Us Cyber Command Runs Out Of Storage For Hacked Data

✨ Megiddo

✨ President ✨
Staff member
Joined
May 15, 2016
Messages
10,422
Likes
2,620
Points
1,730
US Cyber Command underestimated the amount of data obtained as a result of hacking terrorist IT infrastructure.

3594c0f6fd23bf7e3129972ba194a049.jpg


The US Cyber Command was not ready for the large amounts of data obtained as a result of hacking the information infrastructure of the terrorist organization Daesh (it is prohibited in the Russian Federation). Although the hacking of DAISH accounts and servers was successful, the Cyber Command did not have enough space to store the extracted material. This is stated in documents published under the US Law on Freedom of Information (FOIA) on the website of the National Security Archive at George Washington University.

Six highly edited documents published on the site summarize the 120-day data assessment conducted by the Cyber Command at the close of Operation Glowing Symphony.

A secret offensive cyber operation was conducted in November 2016 by the Ares Combined Tactical Group (JTF-Ares). Its goal was to block the spread of propaganda on the Internet by hacking DAISH-owned social network accounts, sites and servers.

As it turned out during the analysis of the results of cyberoperation, Cyber Command underestimated the amount of data that he had to face. The question of where to store the materials extracted from the hacked infrastructure has become the most important.

In order to avoid similar problems in the future, Cyber Command recommended its Opportunity Development Group (CDG) to develop a new storage solution.
__________________
 
Top Bottom