Unintended Database Exposes Bangladesh Intelligence Agency’s Information

Sensitive data, encompassing a broad array of personal information including names, professions, and even passport details, linked to Bangladesh’s National Telecommunication Monitoring Center (NTMC), has been exposed through an unsecured database. Hackers exploited the vulnerability and purportedly seized this trove of information, causing grave concerns about the reach and implications of such disclosures.

While Wired validated a portion of the leaked data, comprising names, phone numbers, email addresses, and locations, the precise nature and intent behind this amassed information remain shrouded in mystery. The NTMC and Bangladeshi officials have remained silent on these revelations, leaving a void of clarification on the data’s purpose and origins.

The inadvertent exposure sheds light on the usually opaque realm of signals intelligence, offering a glimpse into the collection of telecommunications and internet activity. Viktor Markopoulos, a security researcher, linked the database to the NTMC and identified multiple data categories within, such as call records, birth registrations, financial details, and even Twitter-related logs.

Primarily constituted of metadata, the disclosed data encapsulates the essential “who, what, how, and when” aspects of communications, revealing connections between numbers and call durations without exposing audio content. Birth details, finance records, national ID numbers, and cell phone specifics were prevalent within the exposed information, hinting at the vast scope of surveillance.

Though some entries seemed to contain test data or incomplete records, Wired’s inquiry confirmed the accuracy of certain details. Despite efforts to reach out to affected individuals, ambiguity persists regarding the exact data source.

Jeremiah Fowler, a security consultant, highlighted the peril of disclosed IMEI numbers, emphasizing the potential for device tracking or cloning using such critical identifiers.

In response to the exposed database, the NTMC remained unresponsive, evading queries concerning the purpose and extent of the amassed information. Markopoulos reported the breach to Bangladesh’s Computer Incident Response Team (CIRT), prompting acknowledgment of the exposure, yet offering no substantial clarification from the NTMC.

Amidst this revelation, the database faced a ransomware attack, with an unknown entity demanding payment or threatening to publicly disclose and delete the data. Though the database temporarily vanished, signs of reactivation emerged, fueling concerns about ongoing surveillance activities.

The NTMC, established in 2013, asserts its role in lawful communication interception, fostering apprehension about the scale and depth of surveillance. Recent reports allude to its connectivity with multiple agencies and incorporation of data from diverse sources.

Amid mounting protests and an impending election, concerns loom over potential amplification of surveillance efforts, raising alarms about citizens’ privacy rights in a digitally evolving landscape.

ALL LATEST
- Advertisment -ad

Most Popular