- How to stream Barcelona vs. Real Betis Saturday 11:31 PM
- How to stream Tottenham Hotspur vs. Newcastle Saturday 11:21 PM
- All of the ‘Avengers: Endgame’ Easter eggs discovered by fans Saturday 6:52 PM
- Every big announcement made at D23 about Disney+ Saturday 6:33 PM
- The best haunted house movies to watch online in 2019 Saturday 4:13 PM
- Andy Ngo seen laughing as Patriot Prayer members plan an attack in newly emerged video Saturday 3:59 PM
- How to stream Manchester City vs. Bournemouth Saturday 3:25 PM
- Catholic priest allegedly spent church money on Grindr hookups Saturday 3:04 PM
- Nicolás Maduro’s English Twitter account was suspended with no public explanation Saturday 2:06 PM
- Man claims ex-girlfriend killed his dog after he broke up with her Saturday 1:02 PM
- What are BitTorrent downloads and how do they work? Saturday 12:58 PM
- ICE cuts the cord on real immigrant hotline after being featured in ‘Orange Is the New Black’ (updated) Saturday 10:49 AM
- The 10 best music podcasts for artist interviews and criticism in 2019 Saturday 10:41 AM
- How a socialist Twitch streamer landed in a feud with Dan Crenshaw Saturday 10:07 AM
- How to prepare for your fantasy football draft (and season) Saturday 9:00 AM
ZDNet reports that the virtual disk image was left on the server, without a password, and available for anyone to download.
The unsecured data was discovered by cybersecurity firm UpGuard in October, and the server was shut down, according to the news outlet.
The virtual disk image showed part of a server that was linked to a cloud-based intelligence project called Red Disk. The program was designed to allow troops all over the world to update and exchange information in real time, according to the New York Post. The data left on the Amazon server showed a “snapshot” of a hard drive dating back to May 2013, according to the news outlet.
The program would share drone footage, classified reports, satellite imagery, and intercepts, ZDNet reports, and would be accessible by soldiers with laptops or tablets while on the ground. Red Disk was never fully deployed in the battlefield and cost nearly $1 billion.
The data on the unprotected server contained private keys to access servers across the intelligence community.
Last week, the New York Times reported that the NSA’s cyberweapons were being used against them by a group called the Shadow Brokers. An investigation was taking place to see if the NSA was hacked or someone leaked the data.
You can read all of ZDNet’s report here.
Andrew Wyrich is a politics staff writer for the Daily Dot, covering the intersection of politics and the internet. Andrew has written for USA Today, NorthJersey.com, and other newspapers and websites. His work has been recognized by the Society of the Silurians, Investigative Reporters & Editors (IRE), and the Society of Professional Journalists (SPJ).