ISIS calls for attack on US drone operators by releasing personal info

A U.S. Air Force Airman communicates with the pilot of an MQ-1 Predator unmanned aerial vehicle prior to a night mission from Ali Air Base in Iraq during 2007. (U.S. Air Force Photo)

ISIS hackers have been able to obtain the identities of seventy US military personnel they believe to be involved in conducting drone airstrikes in Iraq and Syria.

The Islamic State hacking division, believed to be linked to Britain, released the list to its followers asking them to “kill the wherever they are,” according to The Sunday Times.

The list, which was circulated online, contained the names, photographs, and home addresses for more that seventy U.S. DoD/military personnel.

“Kill them wherever they are, knock on their doors and behead them, stab them, shoot them in the face or bomb them,” they urged their supporters.

“You crusaders that can only attack the soldiers of the Islamic State with joysticks and consoles, die in your rage!”

“Your military has no courage, neither has your president as he still refuses to send troops. So instead you press buttons thousands of miles away in your feeble attempt to fight us.”

“A nation of cowards that holds no bravery as you resort to sending your remote-controlled unmanned Reaper and Predator drones to attack us from the skies. So this is for you, America.”

“These 75 crusaders are posted as targets for our brothers and sisters in America and worldwide to hunt down and kill.”

The group also warned they have a source at the Ministry of Defence in London who has given them secret intelligence.

The Sunday Times claims they confirmed the identities of the US service members but determined that the information was collected after carefully scrutinizing public articles and documents.  Their names were then matched up with pubic social media photos and addresses available online.

Last year, the Islamic State encouraged its supporters to carryout similar attacks on military personnel, in which they released the personal information of, but no attacks were ever made.

© 2016 Bright Mountain Media, Inc.

All rights reserved. The content of this webpage may not be reproduced or used in any manner whatsoever without the express written consent of Bright Mountain Media, Inc. which may be contacted at


Post navigation