Thief steals U.S. Army laptop from employee's home

Share this article:
A laptop containing the personal information of tens of thousands of U.S. Army soldiers, family members and U.S. Department of Defense employees was recently stolen.

How many victims? 42,000.

What type of personal information? Names and unspecified personally identifiable information.

What happened? The laptop was stolen on Nov. 28 from an employee of the Fort Belvoir Family and Morale, Welfare and Recreation (MWR) Command, located in Virginia. There were signs of forced entry into the employee's residence where the laptop was stolen. Other high-value electronics and jewelry were also stolen.

Details: The Family and MWR Command operates several facilities on Fort Belvoir, including child care centers, bowling alleys, restaurants, and golf courses. Individuals who have who used an MWR facility on Fort Belvoir since 2005 may be included in the data on the laptop.

It is unlikely the information on the computer will be compromised because it was protected by three layers of security access and encryption passwords.

What was the response? The Family and MWR Command was made aware of the theft Dec. 1, then conducted an assessment to determine the extent of the breach. Letters will be sent to affected individuals.

Local authorities are investigating the incident, which appears to be a random burglary. Military authorities are investigating whether proper security protocols were followed.

Source: U.S. Army, www.army.mil, “Laptop containing personal information about MWR customers stolen,” Dec. 16, 2009.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

EPIC: driver data shared via V2V technology needs protection

The groups shared comments on V2V communications with the National Highway Traffic Safety Administration.

Researchers observe recently patched Adobe bug added to exploit kits

Researchers have indicated that a recently patched integer overflow in Adobe Flash Player has been added to exploit kits.

SEDNIT malware delivered in 'Operation Pawn Storm'

SEDNIT malware delivered in 'Operation Pawn Storm'

Military, governments and media from around the world are targets in a campaign identified by Trend Micro.