March 10, 2026
Army hid theft of 4 military drones from Fort Campbell for 16 weeks
Insider theft of defense drones hidden for 4 months; surfaces amid Iran war drone fears
March 10, 2026
Insider theft of defense drones hidden for 4 months; surfaces amid Iran war drone fears
Four were stolen from Building 6955, 326th Division Engineer Battalion, Fort Campbell, Kentucky, between November 21 and 24, 2025. The drones were last confirmed present on the morning of November 21. Fort Campbell sits on the Kentucky-Tennessee border and is home to the 101st Airborne Division (Air Assault) — one of the Army's premier rapid-deployment combat units, which has served in every major U.S. conflict since World War II.
The Skydio X10D is not a consumer drone. It is a defense-grade quadcopter built specifically for military use, equipped with artificial intelligence navigation that allows it to fly autonomously through complex environments, thermal imaging cameras for night surveillance, and multiple payload attachment bays. The Army values each unit at approximately $28,000, putting the total theft at more than $110,000. Some sources citing different payload configurations value them as high as $100,000 per unit.
The Army's Criminal Investigation Division did not — more than 16 weeks after the drones went missing. The CID released a public reward notice and surveillance images on March 9–10, asking for tips. The Army has not explained why disclosure took 16 weeks, what triggered the decision to go public when it did, or whether the delay was consistent with standard protocol for military equipment theft.
The gap is notable both operationally and institutionally. Sixteen weeks is more than a full quarter. The 101st Airborne's engineer battalion — where the drones were stored — is an active-duty unit. The delay raises questions about internal notification chains, oversight accountability, and whether the relevant congressional committees were informed.
Army CID as of March 12, 2026. Both had authorized access to Fort Campbell and to the specific building where the drones were stored — meaning they were not outside intruders but individuals with legitimate credentials to be on the installation. The CID said they 'defeated the locks on the storage cages,' indicating physical tampering with secured military property rather than a simple walk-off theft.
The Army characterized the theft as 'a targeted act, not a random breach of security' — language that signals investigators believe the suspects knew what they were looking for, knew where it was stored, and planned accordingly. The names of the suspects were not released publicly. No arrests had been made as of March 12. The CID offered a $5,000 reward for information leading to the arrest and conviction of those responsible.
Surveillance footage shows two individuals wearing dark sweatshirts, gloves, hats, and masks or balaclavas — clothing specifically chosen to defeat facial recognition and obscure identifying features. Two vehicles were also captured in the footage: a light-colored four-door sedan and a dark-colored four-door pickup truck. The degree of concealment — matching outfits, covered faces, gloved hands — is consistent with premeditated, coordinated theft rather than an impulsive crime.
The deliberateness of the disguise, combined with the fact that both suspects had authorized base access and targeted a specific building and storage cage, paints a picture of an inside job with significant advance planning. Whether the suspects intended to use, sell, or deliver the drones to a third party has not been confirmed publicly by investigators.
The Army's official public statement said there is because the missing drones are 'equipped only with small cameras.' That framing warrants scrutiny. The Skydio X10D's thermal imaging capability means it can conduct surveillance through darkness and in conditions where standard cameras fail. Its AI navigation allows it to fly pre-programmed routes without a human operator in the loop. Its payload bays are designed for military attachments — what's currently attached to the four stolen units is unknown.
The Army's 'no threat' framing also assumes the drones remain in the hands of the original thieves and have not been transferred, sold, or modified. Defense security experts noted that even camera-only drones can be used for reconnaissance of sensitive targets, pattern-of-life surveillance of protected individuals, or as a baseline for reverse-engineering military-grade navigation systems.
The story's because of its convergence with two simultaneous events. First, around March 1, the FBI distributed a bulletin to law enforcement containing unverified information that Iran had 'aspired' to conduct a surprise drone attack against targets in California using UAVs launched from an offshore vessel. The FBI itself labeled the information unverified and said it had no details on timing, target, or perpetrators — but the bulletin sparked national coverage and debate about Iranian drone threats to the U.S. homeland.
Second, by March 18, unidentified drones had been spotted flying over Fort McNair in Washington, D.C. — a base where Defense Secretary
Pete Hegseth and Secretary of State Marco Rubio both reside. That incident prompted a White House meeting and a review of Cabinet secretary security postures. The convergence of three drone-related events — the Fort Campbell theft disclosure, the FBI California warning, and the Fort McNair sightings — all within the same two-week window — created an unavoidable context of wartime vulnerability even though no direct connection between the three has been established.
No evidence has emerged connecting the Fort Campbell theft to a foreign government or Iran. The Army, FBI, and other officials have consistently maintained the investigation is focused on a domestic criminal act. Defense analysts noted that , while impressive for a small drone, do not make it a tool of strategic espionage — it lacks the range, endurance, or payload capacity that state-level intelligence operations would typically require.
That said, the circumstantial context has been difficult to dismiss. The 101st Airborne Division has been one of the units most active in supporting overseas operations, including in the Iran war theater. The timing of public disclosure — coming out during an active conflict when drone vulnerability was a front-page story — either reflects coincidence or a decision by the Army to disclose on a timeline designed to reach a threshold of public attention. The Army has not clarified which it was.
The Fort Campbell theft is part of a at U.S. military installations during the Iran war period. In the same week the Fort Campbell story broke publicly, MacDill Air Force Base in Tampa — home of CENTCOM — was placed on force protection Charlie (a credible threat level) twice in a single week, including after FBI agents found what appeared to be an IED at the visitor center and then 'possible energetic materials' in a second package. Joint Base McGuire-Dix-Lakehurst in New Jersey was also raised to force protection Charlie.
Senator Maria Cantwell sent a letter to federal agencies in March demanding they address interagency coordination failures in counter-drone systems — failures exposed when CBP used a military laser to shoot down Mylar balloons near El Paso in February, temporarily closing FAA airspace. Senator
Tammy Duckworth filed for a federal probe of counter-drone laser operations in Texas, citing aviation safety risks. Together these incidents paint a picture of U.S. military installations facing escalating threat complexity while operating with counter-drone systems that have documented coordination failures.
Secretary of Defense
U.S. Senator (D-WA); Ranking Member, Senate Commerce Committee

U.S. Senator (D-IL); Senate Armed Services Committee
Secretary of State
Former Secretary of the Army (2021–2025)
Director, Army Criminal Investigation Division