- The 2020 guide to live TV streaming for cord cutters 7 Years Ago
- Popular dating app Growlr just suspended its users 7 Years Ago
- Apple warns coronavirus expected to cause iPhone ‘supply shortages’ Monday 7:59 PM
- Will ‘The Bachelor’ end without an engagement? Monday 7:44 PM
- This ‘Little Women’ scene just became a meme Monday 7:03 PM
- Playable version of Blizzard’s ‘StarCraft: Ghost’ leaks online nearly 15 years after cancelation Monday 6:31 PM
- This Twitter extension can block unsolicited nudes from your inbox Monday 6:01 PM
- Jeffree Star wears cornrows after being accused of cultural appropriation Monday 4:49 PM
- Jeff Bezos says he’ll commit $10 billion to combat climate change Monday 4:18 PM
- A TikTok user went on a mission to turn his urine blue by chugging food coloring Monday 3:55 PM
- YouTuber’s vacation in ‘Bali’ was actually staged at Ikea Monday 3:14 PM
- Video shows liquor store manager calling employee ‘f*cking worthless’ Monday 1:16 PM
- Instagram influencer scams followers out of $1.5 million Monday 12:22 PM
- Why did the Israeli military tweet this thirst trap? Monday 10:43 AM
- Jake Paul wants you to have financial freedom… by paying him a monthly fee Monday 10:40 AM
Hackers steal data of 30,000 Army personnel and visitors
Hackers have busted into a military database and stolen personal data from 30,000 personnel and visitors at a former Fort Monmouth, New Jersey, site.
Hackers have busted into a database and stolen personal data from 30,000 personnel and visitors at the former Fort Monmouth, New Jersey, military base.
The hack mostly targeted CECOM (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance), the tech support backbone for the Army’s field communications and command systems.
The digital thieves pilfered “a mix full names, dates and places of birth, Social Security numbers, home addresses, and salaries,” a CECOM representative told the Asbury Park Press. She emphasized, however, that at a minimum, names and social security numbers were stolen.
CECOM claims it has no idea who the hackers are and hasn’t explained how the hack was perpetrated. Twitter—usually the first destination for hackers to brag about their conquests—has been largely silent, with no groups claiming responsibility.
CECOM’s commanding general, Maj. Gen. Robert S. Ferrell, revealed some small details, however, in a mass Dec. 18 letter sent to those affected by the attack. According to Ferrell, the hackers broke into the base’s visitor logs as well as CECOM’s software engineering center’s personnel files. Army personnel shut down those databases as soon as the breach was discovered, on Dec. 6, but the damage had clearly already been done.
The Fort Monmouth base shut down in September 2011, and CECOM—as well as its databases—moved to the Aberdeen Proving Ground in Maryland.
We can only imagine that CECOM’s staff, who are responsible for coordinating command and control systems for a branch of the largest and richest military on the planet, have to be little embarrassed about the whole affair. But to their credit, the Army is offering year-long free credit-monitoring services to anyone affected by the hack.
Photo by US Army Europe Images/Flickr
Kevin Morris is a veteran web reporter and editor who specializes in longform journalism. He led the Daily Dot’s esports vertical and, following its acquisition by GAMURS in late 2016, launched Dot Esports, where he serves as the site’s editor-in-chief.