Family Exploit FOI to Mine Pentagon’s Data for Profit

Share post:

The Posey family used the Freedom of Information Act to extract Pentagon data for profit.

The Freedom of Information Act is federal freedom of information law that requires full or partial disclosure of previously unpublished information and documents that are controlled by the United States government upon request. The act defines agency records subject to disclosure, outlines mandatory disclosure procedures, and defines nine exemptions to the statue.

The Poseys specialized in engineering drawings, technical orders, and manuals for aircraft, most of them from the military. Their small, family-owned Southern California-based company, Newport Aeronautical Sales, formerly owned and operated by Posey’s stepfather, sold non-classified technical information to companies seeking Pentagon contracts to repair military aircraft or manufacture spare parts.

George Posey recognized in the late 1970s that it was easier and cheaper to provide paperwork to bureaucrats than to cram into underground bunkers. The introduction of the Freedom of Information Act ushered in a free-market economy that “information resellers” capitalized on by submitting a stream of Freedom of Information Act requests to U.S. government agencies and treating the information as goods to unload.

While some information traders focus on the Security and Exchange Commission’s financial filings, others focus on facility inspection reports from the Food and Drug Administration.

Information vendors are now the primary beneficiaries of FOIA. Analysis of 229,000 FOIA requests in 2017 shows that only 8% of the requests came from journalists. By 2020, nearly 800,000 requests were made. At some federal agencies, the vast majority of requests now come from commercial operators that resell or use data for profit.

The sources for this piece include an article in WIRED.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 29, 2024 – PyPI repository shuts to stop malicious uploads, a plea to developers to stop creating apps with SQL...

This episode reports on a US$10 million reward for a ransomware gang, a new Linux version of a backdoor

Cyber Security Today, March 27, 2024 – A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from...

This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet

Cyber Security Today, March 25, 2024 – A suspected China threat actor going after unpatched F5 and ScreenConnet installations

This episode reports on a new campaign stealing email passwords ,the latest data breaches

A hacker’s view of the civic infrastructure: Hashtag Trending, the Weekend Edition for March 23rd, 2024

What does the civic infrastructure look like through the eyes of a hacker? The legendary general Sun Tzu in the Art of War said that in order to defeat your enemy, you must first understand your enemy. How do you do this? He said, “to know your enemy, you must become your enemy.” If we

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways