• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

MI6 Sells Digital Camera on Ebay Containing Terrorist Images

October 8, 2008

Views: 4,467

[ad]

Another classic data leakage….and once again it happened on Ebay! This time it’s a British agency known as MI6 (Secret Intelligence Service) demonstrating a distinct lack of intelligence.

How on earth does something like even happen? Even smaller agencies and companies I’ve worked with have rigorous data destruction policies when old equipment is recycled or sold off, I’m sure MI6 has something similar.

The UK government is investigating how a digital camera containing terrorist images apparently taken by MI6 was sold on eBay.

The Nikon CoolPix camera was bought for £17 by a 28 year-old man from Hertfordshire and contained the names of al-Qaeda members, fingerprints and suspects’ academic records as well as pictures of rocket launchers and missiles, according to The Sun.

A Foreign Office spokeswoman said: “We can confirm that a police investigation is under way.”

However she refused to comment on whether the camera was put on sale by an MI6 operative, despite it containing details of MI6’s computer network.

Terrorist information, names and more for only £17! What a bargain.

It does puzzle me a bit htouhg, why would all of these documents be stored on a camera? Perhaps someone using the camera to covertly move documents out of MI6?

It seems odd for anything other than images to be on a CoolPix.

MI6 is the foreign intelligence service for the UK government with a broadly similar remit as the US CIA.

Terrorism author Neil Doyle said: “These are MI6 documents relating to an operation against al-Qaeda insurgents in Iraq. It’s jaw-dropping that they got into the public domain.

“Not only do they divulge secrets about operations, operating systems and previously unheard-of MI6 departments, but they could put lives at risk.”

Really bad PR for the agency I must say…at least no harm came of it and it was exposed so hopefully someone in power will do something about it and make sure the policies that I’m sure they have are implemented and enforced properly.

There’s no point having policies and procedures if they aren’t enforced, it’s not just good to do the paperwork, you have to put it in practice too!

Source: Vnunet

Share2
Tweet
Share
Buffer
WhatsApp
Email
2 Shares

Filed Under: Legal Issues, Privacy Tagged With: data-leak, data-security, ebay, Privacy, Security



Reader Interactions

Comments

  1. SpikyHead says

    October 8, 2008 at 12:56 pm

    Well As the say “However she refused to comment on whether the camera was put on sale by an MI6 operative”

    Which one is worse?

    – It was put on sale by MI6 operative
    – or, If it was NOT put on sale by MI6 operative

    first point shows lack of diligence and training at one of the most trusted govt agencies of the world.

    second proves that even this most trusted govt agency is vulnerable to breaches..

  2. pl0x says

    October 8, 2008 at 1:36 pm

    Don’t rule out the possibility that it’s a fake.

  3. s4 says

    October 8, 2008 at 3:51 pm

    couldnt agree more with plox. a couple of guys with tea towels and bb guns could easily set this up!

  4. Ian Kemmish says

    October 8, 2008 at 9:08 pm

    This appeared in The Sun on the same day as a “photograph” and report of a UFO following that guy who flew across the channel strapped to four jet engines.

    The MI6 report claimed that the purchaser, a deliveryman who, like all Sun readers lives with his mum, got a visit from men telling him to say nothing about it.

    Surely such a person is a) unlikely to be smart enough to recognise what he’s looking at, and b) unlikely to be dumb enough to talk after being given a friendly warning like that.

    Sounds like another case of “all the news that’s fit to make up”….

  5. Goodpeople says

    October 9, 2008 at 8:24 am

    I don’t believe a word of it.

    fun to read tho…

  6. davie says

    October 9, 2008 at 10:00 am

    i wouldent be to sure youl get a lot of folk that selling this to the papers would seem like a good idea(stupid i say)

  7. SpikyHead says

    October 10, 2008 at 5:53 am

    But if it was a fake, why didnt the Foreign Office spokeswoman said it was fake…

    And no news appeared in papers saying “It was fake!”

  8. navin says

    October 11, 2008 at 4:53 pm

    @ spikyhead

    If a spokesman said it was fake, it’d only increase suspicion of its authenticity….if such a statement did come out, i’d definitely say it was the real deal!!

  9. SpikyHead says

    October 13, 2008 at 5:05 am

    @naveen, But not telling that its fake isn’t doing any good either…

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

AgentSmith HIDS - Host Based Intrusion Detection

AgentSmith HIDS – Host Based Intrusion Detection

padre - Padding Oracle Attack Tool

padre – Padding Oracle Attack Exploiter Tool

Privacy Implications of Web 3.0 and Darknets

Privacy Implications of Web 3.0 and Darknets

DataSurgeon - Extract Sensitive Information (PII) From Logs

DataSurgeon – Extract Sensitive Information (PII) From Logs

Pwnagotchi - Maximize Crackable WPA Material For Bettercap

Pwnagotchi – Maximize Crackable WPA Key Material For Bettercap

HardCIDR - Network CIDR and Range Discovery Tool

HardCIDR – Network CIDR and Range Discovery Tool

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (225)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (430)
  • Forensics (64)
  • Hacker Culture (8)
  • Hacking News (228)
  • Hacking Tools (681)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (72)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (218)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,181,984)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,172,353)
  • Top 15 Security Utilities & Download Hacking Tools (2,095,362)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,198,682)
  • Password List Download Best Word List – Most Common Passwords (931,852)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (774,478)
  • Hack Tools/Exploits (672,593)
  • Wep0ff – Wireless WEP Key Cracker Tool (528,865)

Search

Recent Posts

  • AgentSmith HIDS – Host Based Intrusion Detection August 31, 2023
  • padre – Padding Oracle Attack Exploiter Tool May 28, 2023
  • Privacy Implications of Web 3.0 and Darknets March 31, 2023
  • DataSurgeon – Extract Sensitive Information (PII) From Logs March 21, 2023
  • Pwnagotchi – Maximize Crackable WPA Key Material For Bettercap February 12, 2023
  • HardCIDR – Network CIDR and Range Discovery Tool December 29, 2022

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2023 Darknet All Rights Reserved · Privacy Policy