Congressman twitters secret trip to Iraq
Posted on 12 February 2009.
Sophos is warning computer users of the far reaching consequences associated with the irresponsible use of social networking sites like Twitter, following news that a high ranking member of the US House Intelligence Committee tweeted details of a secret congressional visit to Iraq.

According to reports, Representative Peter Hoekstra tweeted his arrival in Baghdad via his BlackBerry with the following post: "Just landed in Baghdad. I believe it may be first time I've had bb service in Iraq. 11th trip here."

Hoekstra had announced the trip in advance via his Twitter page and continued to post details about the party’s itinerary every few hours, until the morning of Friday 6th February. His last post read: "Moved into green zone by helicopter Iraqi flag now over palace. Headed to new US embassy Appears calmer less chaotic than previous here [sic]."

Although it’s unclear whether Hoekstra broke any laws by revealing the information, the fact remains that the congressional delegation’s visit to the warzone last week was supposed to have been kept secret for obvious security reasons. Even US media outlets, like the Congressional Quarterly, that knew of the trip agreed to keep information under wraps until the party left Iraq.

Graham Cluley, senior technology consultant at Sophos said:
This is a serious security blunder by the US government - the Republican congressman is not only putting himself at risk with his careless Twittering, but also the people tasked with protecting him. Although these sites are evolving into great networking tools, security and common sense is crucial: even more so when you are a high ranking government official. In Hoekstra’s case, a foolish security breach like this was a deadly gift for many kinds of criminals. Users must be more savvy about the content of their posts and the way in which they use these social networking sites – with sensitive information like this in the public domain, who knows what could have happened.





Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //