Military and Police

NATO Troops Get Phished on Social Media, Revealing Serious Vulnerabilities

In a carefully crafted social engineering scheme, NATO troops were persuaded to abandon their posts and reveal sensitive details about military maneuvers.

According to reports, the clandestine social media operation that ensnared some 150 personnel was launched by their own side.

A secret “Red Team” was assembled in NATO’s Stratcom Centre of Excellence in Latvia. Their mission was to target unwitting NATO troops as they took part in a scheduled military exercise in an unnamed “allied country.”

One NATO official who helped organize the Red Team explained that the goal of the operation attempted to answer important questions about the vulnerability of soldiers to being manipulated via online mediums. “The first question is, What can we find out about a military exercise just from open source data? What can we find out about the participants from open source data? And, can we use all this data to influence the participants’ behaviors against their given orders?” explained the NATO software engineer.

Stratcom’s report detailed how Red Team operatives set up fake social media pages, luring soldiers into closed Facebook groups, where fake accounts then asked them sensitive questions about the military exercise they were involved with.

The campaign succeeded not only at extracting sensitive information from troops, but even compelled service members to engage in “undesirable behavior.” This included influencing them to leave their positions against orders.

The details of the NATO operation and Stratcom’s findings have been delivered to administration officials in Washington.

The news highlights the ever present risk of information compromise when it comes to military personnel. With any luck, operations like these will help drive home this danger to troops on the ground. Hopefully, personnel will be more vigilant when it isn’t just a drill.

The opinions expressed here by contributors are their own and are not the view of OpsLens which seeks to provide a platform for experience-driven commentary on today's trending headlines in the U.S. and around the world. Have a different opinion or something more to add on this topic? Contact us for guidelines on submitting your own experience-driven commentary.
Samuel Siskind

Samuel Siskind studied intelligence research at the American Military University in West Virginia. He served as a squad commander in the Israeli Defense Force (IDF) Corp of Combat Engineers, in the Corps' ground battalions and later in its Intelligence Wing at regional and divisional stations. For the past five years, Samuel has worked as a consultant and researcher on physical and information security issues for private and governmental institutions, in the US, Africa, India, and Israel. He currently lives in Jerusalem.

Join the conversation!

We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse.

Watch The Drew Berquist Show

Everywhere, at home or on the go.

WATCH NOW