- Jameela Jamil dragged for comparing reproductive rights to landlord rights Tuesday 6:54 PM
- Trump campaign posts Thanos meme, totally misses point of ‘Endgame’ Tuesday 5:58 PM
- Petition calls for Apple to make a Baby Yoda emoji Tuesday 5:16 PM
- This BTS-Billie Eilish mashup is the most popular tweet of 2019 Tuesday 4:51 PM
- Michelle Wolf embraces vulgarity in ‘Joke Show’ Tuesday 4:24 PM
- Influencer gets 14 years in prison for trying to steal domain name at gunpoint Tuesday 4:14 PM
- ‘Three Days of Christmas’ is a delightfully dark holiday alternative to Hallmark Tuesday 3:55 PM
- The way Trump Jr. holds his own book inspires mockery Tuesday 3:47 PM
- Woman facing backlash for no longer wearing hijab in end of the decade photo Tuesday 3:16 PM
- Report: Consulting firm lied about decreasing violence at Rikers Island jail Tuesday 2:36 PM
- TikTok users are sharing things they thought were ‘ghetto’ as kids Tuesday 2:31 PM
- Republicans just blocked a net neutrality vote in the Senate Tuesday 2:24 PM
- ‘Fox & Friends’ host stuck using dad’s account after Twitter suspension Tuesday 1:10 PM
- ‘They’ is Merriam-Webster’s word of the year Tuesday 12:56 PM
- Inside Dolby’s big ‘Star Wars’ retrospective exhibition Tuesday 12:48 PM
ZDNet reports that the virtual disk image was left on the server, without a password, and available for anyone to download.
The unsecured data was discovered by cybersecurity firm UpGuard in October, and the server was shut down, according to the news outlet.
The virtual disk image showed part of a server that was linked to a cloud-based intelligence project called Red Disk. The program was designed to allow troops all over the world to update and exchange information in real time, according to the New York Post. The data left on the Amazon server showed a “snapshot” of a hard drive dating back to May 2013, according to the news outlet.
The program would share drone footage, classified reports, satellite imagery, and intercepts, ZDNet reports, and would be accessible by soldiers with laptops or tablets while on the ground. Red Disk was never fully deployed in the battlefield and cost nearly $1 billion.
The data on the unprotected server contained private keys to access servers across the intelligence community.
Last week, the New York Times reported that the NSA’s cyberweapons were being used against them by a group called the Shadow Brokers. An investigation was taking place to see if the NSA was hacked or someone leaked the data.
You can read all of ZDNet’s report here.
Andrew Wyrich is a politics staff writer for the Daily Dot, covering the intersection of politics and the internet. Andrew has written for USA Today, NorthJersey.com, and other newspapers and websites. His work has been recognized by the Society of the Silurians, Investigative Reporters & Editors (IRE), and the Society of Professional Journalists (SPJ).