Dear Visitor,

Our system has found that you are using an ad-blocking browser add-on.

We just wanted to let you know that our site content is, of course, available to you absolutely free of charge.

Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site.

So, we ask you to add this site to your Ad Blocker’s "white list" or to simply disable your Ad Blocker while visiting this site.

Continue on this site freely
You are here: Home / Data Security / Classified NSA, Army Data Exposed
Classified NSA, Army Data Exposed, Cybersecurity Firm Says
Classified NSA, Army Data Exposed, Cybersecurity Firm Says
By Deb Riechmann Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
A cybersecurity company said Tuesday it found top secret files related to classified Army communications systems sitting unprotected online for anyone to see.

The data belonged to the U.S. Army's Intelligence and Security Command, a division of both the Army and the National Security Agency. It's the latest known setback linked to the NSA where former agency contractor Edward Snowden disclosed a cache of classified material in 2013.

NSA referred questions to the intelligence command, which did not immediately respond to a request for comment.

Chris Vickery, an analyst at UpGuard, a cybersecurity company based in Mountain View, California, discovered the unprotected data online on Sept. 28. Vickery notified the government about what he had found and was told on Oct. 10 that it had been secured.

"It is unclear to us what the precise relevance of the classified data we found is to active INSCOM operations," Dan O'Sullivan, another analyst on UpGuard's cyber risk team, said Tuesday.

The data contained 47 files and folders that could be viewed, including three that could be downloaded. Some of the data could not be accessed without being linked to Pentagon systems, O'Sullivan said. Many files were marked "top secret" or "NOFORN," a classification that prohibits disclosure to foreign governments.

The largest file contained a virtual hard drive likely designed for receiving Defense Department information from remote locations. The exposed data included sensitive details concerning a battlefield intelligence platform, known as the Distributed Common Ground System-Army, as well as the platform's troubled cloud auxiliary program codenamed "Red Disk."

Snowden leaked classified material exposing U.S. government surveillance programs.

In August 2016, Harold Thomas Martin III, 51, of Glen Burnie, Maryland, was arrested by the FBI after federal prosecutors say he illegally removed highly classified information and stored the material in his home and Relevant Products/Services.

Reality Winner, 25, a former Air Force linguist who worked as an NSA contractor at a facility in Augusta, Georgia, was charged in June with copying a classified U.S. report and mailing it to a news organization.

© 2018 Associated Press under contract with NewsEdge/Acquire Media. All rights reserved.

Image credit: U.S. Cyber Command.

Tell Us What You Think


Like Us on FacebookFollow Us on Twitter

Over the past decade, hospitals have been busy upgrading their systems from paper to electronic health records. Unfortunately, spending so much on EHR may have left insufficient funds for security.
The British government officially blamed Russia for waging the so-called NotPetya cyberattack that infected computers across Ukraine before spreading to systems in the U.S. and beyond.
© Copyright 2018 NewsFactor Network. All rights reserved. Member of Accuserve Ad Network.