U.S. Terrorist Watchlist Exposed Online For Weeks

Share post:

The FBI Terrorist Screening Center (TSC) may have revealed the database containing information on nearly 2 million people and made it available to anyone online for three weeks. Security researcher Bob Diachenko claims that on July 19, a terrorist watchlist was discovered containing information including the names, dates of birth, and passport numbers of people listed in the database.

Diachenko said the watchlist was not password-protected and was quickly indexed by search engines such as Censys and ZoomEye before the Department of Homeland Security shut it down on August 9. It remains unclear who may have accessed the data.

Among the watchlists maintained by the TSC is the American no-fly list. Federal agencies such as the Transportation Security Administration (TSA) use the database to identify known or suspected terrorists attempting to enter the United States.

A recent bipartisan Senate report warned of glaring cybersecurity gaps at various federal agencies, including the Department of Homeland Security, claiming that many of the agencies it audited had failed to implement even basic cybersecurity practices, such as multifactor authentication, and warning that this made national security information highly vulnerable to theft.

For more information, read the original story in Endgadget.

Featured Tech Jobs


Related articles

Cyber Security Today, Week in Review for week ending Friday, March 1, 2024

This episode features a discussion on how hard it is to kill a ransomware gang, Canada's proposed new online harms bill, why organizations still allow staff to use vulnerable software

Healthcare sector “stretched thin” in fight against cyber attacks warns CSO of Health-ISAC

In an interview Errol Weiss talks about the challenges facing hospitals a

Cyber Security Today, March 1, 2024 – Warnings to GitHub users and Ivanti gateway administrators, and more

This episode reports on a recommendation that enterprises drop Ivanti Policy Secure and Connect Secure devices because threat actors can get around mitigations for recent vulne

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways