Air Force Leaks Sensitive Data | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Most Recent Daily Episodes

Episode Date

Airborne-Monday

Airborne-Tuesday

Airborne-Wednesday Airborne-Thursday

Airborne-Friday

Airborne On YouTube

Airborne-Unlimited-04.22.24

Airborne-Unlimited-04.16.24

Airborne-FlightTraining-04.17.24 Airborne-AffordableFlyers-04.18.24

Airborne-Unlimited-04.19.24

Join Us At 0900ET, Friday, 4/10, for the LIVE Morning Brief.
Watch It LIVE at
www.airborne-live.net

Sat, Aug 27, 2005

Air Force Leaks Sensitive Data

Half of USAF Officers Exposed To Identity Theft

The US Air Force has joined the long list of outfits that carelessly allowed hackers to access sensitive personal data. As many as 33,000 officers -- half of the entire active duty officer corps, including intelligence officers, pilots, and nuclear missile crews -- had their personnel files stolen by a brazen hacker. At least some of the thefts were allowed to happen by USAF computer security officers, hoping to catch the thief.

All the officers have been notified by now. Unfortunately, such items as social security numbers and children's names, now in the hands of unknown criminals, can't really be changed. So far, there have been no cases of identity theft reported to AIr Force officials, and the database, while containing extensive information about the officers, didn't have one thing such thieves are always looking for -- their credit card or bank account information.

The hacker was using a legitimate user's login and password on the system. Indeed, Air Force security officials first discovered that one users was loading "a lot of these records... it was very uncharacteristic," Maj. Gen. Anthony F. Przybyslawski told MSNBC.

Przybyslawski's signature was on a letter to Air Force officers admitting the security breach and alerting them to the possibility of ID theft.

They're not even sure when the thefts began. June, maybe. Or May. Who knows?

"We are conducting a wall-to-wall review of our personnel-related data systems to maximize the security of the systems," Przybyslawski wrote to the victims on Friday. Good thing they decided to maximize the security of the systems before, uh... never mind.

There are some mitigating factors. As Przybyslawski pointed out, there's been no identifiable identity theft stemming from this breach, yet. And the Air Force has a tough job, trying to manage personnel systems for hundreds of thousands of disparate people scattered to the ends of the earth.

The military, which does OK most of the time keeping classified information, nukes, and other deadly weapons under lock and key, has a poor record with computer security. Most military servers run Windows, which is notorious for its security holes, and requires crackerjack administration. But most servers are maintained by junior enlisted personnel with very little training, or do-more-with-less contractors.

On top of that, the military is very fond of very complex, hard-to-memorize, and frequently changing passwords. While in theory this is good for security, in practice it's bad: the users write the passwords down, often on a desk blotter or on a Post-It note stuck on their computer monitor.

FMI: www.af.mil

Advertisement

More News

Airbus Racer Helicopter Demonstrator First Flight Part of Clean Sky 2 Initiative

Airbus Racer Demonstrator Makes Inaugural Flight Airbus Helicopters' ambitious Racer demonstrator has achieved its inaugural flight as part of the Clean Sky 2 initiative, a corners>[...]

Diamond's Electric DA40 Finds Fans at Dübendorf

A little Bit Quieter, Said Testers, But in the End it's Still a DA40 Diamond Aircraft recently completed a little pilot project with Lufthansa Aviation Training, putting a pair of >[...]

ANN's Daily Aero-Term (04.23.24): Line Up And Wait (LUAW)

Line Up And Wait (LUAW) Used by ATC to inform a pilot to taxi onto the departure runway to line up and wait. It is not authorization for takeoff. It is used when takeoff clearance >[...]

NTSB Final Report: Extra Flugzeugbau GMBH EA300/L

Contributing To The Accident Was The Pilot’s Use Of Methamphetamine... Analysis: The pilot departed on a local flight to perform low-altitude maneuvers in a nearby desert val>[...]

Classic Aero-TV: 'Never Give Up' - Advice From Two of FedEx's Female Captains

From 2015 (YouTube Version): Overcoming Obstacles To Achieve Their Dreams… At EAA AirVenture 2015, FedEx arrived with one of their Airbus freight-hauling aircraft and placed>[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2024 Web Development & Design by Pauli Systems, LC