Secret Military Files Found On Used MP3 Player
A 29-year-old New Zealand man reportedly got more than he bargained for when he bought an MP3 player from an Oklahoma thrift shop. When Chris Ogle hooked up his MP3 player to sync with his computer, he found 60 files containing military information including the names and personal details of American soldiers stationed in Afghanistan and Iraq including: cellphone numbers, information that appeared to be from a mission briefing, details of military equipment deployed to the bases, and social security numbers. (Source: tvnz.co.nz)
Files found were marked with a warning saying the release of its content is "prohibited by federal law." (Source: tvnz.co.nz)
Most of the files date back to 2005 and are unlikely to compromise National Security -- but the information could put the individual soldiers at risk.
Not The First Time
This isn't the first time that military information has been compromised. In 2006, the BBC reported that stolen computer hardware containing files with military secrets was being sold at a market beside a U.S. base in Afghanistan. (Source: bbc.co.uk)
Last November the U.S. Department of Defense banned the use of portable data storage devices. (Source: infopackets.com)
The situation is also similar to John McCain's 2008 Presidential campaign when the candidate's BlackBerry was sold to a reporter with the old data still intact. (Source: pcworld.com)
As noted by PC World, these issues highlight the bigger problem in keeping sensitive data secure. President Obama's Presidential campaign team experienced problems when hackers hijacked his campaign web site to lure unsuspecting visitors to download malware. Even Alaska Governor and Sarah Palin's Yahoo account was hacked during her Republican Vice-Presidential run with the McCain campaign. (Source: pcworld.com)
It's not known how the data ended up on the used MP3 player, but Ogle handed it over to U.S. officials who agreed to swap his out for a new one. (Source: yahoo.com)
Visit Bill's Links and More for more great tips, just like this one!
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.