DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Marines make changes after data of 164,000 people lost on Okinawa

Posted on May 18, 2018 by Dissent

And poof… It sounds like many people may have known for years about the sloppy infosecurity being used but no one really did anything to put a more secure system in place… and so, of course, it was inevitable that disaster struck.

Matthew M. Burke reports:

The Marine Corps has changed the way it handles personal information after a servicemember lost a disk containing the data of 164,000 people who registered a vehicle for Okinawa base access between January 2007 and September 2017.

On Sept. 22, an airman with Okinawa’s Joint Service Vehicle Registration Office at Camp Foster handed the disk to an Air Force security officer from Kadena Air Base. That security officer was tasked with bringing the disk — which was not password protected or encrypted — to Kadena security forces’ headquarters, where the data were to be uploaded into the Air Force system.

The disk was never seen again.

Now you may think ok, vehicle info. But it was much much more than that:

names, Social Security numbers, driver’s license information, ID numbers, physical descriptions of personnel, vehicle identification numbers and plate numbers, service branch and duty information for servicemembers, dependents, civilian federal employees, contractors and local national master labor contractors.

Read more on Stars and Stripes.

Category: Government SectorLost or MissingU.S.

Post navigation

← Two hackers accused of tricking reporters indicted
Notice of Data Breach at blackphoenixalchemylab.com →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.