Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

admin
Pinned September 4, 2021

<> Embed

@  Email

Report

Uploaded by user
Researcher says a US terrorist watchlist was exposed online for three weeks
<> Embed @  Email Report

Researcher says a US terrorist watchlist was exposed online for three weeks

Researcher says a US terrorist watchlist was exposed online for three weeks

The server included “no-fly” indicators.

Igor Bonifacic
I. Bonifacic
August 16th, 2021
Researcher says a US terrorist watchlist was exposed online for three weeks | DeviceDaily.com
Carlos Barria / reuters

The FBI’s Terrorist Screening Center (TSC) may have exposed the records of nearly 2 million individuals and left them accessible online for three weeks. Security researcher Bob Diachenko says he discovered a terrorist watchlist on July 19th that included information like the name, date of birth and passport number of those listed in the database. The cluster also included “no-fly” indicators.

According to Diachenko, the watchlist wasn’t password protected. Moreover, it was quickly indexed by search engines like Censys and ZoomEye before the Department of Homeland Security took the server offline on August 9th. It’s unclear who may have accessed the data.

“I immediately reported it to Department of Homeland Security officials, who acknowledged the incident and thanked me for my work,” Diachenko said in a LinkedIn post spotted by Bleeping Computer. “The DHS did not provide any further official comment, though.” We’ve reached out to the Department of Homeland Security.

Among the watchlists the TSC maintains is America’s no-fly list. Federal agencies like Transportation Security Administration (TSA) use the database to identify known or suspected terrorists attempting to enter the country. Suffice to say, the information included in the exposed watchlist was highly sensitive.

A recent bipartisan Senate report recently warned of glaring cybersecurity holes at several federal agencies, including the Department of Homeland Security. It said many of the bodies it audited had failed to implement even basic cybersecurity practices like multi-factor authentication and warned national security information was open to theft as a result.

Engadget is a web magazine with obsessive daily coverage of everything new in gadgets and consumer electronics

(40)