![]() outlet The Register and Vice reported finding scores of traveler data on the dark web in the hours after that breach, including financial information, photos, and location information.ĬBP claims it has already conducted a search, but hasn’t found any of the stolen images on the dark web, where hackers sometimes post stolen information for sale. CBP hasn’t confirmed whether these incidents are the same attack, but both the U.K. Border Patrol checkpoint lanes across Texas, New Mexico, and Arizona, confirmed a breach in late May. CBP reports that its own servers were unharmed by any cyberattack.ĬBP doesn’t name the subcontractor, but The Washington Post reports that when CBP officials emailed its public statement to reporters, the subject line read “CBP Perceptics Public Statement.” The Tennessee-based company Perceptics, which furnishes license-plate readers in 43 U.S. ![]() Hackers then targeted and successfully breached the subcontractor’s network. The lack of restrictions on data collection is why, for many experts, this hack feels like an inevitability.Īccording to an emailed statement to journalists from CBP, an unnamed subcontractor transferred copies of license-plate images and travelers’ photos from federal servers to its own company network, without CBP’s authorization. Privacy and security activists have long argued that as law enforcement vacuums up more data without legal limits, the damage of a possible breach scales up. Customs and Border Protection announced yesterday afternoon that hackers had stolen an undisclosed number of license-plate images and travelers’ ID photos from a subcontractor.
0 Comments
Leave a Reply. |