The TSA “no fly” list has been leaked after it was found on an unsecured airline server

An alien hacker has obtained an old copy of the US government Terrorist Screening Database and a “do not fly” list from an unsecured commercial airline server.

Swiss hacker blog “maia arson crimew” on Thursday said it had discovered Transportation Security Administration A “no fly” list from 2019 and a set of data belonging to CommuteAir on an unsecured Amazon Web Services cloud server used by the airline.

The hacker told The Daily Dot that the list appears to have more than 1.5 million entries. The data reportedly included the names and dates of birth of various individuals the government had banned from air travel on suspicion or Known ties to terrorist organizations. The Daily Dot reports that the list contains multiple aliases, so the number of unique individuals on the list is well under 1.5 million.

Noteworthy individuals reported to be on the list are Russian gunsmith Viktor Boutwho was recently released by the Biden administration in exchange for WNBA star Brittney Griner, suspected IRA members and others, according to The Daily Dot.

The FAA reveals why a computer has stopped working

Passengers passing through airport security

Identity requirements signs at the entrance to the Transportation Security Administration Passenger Security Area in West Palm Beach, Florida. (Lindsey Nicholson/UCG/Universal Images Group via Getty Images/Getty Images)

The United States extends COVID-19 vaccine mandate for air travel to international visitors

“It’s crazy to me how huge the database of terrorism checks is, and yet there are still very clear trends toward names that sound almost exclusively Arabic and Russian throughout the million entries,” Crimew told the outlet.

Reached for comment, a spokesperson for the Media Security Administration said the agency is “aware of a potential cyber security incident, and we are investigating in coordination with our federal partners.”

In a statement to FOX Business, CommuteAir confirmed The legality of the hacked “no-fly” list and the data containing private information about the company’s employees.

TSA mark

A Transportation Security Administration pre-check sign is present at Dulles International Airport in Dulles, Virginia, August 19, 2015. (Andrew Harrier/Bloomberg via Getty Images/Getty Images)

FTX says hackers stole $415 million after cryptocurrency exchange due to bankruptcy

“CommuteAir has been notified by a member of the security research community who has identified a faulty development server,” said Eric Kane, CommuteAir’s director of corporate communications. The researcher had access to files, including the old 2019 version of the federal no-fly list that included first and last name and date of birth. Additionally, through information on the server, the researcher discovered access to a database containing personally identifiable information on CommuteAir employees.

“Based on our initial investigation, no customer data was disclosed,” Kane added. “CommuteAir immediately shut down the affected server and began an investigation to determine the extent of access to the data. CommuteAir reported the data exposure to the Cybersecurity and Infrastructure Security Agency and its staff as well.”

Embraer ERJ-145XR aircraft

An Embraer ERJ-145XR aircraft operated by CommuteAir. (CommuteAir/Fox News)

CommuteAir is a regional airline founded in 1989 and headquartered in Ohio. The airline operates with hubs in Denver, Houston and Washington Dulles and operates more than 1,600 weekly flights to more than 75 US destinations and three in Mexico.

Click here to read more about FOX BUSINESS

According to the Wikipedia Crimew page, which the hacker maintains is accurate, she was indicted by a grand jury in the United States in March 2021 in connection with her alleged hacking activity between 2019 and 2021. / Security researcher, artist, mentally ill Enppi Pulliam trans lesbian anarchist kitten ( θΔ), 23 years old.”

Leave a Reply

Your email address will not be published. Required fields are marked *