• Art Jahnke

    Senior Contributing Editor

    Art Janke

    Art Jahnke began his career at the Real Paper, a Boston area alternative weekly. He has worked as a writer and editor at Boston Magazine, web editorial director at CXO Media, and executive editor in Marketing & Communications at Boston University, where his work was honored with many awards. Profile

Comments & Discussion

Boston University moderates comments to facilitate an informed, substantive, civil conversation. Abusive, profane, self-promotional, misleading, incoherent or off-topic comments will be rejected. Moderators are staffed during regular business hours (EST) and can only accept comments written in English. Statistics or facts must include a citation or a link to the citation.

There are 9 comments on ROTC Computer Files Found in the Public Domain

  1. And so how do I tell if I was effected? Sit around and wait for BU to contact me? It has been a looooong time since I was in the ROTC program at BU I doubt they still have my unlisted phone number.

  2. The tag line on this article: Technology error exposes personal information – seems to be the wrong synopsis. Per the article, it was a human decision to install file transfer software on an otherwise secure machine that exposed sensitive information.

    I wish they had disclosed the reason the FTP program was installed – Was it another case of someone trying to acquire bootleg songs or software?
    Did they expose their buddies trying to commit what they consider a ‘victimless crime?’ I am just speculating here – I have no knowledge of the incident beyond this article.

  3. Just got the letter from BU today, thought maybe it was phishing, guess not. reminds me of the VA scandal that happened a few years back with the stolen laptop. Sure wish veterans could get better protection….

  4. Boston University is offering only one year of paid identity protection to the people who were affected by this. So are they supposed to purchase the protection with their own money for the rest of their lives as a result of the carelessness of the University and the ROTC program? Thanks alot.

  5. There are no reason why that SVR hold that much of unrelated information. Why do BU ROTC hold other cadet programs information? This is a mess and PMS and ROTC CMD failed to follow the Army G6 guidelines and not doing any IA.

  6. As a follow up, Mr. Jahnke can give us a cost estimate of how much BU will be paying for this service? I hope this is coming out of the Army ROTC budget, and will not have an impact on the Navy and the Air Force. Who put the file sharing on the computer, a student or a faculty/army member? Is BU potentially liable?

    The ROTC detachment has been well known as an easy place to access and to use the computers in the basement. The command there regularly allows cadets to leave computers on overnight, access any sites on the internet they want, etc. In the first floor copier room there is a computer that was left on ALL THE TIME (the reason being some nonsensical attempt at creating a “unit server”)! Was this the computer that was compromised or are they still leaving it on all night waiting for the next hacker to break into the system and compromise something else?

    As was pointed out in another posting, the Army can’t even seem to follow their own regulations. Is this the type of “Leadership” example that the Army is providing to BU to train officers? It is laughable. If there is any Army money being spent to fix the problem, perhaps Colonel Williams could contribute a months worth of his pay toward the cause.

    I look forward to a follow up article revealing who installed the software, for what reason and how much the University will have to pay to remedy the situation. It also would be interesting to get an assessment of the potential liability involved.

  7. I just got the letter as well. I didn’t even go to Boston U – I went to another ROTC program at a university 5 states away, 6 years ago! Why did they have my information? How did a CADET have access to this information? And what is being done about this cadet’s blatant disregard for OPSEC and plain lack of common sense?

  8. How did the student get admin access to install the program?
    Who is responsible for review of the server event logs?
    Most importantly, WHY wasn’t the data encrypted?

Post a comment.

Your email address will not be published. Required fields are marked *