Personal info of 100K sailors, Marines posted to public site

Share this article:

The personal information of more than 100,000 U.S. Navy and Marine Corps members was errantly posted on the Naval Safety Center website, the Navy announced in a statement Friday.

The site, normally publicly available, was not accepting visitors today, four days after officials removed the full names and Social Security numbers of aviators and air crew at http://www.safetycenter.navy.mil.

In addition, the same confidential data was saved on 1,083 web-enabled safety system program disks that were mailed to Navy and Marine Corps command center.

Evelyn Odango, a Naval Safety Center spokeswoman, said the information was posted due to a programming error made during the creation of an application for the website last December. The program reported aviator mishaps.

The Navy was working to notify in writing all affected individuals, who include active and reserve aviators who have served in the past 20 years, the statement said. The Navy also established a call center, available to answer questions, at (866) 827-5672.

Last month, the personal data of about 28,000 Navy sailors and their family members were discovered on a civilian website. It is unclear how the information got on that site.

In both cases, officials do not believe any of the data has been used illegally.

Both incidents follow the massive breach in which the personal information of some 26.5 million veterans and current military members was compromised following the theft of a laptop from the home of a former Department of Veterans Affairs employee.

The laptop has since been turned into authorities.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Schumer: Feds should do 'top to bottom' probe of online drug marketplaces

Sen. Charles Schumer of New York has called on federal law enforcement officials to stop "copy cat websites."

ShellShock vulnerability exploited in SMTP servers

Researchers at Trend Micro found that attackers were targeting Simple Mail Transfer Protocol (SMTP) servers to execute malicious code and an IRC bot.

Hackers grab email addresses of CurrentC pilot participants

Hackers grab email addresses of CurrentC pilot participants

Although the hack didn't breach the mobile payment app itself, consumer confidence may be shaken.