A Department of Defense memo warns U.S. military members about the privacy risks of home DNA kits.
The memo provides little details on how genetic profiles could endanger security, other than noting that potential “inaccuracies” in health information could pose a risk to military personnel, who are required to report medical issues. Most of the health reports provided by DNA companies typically pertain to medical risks, though, such as a predisposition to cancer, rather than diagnosing a condition.
The 504th military app gives soldiers weather updates, training changes, and other logistics. But its terms of service say it collects a lot of personal data, and if the app was hacked it could potentially expose top-secret information.
The app’s permissions — which suggested it could pull GPS location data, photos, contacts and even rewrite memory cards — frustrated soldiers who have taken extreme precautions they felt were glossed over by Trotter and other senior leaders…The worst-case scenario, he said, was “our cover might be blown.” While the app said permissions could be disabled, the soldiers said there was a failure of confidence it was secure. Senior leaders checked the phones of subordinates to ensure they had the app installed, soldiers in the unit said.
Why it’s especially concerning: “The app developer, Straxis LLC, is based in Tulsa but has a subsidiary in southern India.”
Hosted on AWS servers, Autoclerk leaked 179GB of military data containing sensitive personal data of users and hotel guests.
The most surprising victim of this leak wasn’t an individual or company: it was the US government, military, and Department of Homeland Security (DHS). Our team viewed highly sensitive data exposing the personal details of government and military personnel, and their travel arrangements to locations around the world, both past and future. This represented a massive breach of security for the governmentagencies and departments impacted.
Yi-Chi Shih, an electrical engineer, faces up to 219 years in prison for smuggling U.S. military chips to China.
From 2012 to 2013, students at the University of Colorado’s Colorado Springs campus were secretly photographed as part of a research project. The U.S. Navy wanted to improve its facial recognition algorithms.
To conduct the study, [professor] Boult set up a long-range surveillance camera in an office window about 150 meters away from the West Lawn of the Colorado Springs campus, a public area where passers-by would not have a reasonable expectation of privacy. The camera surreptitiously photographed people walking in the area of the West Lawn on certain days during the spring semesters of 2012 and 2013.
Join host Kelly Guimont to talk with John Martellaro and Andrew Orr about military data being hosted in the cloud and about the worst password offenders in 2018.
A technology company bidding for a Pentagon contract for the project has close partnerships with a firm linked to Russian oligarch Viktor Vekselberg.
Similar to the company’s long-running education store, “current and Veteran members of the U.S. Military, National Guard and Reserve,” and their families, will be able to buy Apple products with a 10% discount.
Today the Air Force announced a program for sharing vulnerabilities that it will launch next month. The Air Force bug bounty program will let hackers comb several public Air Force websites for software vulnerabilities. Cash prizes are available for discovered bugs, and this new program also does something new that others of its kind don’t. Andrew Orr reveals all.