Skip to main content

USB stick found in street contains Heathrow Airport security information

usb stick security alert airport memory
Nulinukas/123RF
We know all too well that sticking a found USB flash drive into your computer carries big risks, and in a worst-case scenario, it could fry your machine.

Perhaps that’s why one curious guy in London recently headed to a library with a stick he reportedly found in the street. But instead of ruining one of the library’s computers, the USB stick revealed highly confidential information linked to the security procedures of one of the world’s busiest airports, according to the Sunday Mirror.

Recommended Videos

None of the 2.5GB of data on the flash drive was encrypted or password protected, allowing the man to explore 76 folders holding sensitive security information for London’s Heathrow airport.

Please enable Javascript to view this content

Containing “maps, videos, and documents,” the data revealed, for example, the route the Queen and her entourage take when heading to and from the airport, and the security measures put in place to ensure her safety. Some of the information was labeled as “confidential” and “restricted” but could still be accessed in a couple of clicks.

Getty
Getty

The stick also contained details of all the different kinds of identification required to enter the airport’s restricted areas — including for undercover cops — and “maps pinpointing CCTV cameras and a network of tunnels and escape shafts linked to the Heathrow Express,” a train route that runs between the airport and central London.

The man said he found the stick in a residential street about 10 miles east of the airport. He handed it to the Mirror, which immediately contacted Heathrow officials. The airport operator is now conducting an investigation into the matter.

Unnamed sources connected with the airport told the news outlet that those looking into the matter were keen to discover if the incident was the result of an “incompetent data breach” or if someone had intentionally transferred the information onto the drive and taken it off site, possibly for nefarious purposes such as terror or cyberattacks.

Every year Heathrow handles around 75 million passengers who are flown by more than 80 airlines to destinations around the world, leaving the authorities with a huge security challenge. The idea that someone working at the airport may have secretly transferred the data onto a stick and then taken it away from the site will be of huge concern.

Heathrow said in a statement that passenger and staff safety was its “top priority,” adding that it was confident the airport was “secure.”

While slotting a USB stick into a computer is certainly a risky thing to do, in this case it appears to have exposed a monumental lapse in security that’s certain to force the airport into conducting a full review of the way it handles sensitive data.

Trevor Mogg
Contributing Editor
Not so many moons ago, Trevor moved from one tea-loving island nation that drives on the left (Britain) to another (Japan)…
OpenAI opens up developer access to the full o1 reasoning model
The openAI o1 logo

On the ninth day of OpenAI's holiday press blitz, the company announced that it is releasing the full version of its o1 reasoning model to select developers through the company's API. Until Tuesday's news, devs could only access the less-capable o1-preview model.

According to the company, the full o1 model will begin rolling out to folks in OpenAI's "Tier 5" developer category. Those are users that have had an account for more than a month and who spend at least $1,000 with the company. The new service is especially pricey for users (on account of the added compute resources o1 requires), costing $15 for every (roughly) 750,000 words analyzed and $60 for every (roughly) 750,000 words generated by the model. That's three to four times the cost of performing the same tasks with GPT-4o.

Read more
The Dell G16 gaming laptop with RTX 4070 is $450 off right now
The Dell G16 7630 gaming laptop on a white background.

Gaming laptop deals that are truly worth buying usually don't come cheap, but if you look hard enough, you can find offers that will let you enjoy huge savings. Here's a great example: the Dell G16 with a $450 discount from Dell, which brings it down from $1,750 to a more reasonable $1,300. You're going to get amazing value at this price, but if you want to pocket the savings, you're going to have to rush into completing your purchase because we're not sure how much time is remaining before the bargain expires.

Why you should buy the Dell G16 gaming laptop
The Dell G16 gaming laptop is a pretty powerful device, as it runs on the 13th-generation Intel Core i9 processor, the Nvidia GeForce RTX 4070 graphics card, and 16GB of RAM. With these specifications, it won't have any trouble playing today's best PC games, and with its 1TB SSD, you'll have enough storage space for several AAA titles with all of their required updates and optional DLCs. The Dell G16 ships with Windows 11 Home, so you can start downloading and installing games right after unboxing.

Read more
The massive LastPass hack from 2022 is still haunting us
LastPass website on a laptop.

Just when you thought the LastPass breach of 2022 was over, we're still learning just how detrimental the hack was. According to blockchain expert ZachXBT and spotted by The Block, $5.36 million was stolen from 40 users in a string of attacks. This is on top of the $4.4 million stolen in October 2023 and $6.2 million earlier this year in February 2024.

The original hack goes back to 2022 when hackers claimed to have accessed LastPass' data, which contained API tokens, customer keys, multifactor authentication seeds (MFA), and encrypted password vaults. Although no official information explains how the breach happened, it's possible that the hacker responsible gained access to information that aided the breach. Hackers forced their way in despite the password vaults being encrypted because users reused weak or previously leaked combinations. This access, combined with the users' weak or reused passwords, led to the various accounts being compromised.

Read more