UpGuard has found another set of unsecured Amazon Web Services S3 buckets, these with data collected, UpGuard says, on behalf of US Central Command and US Pacific Command. The data represent the scrapings of some 1.8 billion social media posts by VendorX, a now-defunct company that provided services to Central Command. The information isn't sensitive, the US Department of Defense says, nor was it processed for intelligence purposes. It wasn't obtained by exotic or surreptitious means, but using software freely available to anyone. The Defense Department characterizes the collection as part of its "public information gathering, measurement and engagement activities." UpGuard (which seems to be running neck-and-neck with Kromtech in the race to find and report exposed S3 buckets) suggests that collection of posts by US citizens is troubling.
Speaking of Kromtech, more details emerge on the exposed Australian Broadcasting Corporation data the company described last week. They found the database (about two years' worth of backups) in a scan on November 14th; ABC secured it "within minutes" of disclosure.
The latest case of apparent Russian influence campaigning comes from Scotland, where a lot of traffic favoring Scottish independence ("nae British slave," etc.) appears to emanate from Russian troll farms.
In Germany, Chancellor Merkel yesterday told President Frank-Walter Steinmeier that talks to form a coalition government have stalled. It appears there will either be a minority government or new elections.
Famous ur-hacker John Draper, a.k.a. Captain Crunch, has been banned from Defcon over allegations of inappropriate behavior with young men.