What You Need To Know About The Cyberattack On The US Customs and Border Protection Agency

The US Customs and Border Protection Agency (or CBP) was recently alerted to a cyberattack on a subcontractor that collected and stored identifying images of travelers arriving at a Canadian border crossing. Keep reading for everything you want to know.

The current count of individuals affected is at 100,000, causing quite a stir with US Government officials and policymakers. The tense political climate surrounding the rise of new strategies for documenting incoming and outgoing border travelers has only escalated in the past couple of months as lawmakers consider implementing new technologies at US border crossings.

How did this happen?

Federal officials believe that the individuals behind the cyberattack hacked into the security cameras and facial recognition database of a CBP subcontractor based at a US-Canadian point of entry.

The nature of the information contained on the subcontractor’s server is both extremely sensitive, and very useful to many cybercriminals, therefore making it a lucrative target.

What was stolen in the attack?

The CBP subcontractor that was targeted in the attack mainly collected images of travelers’ faces, facial recognition data, and license plates. It is estimated that over 100,000 individuals were affected by this breach.

These kinds of key personal identifiers being exposed in a cyberattack will likely have significant implications as lawmakers and government officials hold discussions about what kind of information should be collected at US borders, and the level of security needed to protect this information from vulnerabilities and malicious third-parties.

What can you do to lessen the fallout of a cyberattack?

Unfortunately, if someone else who stores your data is hacked there isn’t much you can do protect yourself. However, you can and should always protect your own devices:

  1. Always back up your valuable data. No one wants to lose important work documents or treasured family photos, so make sure you back up your documents and images to a cloud-based service (i.e. Google Drive), or a storage device (i.e. an external hard drive).
  2. Secure your devices to prevent incoming cyberattacks. Make sure that you have an active and up-to-date antivirus protection program and that you regularly scan your computer for infections and malware with your FixMeStick. You can also access the FixMeStick-exclusive discount on McAfee Total Protection here.
  3. Create strong and unique passwords. Having a hard-to-crack password on all of your accounts makes your sensitive data less vulnerable to cyberattacks. Need ideas for how to make a strong password? Check out our guide here.

Do you have more questions about what to do if you’ve been the target of a cyberattack? Let us know in the comments below and we will give you all the information you need!

3 comments

  1. Morkwa - Reply

    wear belaclavas until you get to the window to talk to the agent or black garbage bags over your head like the mooslims do

  2. Ronald Nielsen - Reply

    Big brother is always watching. Sometimes I think too much technology may not be a great thing after all. Do we really need as much as we have? Don’t fool yourself, every time that you turn on your computer, somebody knows about it. Nothing is safe on your computer. Somebody out there knows every little thing that you download, email, text or comment on. Facebook, for example, is the worst social media tool out there. It’s collecting information on you every time that you use it. That’s why I stopped using Facebook, Twitter, etc. If I didn’t need a Laptop for work, I wouldn’t have one at all. I don’t even like cell phones. Sit on a bus, sit in a restaurant or go for a walk and observe how many sheeple are texting on their cell phones. Whatever happened to actually talking to each other? I could go on for hours about how much I hate technology, but I have to head for work now.

    • Linda - Reply

      Hi Ronald, thank you for sharing with us your thoughts on privacy. It’s great to see that you have evaluated your own social media use. I’m sure our blog readers may consider doing the same as well.

Leave a Reply to Linda Cancel reply

Your email address will not be published.