MoD Web Gaffe Exposes Special Forces Weapon Data – Silicon UK

Category:
Icon 0
Icon 10월 18, 2021

All Tech News > category news Innovation > category news Research

MoD Web Gaffe Exposes Special Forces Weapon Data

Governement-ITInnovationRegulationResearchScienceSecuritySecurity Management

Whistleblower leak keyboard security breach © CarpathianPrince Shutterstock

Secret data of enhanced weapons exposed in embarrassing cut-and-paste blunder, mirroring similar mistake in 2011 of data concerning nuclear submarines

The UK’s Ministry of Defence (MoD) is once again at the centre of a security leak gaffe, that saw secret weapons data being exposed online.

var screensize = document.documentElement.clientWidth;if (screensize < 1800) {var minscreenwidth = "1280";} else {var minscreenwidth = "1920";}var u_company = "n/a";var u_job_description = "n/a";var u_company_size = "n/a";var u_industry = "n/a";var scr = document.getElementById("DESKTOP_IN_ARTICLE-420551-0");var device = "desktop";if(dfp_device_view == device){var slot_div = document.createElement("div");slot_div.setAttribute("id", "div-gpt-ad-DESKTOP_IN_ARTICLE-420551-0");slot_div.setAttribute("class", "dfp_ad div-gpt-ad-DESKTOP_IN_ARTICLE-0 desktop sticky-DESKTOP_IN_ARTICLE-420551-0");slot_div.setAttribute("height", "0");var word = "Advertising";if(word != ""){var slot_word_div = document.createElement("div");slot_word_div.setAttribute("class", "dfp_word");slot_word_div.innerHTML = word;slot_div.appendChild(slot_word_div);}scr.parentNode.insertBefore(slot_div, scr.nextSibling);googletag.cmd.push(function() {var infinite_scroll = false;if("" != ""){infinite_scroll = true;if(hutt_original_page_id != ""){hutt_original_page_id = "";hutt_defineSlot_slot_object_infinite_scroll = [];}}var slot = googletag.defineSlot("/5437678/techweekeurope/article/e-regulation/governance",[8, 8], "div-gpt-ad-DESKTOP_IN_ARTICLE-420551-0").setTargeting("artid", "420551").setTargeting("cat", ["e-regulation","governance","e-innovation","research","science","security","security-management"]).setTargeting("tag", ["breach","data-leak","eset","human-error","ministry-of-defence","mod"]).setTargeting("type", "post").setTargeting("min_width", minscreenwidth).setTargeting("job_description", u_job_description).setTargeting("company_size", u_company_size).setTargeting("industry", u_industry).setTargeting("company", u_company).addService(googletag.pubads());if(infinite_scroll == true){hutt_defineSlot_slot_object_infinite_scroll.push( slot );}var size = "[8, 8]";size = size.replace(/s+/g, "");hutt_defineSlot["div-gpt-ad-DESKTOP_IN_ARTICLE-420551-0"] = {};hutt_defineSlot["div-gpt-ad-DESKTOP_IN_ARTICLE-420551-0"]["size"] = size;hutt_defineSlot_slot_object["div-gpt-ad-DESKTOP_IN_ARTICLE-420551-0"] = {};hutt_defineSlot_slot_object["div-gpt-ad-DESKTOP_IN_ARTICLE-420551-0"]["slot"] = slot;googletag.display("div-gpt-ad-DESKTOP_IN_ARTICLE-420551-0");});}var screensize = document.documentElement.clientWidth;if (screensize < 1800) {var minscreenwidth = "1280";} else {var minscreenwidth = "1920";}var u_company = "n/a";var u_job_description = "n/a";var u_company_size = "n/a";var u_industry = "n/a";var scr = document.getElementById("VIDEO_INFEED-420551-0");var device = "desktop";if(dfp_device_view == device){var slot_div = document.createElement("div");slot_div.setAttribute("id", "div-gpt-ad-VIDEO_INFEED-420551-0");slot_div.setAttribute("class", "dfp_ad div-gpt-ad-VIDEO_INFEED-0 desktop sticky-VIDEO_INFEED-420551-0");slot_div.setAttribute("height", "0");var word = "Advertising";if(word != ""){var slot_word_div = document.createElement("div");slot_word_div.setAttribute("class", "dfp_word");slot_word_div.innerHTML = word;slot_div.appendChild(slot_word_div);}scr.parentNode.insertBefore(slot_div, scr.nextSibling);googletag.cmd.push(function() {var infinite_scroll = false;if("" != ""){infinite_scroll = true;if(hutt_original_page_id != ""){hutt_original_page_id = "";hutt_defineSlot_slot_object_infinite_scroll = [];}}var slot = googletag.defineSlot("/5437678/techweekeurope/article/e-regulation/governance",['fluid'], "div-gpt-ad-VIDEO_INFEED-420551-0").setTargeting("artid", "420551").setTargeting("cat", ["e-regulation","governance","e-innovation","research","science","security","security-management"]).setTargeting("tag", ["breach","data-leak","eset","human-error","ministry-of-defence","mod"]).setTargeting("type", "post").setTargeting("min_width", minscreenwidth).setTargeting("job_description", u_job_description).setTargeting("company_size", u_company_size).setTargeting("industry", u_industry).setTargeting("company", u_company).addService(googletag.pubads());if(infinite_scroll == true){hutt_defineSlot_slot_object_infinite_scroll.push( slot );}var size = "['fluid']";size = size.replace(/s+/g, "");hutt_defineSlot["div-gpt-ad-VIDEO_INFEED-420551-0"] = {};hutt_defineSlot["div-gpt-ad-VIDEO_INFEED-420551-0"]["size"] = size;hutt_defineSlot_slot_object["div-gpt-ad-VIDEO_INFEED-420551-0"] = {};hutt_defineSlot_slot_object["div-gpt-ad-VIDEO_INFEED-420551-0"]["slot"] = slot;googletag.display("div-gpt-ad-VIDEO_INFEED-420551-0");});}

At the weekend, the Mail on Sunday reported on a cut-and-paste error, when secret plans for a suite of enhanced weapons, potentially for use by Britain’s Special Forces, were posted to an unidentified Government website.

Details of research into the next generation of munitions appeared to have been safely redacted in a document marked ‘Official Sensitive’, the Mail reported. But unfortunately, a simple copy and paste of the text, reportedly revealed every blanked-out detail.

Cut-and-paste

According to the Mail on Sunday, the data leak comes after the MoD announced last week a new contract with an engineering firm that specialises in the use of explosive materials.

The Ministry of Defence reportedly said it was taking action to correct the security breach after the newspaper alerted MoD officials to the blunder.

The Mail did not disclose the website involved.

“Due to a technical issue some redacted material was readable. This has been addressed,” the MoD was quoted as saying.

Tory MP and former Army officer Tobias Ellwood, who is also chairman of the Commons Defence Committee, noted that the weapons appeared to be destined for use by UK Special Forces.

Ellwood called on Defence Secretary Ben Wallace ‘to ascertain how many other documents have been redacted and published in a similar way’.

“It is evident this contract relates to highly technical weapons systems that will be used by our Special Forces,” said Ellwood. “And when new kit is brought on line, it introduces new tactics and protocols, which again give our elite forces the edge over adversaries. That is why details are redacted.”

The MoD lapse comes after a data breach last month of email addresses of dozens of Afghan interpreters who had worked with British forces and were at risk from the Taliban.

Human error

“This is a typical error, and highlights the sort of mistakes humans can very easily make in day-to-day work,” noted Jake Moore, cybersecurity specialist at ESET.

“Blaming such errors on technical issues can aggravate the problem; it is often better for people to own up to the error of their ways,” said Moore.

“Automation can help in securing the majority of an organisation but there will always remain a certain amount of human interaction which can often not be predicted, so vigilance and awareness are key,” he concluded.

“Like with many situations, this particular mistake had not been checked with the mindset of a hacker before it was sent out, which caused the release of highly sensitive data.”

Previous leaks

The MoD has been at the centre of a number of data leaks over the years, including one involving Prince William during his days as an RAF pilot.

But what makes this latest leak even more worrisome, is the fact that the MoD has been caught out by a cut-and-paste error before.

In April 2011 the MoD briefly exposed secret information about nuclear submarines on its site, thanks to an error in blacking out parts of a document posted online.

The document, discussing nuclear reactors for future replacements for the British Trident nuclear fleet, was published following a Freedom of Information request by anti-nuclear campaigners.

Large sections dealing with the weaknesses in current submarines were blacked out – but were easily readable by a simple cut-and-paste operation.

Read also :

var screensize = document.documentElement.clientWidth;if (screensize < 1800) {var minscreenwidth = "1280";} else {var minscreenwidth = "1920";}var u_company = "n/a";var u_job_description = "n/a";var u_company_size = "n/a";var u_industry = "n/a";var scr = document.getElementById("MOBILE_MPU-420551-4");var device = "mobile";if(dfp_device_view == device){var slot_div = document.createElement("div");slot_div.setAttribute("id", "div-gpt-ad-MOBILE_MPU-420551-4");slot_div.setAttribute("class", "dfp_ad div-gpt-ad-MOBILE_MPU-4 mobile sticky-MOBILE_MPU-420551-4");slot_div.setAttribute("height", "0");var word = "Advertising";if(word != ""){var slot_word_div = document.createElement("div");slot_word_div.setAttribute("class", "dfp_word");slot_word_div.innerHTML = word;slot_div.appendChild(slot_word_div);}scr.parentNode.insertBefore(slot_div, scr.nextSibling);googletag.cmd.push(function() {var infinite_scroll = false;if("" != ""){infinite_scroll = true;if(hutt_original_page_id != ""){hutt_original_page_id = "";hutt_defineSlot_slot_object_infinite_scroll = [];}}var slot = googletag.defineSlot("/5437678/techweekeurope/article/e-regulation/governance",[300, 250], "div-gpt-ad-MOBILE_MPU-420551-4").setTargeting("pos", 4).setTargeting("artid", "420551").setTargeting("cat", ["e-regulation","governance","e-innovation","research","science","security","security-management"]).setTargeting("tag", ["breach","data-leak","eset","human-error","ministry-of-defence","mod"]).setTargeting("type", "post").setTargeting("min_width", minscreenwidth).setTargeting("job_description", u_job_description).setTargeting("company_size", u_company_size).setTargeting("industry", u_industry).setTargeting("company", u_company).addService(googletag.pubads());if(infinite_scroll == true){hutt_defineSlot_slot_object_infinite_scroll.push( slot );}var size = "[300, 250]";size = size.replace(/s+/g, "");hutt_defineSlot["div-gpt-ad-MOBILE_MPU-420551-4"] = {};hutt_defineSlot["div-gpt-ad-MOBILE_MPU-420551-4"]["size"] = size;hutt_defineSlot_slot_object["div-gpt-ad-MOBILE_MPU-420551-4"] = {};hutt_defineSlot_slot_object["div-gpt-ad-MOBILE_MPU-420551-4"]["slot"] = slot;googletag.display("div-gpt-ad-MOBILE_MPU-420551-4");});}

Author: Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut…

Click to read the authors bio  Click to hide the authors bio 

(function ($) {
// ANW-14 : Brandvoice Modal
$(‘#brandvoice_modal’).click(function(){
$(‘#modal_Brandvoice’).css(‘display’, ‘flex’);
$(‘#modal_Brandvoice .modal-wrapper’).addClass(‘fedeModal’);
});
$(‘#close_modal_Brandvoice’).click(function(){
$(‘#modal_Brandvoice’).css(‘display’, ‘none’);
});

var screenWidth = $(window).width();
if (screenWidth < 751)
return;
var postID = 420551;

var selector = $('.dfp_ad.desktop.sticky-DESKTOP_MPU-' + postID +'-2');
$(selector).width('336px');

if (selector.length) {
$(selector).stickyInfiniteSidebar({
wrapperSelector: 'article'
});
}

$(window).load(function () {
var postID = 420551;
var selector = $('.dfp_ad.desktop.sticky-DESKTOP_MPU-' + postID+ '-2');

if (selector.length) {
$(selector).stickyInfiniteSidebar({
wrapperSelector: 'article'
});
}
});

}(jQuery));

Secret data of enhanced weapons exposed in embarrassing cut-and-paste blunder, mirroring similar mistake in 2011 of data concerning nuclear submarines
The UK’s Ministry of Defence (MoD) is once again at the centre of a security leak gaffe, that saw secret weapons data being exposed online.
At the weekend, the Mail on Sunday reported on a cut-and-paste error, when secret plans for a suite of enhanced weapons, potentially for use by Britain’s Special Forces, were posted to an unidentified Government website.
Details of research into the next generation of munitions appeared to have been safely redacted in a document marked ‘Official Sensitive’, the Mail reported. But unfortunately, a simple copy and paste of the text, reportedly revealed every blanked-out detail.

According to the Mail on Sunday, the data leak comes after the MoD announced last week a new contract with an engineering firm that specialises in the use of explosive materials.
The Ministry of Defence reportedly said it was taking action to correct the security breach after the newspaper alerted MoD officials to the blunder.
The Mail did not disclose the website involved.
“Due to a technical issue some redacted material was readable. This has been addressed,” the MoD was quoted as saying.
Tory MP and former Army officer Tobias Ellwood, who is also chairman of the Commons Defence Committee, noted that the weapons appeared to be destined for use by UK Special Forces.
Ellwood called on Defence Secretary Ben Wallace ‘to ascertain how many other documents have been redacted and published in a similar way’.
“It is evident this contract relates to highly technical weapons systems that will be used by our Special Forces,” said Ellwood. “And when new kit is brought on line, it introduces new tactics and protocols, which again give our elite forces the edge over adversaries. That is why details are redacted.”
The MoD lapse comes after a data breach last month of email addresses of dozens of Afghan interpreters who had worked with British forces and were at risk from the Taliban.
“This is a typical error, and highlights the sort of mistakes humans can very easily make in day-to-day work,” noted Jake Moore, cybersecurity specialist at ESET.
“Blaming such errors on technical issues can aggravate the problem; it is often better for people to own up to the error of their ways,” said Moore.
“Automation can help in securing the majority of an organisation but there will always remain a certain amount of human interaction which can often not be predicted, so vigilance and awareness are key,” he concluded.
“Like with many situations, this particular mistake had not been checked with the mindset of a hacker before it was sent out, which caused the release of highly sensitive data.”
The MoD has been at the centre of a number of data leaks over the years, including one involving Prince William during his days as an RAF pilot.
But what makes this latest leak even more worrisome, is the fact that the MoD has been caught out by a cut-and-paste error before.
In April 2011 the MoD briefly exposed secret information about nuclear submarines on its site, thanks to an error in blacking out parts of a document posted online.
The document, discussing nuclear reactors for future replacements for the British Trident nuclear fleet, was published following a Freedom of Information request by anti-nuclear campaigners.
Large sections dealing with the weaknesses in current submarines were blacked out – but were easily readable by a simple cut-and-paste operation.
document.getElementById(“comment”).setAttribute( “id”, “a0c8068d001505de0cbedab990b021f9” );document.getElementById(“c4356b12f7”).setAttribute( “id”, “comment” );


Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut…
Brand Discovery offers Advertisers the opportunity to speak directly to our professional communities. It’s an ad format that blends in with the editorial content and overall page design giving non-intrusive, flowing advertising experience. Readers can easily identify their provenance with the “Brand Discovery” mention. For any further information, contact us at the following address: [email protected]

source

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 항목은 *(으)로 표시합니다