• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

MI6 Sells Digital Camera on Ebay Containing Terrorist Images

October 8, 2008

Views: 4,510

[ad]

Another classic data leakage….and once again it happened on Ebay! This time it’s a British agency known as MI6 (Secret Intelligence Service) demonstrating a distinct lack of intelligence.

How on earth does something like even happen? Even smaller agencies and companies I’ve worked with have rigorous data destruction policies when old equipment is recycled or sold off, I’m sure MI6 has something similar.

The UK government is investigating how a digital camera containing terrorist images apparently taken by MI6 was sold on eBay.

The Nikon CoolPix camera was bought for £17 by a 28 year-old man from Hertfordshire and contained the names of al-Qaeda members, fingerprints and suspects’ academic records as well as pictures of rocket launchers and missiles, according to The Sun.

A Foreign Office spokeswoman said: “We can confirm that a police investigation is under way.”

However she refused to comment on whether the camera was put on sale by an MI6 operative, despite it containing details of MI6’s computer network.

Terrorist information, names and more for only £17! What a bargain.

It does puzzle me a bit htouhg, why would all of these documents be stored on a camera? Perhaps someone using the camera to covertly move documents out of MI6?

It seems odd for anything other than images to be on a CoolPix.

MI6 is the foreign intelligence service for the UK government with a broadly similar remit as the US CIA.

Terrorism author Neil Doyle said: “These are MI6 documents relating to an operation against al-Qaeda insurgents in Iraq. It’s jaw-dropping that they got into the public domain.

“Not only do they divulge secrets about operations, operating systems and previously unheard-of MI6 departments, but they could put lives at risk.”

Really bad PR for the agency I must say…at least no harm came of it and it was exposed so hopefully someone in power will do something about it and make sure the policies that I’m sure they have are implemented and enforced properly.

There’s no point having policies and procedures if they aren’t enforced, it’s not just good to do the paperwork, you have to put it in practice too!

Source: Vnunet

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Legal Issues, Privacy Tagged With: data-leak, data-security, ebay, Privacy, Security



Reader Interactions

Comments

  1. SpikyHead says

    October 8, 2008 at 12:56 pm

    Well As the say “However she refused to comment on whether the camera was put on sale by an MI6 operative”

    Which one is worse?

    – It was put on sale by MI6 operative
    – or, If it was NOT put on sale by MI6 operative

    first point shows lack of diligence and training at one of the most trusted govt agencies of the world.

    second proves that even this most trusted govt agency is vulnerable to breaches..

  2. pl0x says

    October 8, 2008 at 1:36 pm

    Don’t rule out the possibility that it’s a fake.

  3. s4 says

    October 8, 2008 at 3:51 pm

    couldnt agree more with plox. a couple of guys with tea towels and bb guns could easily set this up!

  4. Ian Kemmish says

    October 8, 2008 at 9:08 pm

    This appeared in The Sun on the same day as a “photograph” and report of a UFO following that guy who flew across the channel strapped to four jet engines.

    The MI6 report claimed that the purchaser, a deliveryman who, like all Sun readers lives with his mum, got a visit from men telling him to say nothing about it.

    Surely such a person is a) unlikely to be smart enough to recognise what he’s looking at, and b) unlikely to be dumb enough to talk after being given a friendly warning like that.

    Sounds like another case of “all the news that’s fit to make up”….

  5. Goodpeople says

    October 9, 2008 at 8:24 am

    I don’t believe a word of it.

    fun to read tho…

  6. davie says

    October 9, 2008 at 10:00 am

    i wouldent be to sure youl get a lot of folk that selling this to the papers would seem like a good idea(stupid i say)

  7. SpikyHead says

    October 10, 2008 at 5:53 am

    But if it was a fake, why didnt the Foreign Office spokeswoman said it was fake…

    And no news appeared in papers saying “It was fake!”

  8. navin says

    October 11, 2008 at 4:53 pm

    @ spikyhead

    If a spokesman said it was fake, it’d only increase suspicion of its authenticity….if such a statement did come out, i’d definitely say it was the real deal!!

  9. SpikyHead says

    October 13, 2008 at 5:05 am

    @naveen, But not telling that its fake isn’t doing any good either…

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 420

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 469

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 386

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 589

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 557

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 726

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,294,331)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,085)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,622)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,681)
  • Password List Download Best Word List – Most Common Passwords (933,487)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,146)
  • Hack Tools/Exploits (673,293)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,157)

Search

Recent Posts

  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy