Posted on Aug 19, 2015
CW5 Regimental Chief Warrant Officer
26.1K
79
72
6
6
0
So 15,000 accounts are linked to .mil or .gov email addresses. I wonder if anyone will data mine these addresses and look into any violations of UCMJ. It would be hard to prove, for sure.

What would you do if you knew one of your subordinates or leaders had one of these accounts?

--
Hackers claimed Tuesday to have leaked personal data of millions of people that was stolen in a cyberattack on the parent company of Ashley Madison, an online dating site aimed at people who wish to have extramarital affairs.

WIRED reported that a group called the Impact Team, who claimed responsibility for last month's hack, posted 9.7 gigabytes of stolen user data on the so-called "dark web," a reference to a part of the Internet that can only be accessed through a specialized browser.

According to WIRED, the leaked data includes customer names, login details, street and e-mail addresses, and details of transactions that date as far back as 2007. However, WIRED reported that the data does not appear to include full credit card numbers. In all, approximately 32 million accounts at Ashley Madison and Established Men, a site aimed at women looking to date wealthy men, are believed to be affected.

It is not clear how much of the data belongs to real customers or are from fake, so-called "burner" accounts. However, WIRED reported that approximately 15,000 leaked e-mail addresses use .gov and .mil domains, meaning that they are hosted by U.S. government and military servers.

Toronto-based Avid Life Media, Inc., the parent company of both websites, said in a statement obtained by the Associated Press that it was aware of the group's claim and was investigating.

"The criminal, or criminals, involved in this act have appointed themselves as the moral judge, juror, and executioner," the company said, accusing the hackers of seeking to impose "a personal notion of virtue on all of society."

Security analysts who examined the leaked data said they believed the information dump to be genuine. Brian Krebs, a former Washington Post reporter who writes a blog on computer security and broke news of the initial hack last month, reported that he had spoken to three sources who reported finding their last names and credit card information in the database.

The hack was made public July 20, the day after Krebs' initial report was posted online. The Impact Team demanded at the time that Avid Life Media shut down Ashley Madison and Established Men. The group claimed to have targeted the company over its alleged fraudulent business practices, saying that Ashley Madison and Established Men's "full delete" tool does not remove users’ personal information for a one-time $19 fee, as promised by the sites.

"Shutting down AM and EM will cost you, but non-compliance will cost you more," a statement warned. "We will release all customer records, profiles with all the customers’ secret sexual fantasies, nude pictures, and conversations and matching credit card transactions, real names and addresses, and employee documents and emails."

WIRED reported that the Impact Team introduced the new data dump with a statement titled "Time's Up!"

"Avid Life Media has failed to shut down Ashley Madison and Established Men," the statement read. "We have explained the fraud, deceit, and stupidity of ALM and their members. Now everyone gets to see their data.

The statement continued: "Find someone you know in here? Keep in mind the site is a scam with thousands of fake female profiles. See ashley madison fake profile lawsuit [sic]; 90-95% of actual users are male. Chances are your man signed up on the world's biggest affair site, but never had one. He just tried to. If that distinction matters.

"Find yourself in here? It was ALM that failed you and lied to you. Prosecute them and claim damages. Then move on with your life. Learn your lesson and make amends," the statement concludes. "Embarrassing now, but you'll get over it."

http://www.foxnews.com/tech/2015/08/19/hackers-say-theyve-posted-data-adultery-website-ashley-madison-users-online/?intcmp=hpbt3
Posted in these groups: Ucmj UCMJ8e82e190 AdulterySocial media logo Social Media
Avatar feed
Responses: 27
CPT Field Artillery Officer
6
6
0
I wouldn't take relationship advice from them.....?
(6)
Comment
(0)
CSM Carl Cunningham
CSM Carl Cunningham
>1 y
ha ha, well said ma'am!
(0)
Reply
(0)
Avatar small
MAJ Bryan Zeski
6
6
0
I wouldn't care. The days of the military being responsible for the morality and private affairs of it's employees should be over. It's not. But it should be. When Congress and the Presidency decides to set the example on personal affairs, then I'll pay attention - until then, it's an archaic "tradition" that should go far far away.
(6)
Comment
(0)
CW5 Regimental Chief Warrant Officer
CW5 (Join to see)
>1 y
MAJ Bryan Zeski - Sir, please look up at my response above that addresses the idea that argues for the retention of articles like 125.
(0)
Reply
(0)
MAJ Bryan Zeski
MAJ Bryan Zeski
>1 y
CW5 (Join to see) - Thanks for your reply, I missed the one up there. I understand what you are saying, but I just have to disagree that 125 and 124 are valid because of some very extraneous situations they can be used to catch people in legitimately while very clearly regulating ALL sexual activity both on and off duty. Writing entire UCMJ Articles to stop your 1SG from having oral sex with someone else's spouse in his office... if that's really such a common occurrence that it needs a special UCMJ Article, maybe we have bigger issues to think about...
(0)
Reply
(0)
SFC MLRS/HIMARS Crewmember
SFC (Join to see)
>1 y
MAJ Bryan Zeski, I think we can both agree that JAG is going to be busy on this one. The regs are open to interpretation. Some Commanders may push for punishment, whereas other may pursue letters of reprimand or other forms of NJP. Some commands my even push for chapter proceedings. The factors we've discussed and the qualities of those Soldiers in question will be how command makes that decision. Whether there is legal precedent will be up to the lawyers.
(0)
Reply
(0)
MAJ Bryan Zeski
MAJ Bryan Zeski
>1 y
SFC (Join to see) I agree that that is what will happen - I still think it's ridiculous and a waste of time and money.
(0)
Reply
(0)
Avatar small
Capt Richard I P.
6
6
0
1. The government has better breaches to spend their time data mining, the recent OPM breach comes to mind. 2. Chain of custody of this a PII is non existent. It would be a legal nightmare to prove a soldier's name on this list constituted a violation of the UCMJ beyond a reasonable doubt. The hackers could easily have added additional names to the list, or generated entirely false ones.
(6)
Comment
(0)
Sgt Operations Nco
Sgt (Join to see)
>1 y
well I say that since some of those accounts are probably people really high up those people will be fighting to have nothing happen about it.
(0)
Reply
(0)
LCDR Deputy Department Head
LCDR (Join to see)
>1 y
Sgt (Join to see) In my opinion any one really high up with an account should be held to an even higher standard.
(1)
Reply
(0)
Sgt Operations Nco
Sgt (Join to see)
>1 y
LCDR (Join to see) - I agree but what should happen and what does happen rarely coincides. Big money and corrupt officials always make the outcome. rarely is justice ever served for the powerful and wealthy.
(0)
Reply
(0)
SGT Project Engineer
SGT (Join to see)
>1 y
LCDR (Join to see) - I see it as we have laws.. both in society and UCMJ. Regardless of what has transpired, there cannot be any proof that anything illegal has happened unless there is confessions involved. Therefore it is pointless to sink tax money into this.

One can be bothered that these websites exist, but the behavior has always existed. Someone told me a long time ago, what you do not find in your relationship - you will find outside it.
(0)
Reply
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close