Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Nuclear Flash Cards: US Secrets Exposed on Learning Apps

US troops charged with guarding nuclear weapons in Europe used popular education websites to create flash cards, exposing their exact locations and top-secret security protocols, according to the investigative site Bellingcat Friday.

US troops charged with guarding nuclear weapons in Europe used popular education websites to create flash cards, exposing their exact locations and top-secret security protocols, according to the investigative site Bellingcat Friday.

To familiarize themselves with things like which shelters in various locations had “hot” vaults with live nuclear bombs, with security patrol schedules, and with identification badge details, the soldiers created digital flash card sets on apps like Chegg Prep, Quizlet and Cram.

“By simply searching online for terms publicly known to be associated with nuclear weapons, Bellingcat was able to discover cards used by military personnel serving at all six European military bases reported to store nuclear devices,” wrote Foeke Postma, the author of the Bellingcat article.

They found one set of 70 flashcards on Chegg, entitled “Study!”, which noted the exact shelters containing nuclear weapons at Volkel Air Base in the Netherlands.

“How many WS3 vaults are there on Volkel ab,” said the question side of one virtual flash card, referring to the military term for weapons storage and security systems.

“eleven (11)” it read on the answer side.

Another card from the same set indicated that five of the eleven vaults were “hot” with nuclear bombs while the other 6 were “cold,” and specified which vaults.

A set of 80 cards on the Cram flashcard site detailed hot and cold vaults at Aviano Air Base in Italy, and revealed how a soldier should respond in activating them based on the different level of alarms they receive.

Advertisement. Scroll to continue reading.

Other cards exposed secrets at bases in Turkey, Belgium and Germany. Some detailed the location of security cameras; others gave the secret “duress words” that a soldier, perhaps seized by attackers, would say over a phone to indicate he had been taken prisoner.

The flashcards Bellingcat discovered were publicly available as far back as 2013, and some were being used as recently as April 2021.

Bellingcat said those it had viewed appeared to have been removed after it contacted NATO and the US military for comment before it published its article.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization's data security and resilience.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Defense contractor Nightwing has appointed Tricia Fitzmaurice as Chief Growth Officer.

Xage Security has appointed Russell McGuire as CRO and Ashraf Daqqa as VP of the META region.

Solana co-founder Stephen Akridge has been appointed the CEO of data protection firm Cyber Grant.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.