#2. Kill switch mean, rendering equipment inoperable by introducing system glitch into sub systems that PAF will never be able to figure out. PAF most probably will think it as usual maintenance issue needing OEM maintenance.

#3. Even if US openly introduce and admit Activating kill switch anywhere. Their word game of international politics and quality of product will justify their actions for average buyer in line. I.e, despite sanctions In 90s, PAF ran back to US for more F-16s. Another examples, Iranian rushing to place $100 billions Commercial aircraft deal with Boeing, despite being under hard sanctions for decades, regardless for future risk assessment.

It is no longer a fiction. America do implant "beacons" in its equipment. No It didnt kill the reputation of the company back then and it is still a fortune 500 company. Because people and governments dont care that America is implanting chips in to the hardware being shipped to them.

Photos of an NSA “upgrade” factory show Cisco router getting implant
Servers, routers get “beacons” implanted at secret locations by NSA’s TAO team.

SEAN GALLAGHER - 5/14/2014, 10:30 PM

nsa-pwn-cisco-640x373.jpg

NSA techs perform an unauthorized field upgrade to Cisco hardware in these 2010 photos from an NSA document.
259WITH 170 POSTERS PARTICIPATING
FURTHER READING
NSA hacker in residence dishes on how to “hunt” system admins
A document included in the trove of National Security Agency files released with Glenn Greenwald’s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers, and other network gear being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they’re delivered.

These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”

The document, a June 2010 internal newsletter article by the chief of the NSA’s Access and Target Development department (S3261) includes photos (above) of NSA employees opening the shipping box for a Cisco router and installing beacon firmware with a “load station” designed specifically for the task.

The NSA manager described the process:

Here’s how it works: shipments of computer network devices (servers, routers, etc,) being delivered to our targets throughout the world are intercepted. Next, they are redirected to a secret location where Tailored Access Operations/Access Operations (AO-S326) employees, with the support of the Remote Operations Center (S321), enable the installation of beacon implants directly into our targets’ electronic devices. These devices are then re-packaged and placed back into transit to the original destination. All of this happens with the support of Intelligence Community partners and the technical wizards in TAO.

https://arstechnica.com/tech-policy...show-cisco-router-getting-implant/?comments=1



How the NSA snooped on encrypted Internet traffic for a decade
Exploit against Cisco's PIX line of firewalls remotely extracted crypto keys.

DAN GOODIN - 8/19/2016, 11:11 PM

nsa-hq-800x624.jpg

Enlarge
NSA
120WITH 70 POSTERS PARTICIPATING, INCLUDING STORY AUTHOR
In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have uncovered an attack that remotely extracts decryption keys from the company's now-decommissioned line of PIX firewalls.

The discovery is significant because the attack code, dubbed BenignCertain, worked on PIX versions Cisco released in 2002 and supported through 2009. Even after Cisco stopped providing PIX bug fixes in July 2009, the company continued offering limited service and support for the product for an additional four years. Unless PIX customers took special precautions, virtually all of them were vulnerable to attacks that surreptitiously eavesdropped on their VPN traffic. Beyond allowing attackers to snoop on encrypted VPN traffic, the key extraction also makes it possible to gain full access to a vulnerable network by posing as a remote user.

BenignCertain's capabilities were tentatively revealed in this blog post from Thursday, and they were later confirmed to work on real-world PIX installations by three separate researchers. Before the confirmation came, Ars asked Cisco to investigate the exploit. The company declined, citing this policy for so-called end-of-life products. The exploit helps explain documents leaked by NSA contractor Edward Snowden and cited in a 2014 article that appeared in Der Spiegel. The article reported that the NSA had the ability to decrypt more than 1,000 VPN connections per hour.

"It shows that the NSA had the ability to remotely extract confidential keys from Cisco VPNs for over a decade," Mustafa Al-Bassam, a security researcher at payments processing firm Secure Trading, told Ars. "This explains how they were able to decrypt thousands of VPN connections per minute as shown in documents previously published by Der Spiegel."

The revelation is also concerning because data returned by the Shodan search engine indicate more than 15,000 networks around the world still use PIX, with the Russian Federation, the US, and Australia being the top three countries affected. Last weekend's release of BenignCertain and dozens of other NSA-connected attack tools means even relatively low-skilled hackers can now carry out the same advanced attack. Analysis of the exploit binary shows BenignCertain targeted PIX versions 5.3(9) through 6.3(4). The researchers, however, were able to make the key-extraction technique work against version 6.3(5) as well.

https://arstechnica.com/information...-exploit-shows-how-nsa-decrypted-vpn-traffic/


This is just the tip of iceberg how Americans exploited their own products to spy on allies and adversaries alike. Do you know the Whatever American Network/IT gear that is shipped comes with a warning? that cryptography in the device is intentionally weak than what is used in America? Because As per american laws , exporting stronger cryptographic devices is prohibited.

So defense systems can have Beacons installed in it which sends data back to its Master source. Not a kill switch but a device to keep tabs on someone

Link-16, MIDS, Sniper and EW pods of PAF F-16 requires encryption keys to work. And these keys are provided to Pakistan by USA. So IF USA dont provide the encryption keys, the equipment will not work as intended and if they the provide the keys it means they got an upper hand in knowing what you are doing. So Yes, American firms doesnt care about such things because they know No one will stop from buying them and this is true!



USA last year Reprimanded Pakistan for Transferring Block-52 to Unauthorized Bases and FOB's It was a wartime scenario hence they let it slide and didnt needle Pakistan much

State Department Reprimanded Pakistan for Misusing F-16s, Document Shows

A source who viewed the August letter, written by Andrea Thompson, then-undersecretary of State for Arms Control and International Security Affairs,

Addressed to the head of the Pakistani air force, Air Chief Marshal Mujahid Anwar Khan, the letter began by relaying the State Department's confirmation that Pakistan had moved the F-16s and accompanying American-made missiles to unapproved forward operating bases in defiance of its agreement with the U.S. Using diplomatic language, Thompson, who has since left government, warned the Pakistanis that their behavior risked allowing these weapons to fall into the hands of malign actors and "could undermine our shared security platforms and infrastructures."

Thompson, a career military intelligence officer who first entered the administration as Vice President Mike Pence's national security adviser, admonished Pakistan in the letter for having "relocated, maintained and operated" the American made F-16s and the AMRAAM missiles they use from forward operating bases not approved under the original terms of the sale. The former Army colonel, who left the White House in September, also expressed concern at the access Pakistani officials allowed American weapons inspectors.
The History Behind Kashmir

"While we understand from you that these aircraft movements were done in support of national defense objectives," Thompson wrote in the letter, "the U.S. government considers the relocation of aircraft to non-U.S. government authorized bases concerning and inconsistent with the F-16 Letter of Offer and Acceptance."

"Such actions could subject sensitive U.S.-technologies to diversion to or access by third parties, and could undermine our shared security platforms and infrastructures," Thompson wrote.

In her letter, Thompson raised concerns about American access to the bases and the U.S.-made equipment there. She said it had been four years since Office of Defense Representative–Pakistan – the office that carries out defense cooperation with partner countries – had been allowed to perform an assessment of the security vulnerabilities on the Pakistani bases

https://www.usnews.com/news/world-r...n-in-august-for-misusing-f-16s-document-shows


So If we are seeing a fully loaded Block-52 in Kamra, it simply means that Kamra is on the approved and authorized list of Airbases that it can visit peacetime. And doesnt let Americans moans once again that Pakistan is violating the agreement by not reporting f-16 movement.


Every major US IT company, Apple, WhatsApp, Microsoft, FB are part Of Data mining operation. US use different secret federal court order to coerce those that doesn’t not comply willingly. Those that do are rewarded with succeed and Federal contracts and protection. Govt help them to success and become a global data mining social tool ( always for free). Whereas they ban Russian kesperkey and Chinese Hardware to do the same.
 
.
USA last year Reprimanded Pakistan for Transferring Block-52 to Unauthorized Bases and FOB's It was a wartime scenario hence they let it slide and didnt needle Pakistan much
Hopefully we have updated the list of FOB's to the Americans by now
 
.
Pakistan can use the F-16 as it wishes, more or less, except basing them with Chinese aircraft.

That is a completely different issue than kill switches.

Kill switches mean that the US can, if they choose to, disable or degrade the functionality of the F-16s. Turkey found bugs in their F-16s. If US can do that to Turkey, somehow respectable members find it hard to believe it won't happen to PAF, because... "Pakistan Stronk".

This is blind patriotism and not based on an objective analysis of reality.

Hi,

Thank you for explaining it a millionth time---.

It is so difficult to make the pakistanis think intelligent---.
 
.
Why do you think Turkey is reluctant to get F-35 Trojan horses?? And, that too burning her own money...

The US folks are great at two stuffs - marketing (they can even sell Trojan horses, traitors, terrorists etc) and legal (usually put in miniscule fonts using the toughest sentence construction and vocabulary possible to deliver multiple meanings favoring only the US side)....

Few ASELSAN engineers embraced Shehadet via assassination to make the TurAF F16s Ozgur (Free). For a reason the avionics is called Ozgur for its the worth the price....

Remember an Egyptian F16 has been recently brought down. More to follow....
I heard differently. TuAF pilots and maintainers want the F-35 to come. Plus TUAS also manufactures some of the internal systems for the F-35 program. The Russian folks are not as clean too, it will come with more hidden demands, the American side is just more documented.
 
.
Just got this message
Yea, every F-16 operator must have visited you car garage for advise that you consider yourself above others.
As a senior PAF officer told me, technically there is a chip even in your mobile phone so what's the big deal if there is one in the aircraft system.....it may give location of the aircraft to the mothership but that doesn't mean they switch off your engine mid flight.

No,

No one on my side or myself has ever claimed that---.

Over the years I have explained it at great lengths about the " kill switch "..

Your senior Paf officer does not know diddley sh-it.

It is the US homeland security agency's requirement to have any and every US built equipment that flies to have a MANDATORY " kill switch " since 2008. All older equipment refurbished must have that.

Any aircraft flying into the UF---yessir---your civilian aircrafts also need to have " kill switches ".
 
.
Just got this message


No,

No one on my side or myself has ever claimed that---.

Over the years I have explained it at great lengths about the " kill switch "..

Your senior Paf officer does not know diddley sh-it.

It is the US homeland security agency's requirement to have any and every US built equipment that flies to have a MANDATORY " kill switch " since 2008. All older equipment refurbished must have that.

Any aircraft flying into the UF---yessir---your civilian aircrafts also need to have " kill switches ".
With all due respect sir, that senior PAF officer definitely has a better idea than your shit, even though your shit is also theoretically is possible. Like you'd know your shit regarding automobiles whereas he'd know his equipment far better than you would. The last shit regarding "kill switches", probably a different term regarding civilian aircraft but there are certain sealed devices that only give information specific to the OEM. This is not just in US built aircraft but everywhere else too. Think the Chinese or French are that clean.......

Just remember the MIL STD buses are very much uniform and same across all platforms when acquiring the same kind of equipment.

Cheers !!!

Hi,

Thank you for explaining it a millionth time---.

It is so difficult to make the pakistanis think intelligent---.
Haha sir you are or were Pakistani too. Have you become intelligent with time if you meant it sarcastically.
 
Last edited:
. .
With all due respect sir, that senior PAF officer definitely has a better idea than your shit, even though your shit also theoretically is possible. Like you'd know your shit regarding automobiles whereas he'd know his equipment far better than you would. The last shit regarding "kill switches", probably a different term regarding civilian aircraft but there are certain sealed devices that only give information specific to the OEM. This is not just in US built aircraft but everywhere else too. Think the Chinese or French are that clean.......

Just remember the MIL STD buses are very much uniform and same across all platforms when acquiring the same kind of equipment.

Cheers !!!


Haha sir you are or were Pakistani too. Have you become intelligent with time if you meant it sarcastically.

Hi,

No he don't have more information than me---. His exposure to literature is very limited than me. Just because he wears a uniform does not mean he has more information than me---.

There are many a general ranked illiterate officers in pak military---including air force as well---. So please don't dwell on that---.

With all due respect sir, that senior PAF officer definitely has a better idea than your shit, even though your shit also theoretically is possible. Like you'd know your shit regarding automobiles whereas he'd know his equipment far better than you would. The last shit regarding "kill switches", probably a different term regarding civilian aircraft but there are certain sealed devices that only give information specific to the OEM. This is not just in US built aircraft but everywhere else too. Think the Chinese or French are that clean.......

Just remember the MIL STD buses are very much uniform and same across all platforms when acquiring the same kind of equipment.

Cheers !!!


Haha sir you are or were Pakistani too. Have you become intelligent with time if you meant it sarcastically.

Hi

The word "Pakistani" is sort of a mindset that only believes what Abbaji, Baray abbaji, Chacha Ji or older brother has said---.
 
.
Hi,

No he don't have more information than me---. His exposure to literature is very limited than me. Just because he wears a uniform does not mean he has more information than me---.

There are many a general ranked illiterate officers in pak military---including air force as well---. So please don't dwell on that---.



Hi

The word "Pakistani" is sort of a mindset that only believes what Abbaji, Baray abbaji, Chacha Ji or older brother has said---.
He wears a uniform AND he has done multiple courses to be flying the aircraft operationally. Trust me on this, he has a better idea than you do.

I don't care about the general ranked illiterate officers they are more or less in the same category as you, I was mentioning the Viper driver.

Likewise he'd know less about your interactions within your line of work....

Hi,

Hi

The word "Pakistani" is sort of a mindset that only believes what Abbaji, Baray abbaji, Chacha Ji or older brother has said---
.
I think the term is desi. After all this mindset is inherited from generations like your's yet it is reducing with time.
 
.
View attachment 654705

Posting this thread based on the above image which was specially shared by the operator.
For many years, we were led to believe that PAF can not use it's F-16s without American approval, well 27th Feb. 2019 saw that myth shattered, however, the naysayers weren't finished yet and kept insisting that the PAF's new Block-52 are constantly monitored by US Personal who will not allow these jets to be deployed operationally other than from their dedicated home base. Also even the PAF Airchief's ride for 23rd March is thoroughly monitored before being allowed to operate from elsewhere. Well, i guess people in PAF do also come across these ludicrous claims. The above image should put an end to these misconceptions. As can be seen it's a fully armed PAF F-16 Block-52 operating out of Kamra.

Just because Uncle Sam has not exercised the kill switch it does not mean it does not or might not exist. It is technically feasible. the real question is whether the PAF knows enough about the internals of the F-16s to detect the kill switch or defeat the kill switch (if it exists).

All Macs sold in USA to enterprises and corporations have a kill switch administered by the corporate IT department when render the Mac useless. The only way to defeat the kill switch in a Mac is not to connect the Mac to the internet.
 
.
Hi

The word "Pakistani" is sort of a mindset that only believes what Abbaji, Baray abbaji, Chacha Ji or older brother has said---.

Brace yourself for personal attacks, that is another characteristic mindset here - when people lose the argument.

The F-16 Mafia in PAF is going through its last gasps. As JF-17 pilots slowly take more senior ranks, these irrational ideas will find their grave eventually.
 
.
State Department Reprimanded Pakistan for Misusing F-16s, Document Shows

A source who viewed the August letter, written by Andrea Thompson, then-undersecretary of State for Arms Control and International Security Affairs,
don't pay too much attention to this letter, it was a lollypop handed down to indian lobby as Americans were fed up with their bitching ....
 
.
Just got this message


No,

No one on my side or myself has ever claimed that---.

Over the years I have explained it at great lengths about the " kill switch "..

Your senior Paf officer does not know diddley sh-it.

It is the US homeland security agency's requirement to have any and every US built equipment that flies to have a MANDATORY " kill switch " since 2008. All older equipment refurbished must have that.

Any aircraft flying into the UF---yessir---your civilian aircrafts also need to have " kill switches ".
You ideally remind me of a street sweeper, holding his brush, he tells a passing chief executive, ''If it wasn't for me cleaning the streets, your suit wouldn't be looking so impeccable''.
Now let me explain it in your own manners.....there is sh*t and there is sh*te.....the PAF officer certainly knows his sh*t hence he is in charge of a $70 Million plane where as those who don't know sh*te....have their head under the bonnet.
 
. .

Latest posts

Country Latest Posts

Back
Top Bottom