Details of several U.S. missile bunkers in Europe, containing live warheads, along with secret codewords used by outposts to signal that they were being intimidated by enemies, have been exposed for nearly a decade by online flashcard used for education, but left behind. can be used by the public.
The fascinating security flaw was revealed by investigative journalism website Bellingcat, which described what was found after a “simple online search for publicly known terms associated with nuclear weapons.”
The flashcards “detail detailed security details and protocols such as the positions of the cameras, the frequency of patrols around the vaults, secret words without restraint when threatening an outpost and the unique identity that must have a prohibited area badge, ”Bellingcat reported.
Googling only “PAS” (aircraft protection), “WS3” (weapons storage and security systems) and “vault” (the U.S. military term for nuclear weapon bunkers) includes names of US Air Force stations in Europe are back along with flashcards. used in training and hosted on the Chegg, Quizlet, and Cram websites.
The material found by Bellingcat suggested protocols were used most recently in April, though the oldest is still dated to 2013. The flashcards themselves have already been removed, which the U.S. Air Force told Bellingcat it was “investigating appropriateness of the information shared through the study. flashcards. “
Some flashcards included the locations and lines of sight of surveillance cameras pointed at the main entrances, and the locations of modems that connect vault systems with a wider base. Precisely which vaults were used to store nuclear warheads are detailed on several cards.
The findings of the investigating website are similar to the open-source intelligence it found in looking beer-rating app Untappd last year. Using Bellingcat techniques, The register can easily identify key government personnel working in the military with established establishments.
Online OPSEC is important: subscribing to the Scribd ebooks website and searching for certain terms can reveal all sorts of confidential manuals and manuals, and the slide-deck website Prezi occasionally contains internal sliding content which is probably not intended to be published to the wider world
Think of it this way: if you’re uploading sensitive data to a website that isn’t managed or contracted with your company (or the government in this case), you probably shouldn’t do it. Particularly if you are wary of nuclear weapons. ®
Disclaimer: The opinions expressed within this article are the personal opinions of the author. The facts and opinions appearing in the article do not reflect the views of knews.uk and knews.uk does not assume any responsibility or liability for the same.