- 15-year-old Smash Bros. prodigy caught using racist slur in private Discord server 7 Years Ago
- Instagram users who post pet pictures more likely to get hacked 7 Years Ago
- Post-Prime Day recap: Shipping delays, more sales, and a scam 7 Years Ago
- Jacob Wohl returns to Twitter … for now Today 1:56 PM
- How to stream WWE Raw Reunion Today 1:35 PM
- ‘I hope Trump deports you’: Woman goes on racist rant to Spanish speakers at a store Today 1:24 PM
- Emoji Mashup Bot gives life to unidentifiable emotions Today 1:15 PM
- Notorious grifter Anna Sorokin reportedly blocked from profiting off Netflix series Today 12:45 PM
- Charlottesville attacker’s Twitter account included praise for Hitler Today 12:10 PM
- ‘Short Treks’ trailer: Spock, Pike, and Number One return Today 11:57 AM
- Everything we know about ‘Star Trek: Lower Decks,’ the new animated show Today 11:55 AM
- Cole Carrigan says he left Team 10 after being called homophobic slur Today 11:32 AM
- Cop under investigation after implying Ocasio-Cortez should be shot Today 11:07 AM
- The ‘Big Little Lies’ finale sucked—but at least we have Renata Today 11:01 AM
- Wendy Davis announces she’s running for Congress Today 10:45 AM
Hackers have busted into a military database and stolen personal data from 30,000 personnel and visitors at a former Fort Monmouth, New Jersey, site.
Hackers have busted into a database and stolen personal data from 30,000 personnel and visitors at the former Fort Monmouth, New Jersey, military base.
The hack mostly targeted CECOM (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance), the tech support backbone for the Army’s field communications and command systems.
The digital thieves pilfered “a mix full names, dates and places of birth, Social Security numbers, home addresses, and salaries,” a CECOM representative told the Asbury Park Press. She emphasized, however, that at a minimum, names and social security numbers were stolen.
CECOM claims it has no idea who the hackers are and hasn’t explained how the hack was perpetrated. Twitter—usually the first destination for hackers to brag about their conquests—has been largely silent, with no groups claiming responsibility.
CECOM’s commanding general, Maj. Gen. Robert S. Ferrell, revealed some small details, however, in a mass Dec. 18 letter sent to those affected by the attack. According to Ferrell, the hackers broke into the base’s visitor logs as well as CECOM’s software engineering center’s personnel files. Army personnel shut down those databases as soon as the breach was discovered, on Dec. 6, but the damage had clearly already been done.
The Fort Monmouth base shut down in September 2011, and CECOM—as well as its databases—moved to the Aberdeen Proving Ground in Maryland.
We can only imagine that CECOM’s staff, who are responsible for coordinating command and control systems for a branch of the largest and richest military on the planet, have to be little embarrassed about the whole affair. But to their credit, the Army is offering year-long free credit-monitoring services to anyone affected by the hack.
Photo by US Army Europe Images/Flickr
Kevin Morris is a veteran web reporter and editor who specializes in longform journalism. He led the Daily Dot’s esports vertical and, following its acquisition by GAMURS in late 2016, launched Dot Esports, where he serves as the site’s editor-in-chief.