Members of AntiSec recently published a list of a million Apple Unique Device Identifiers (UDIDs).
"In a post accompanying the data dump, the group says it withheld other personally identifying information, including names, mobile phone numbers, and addresses," writes Slate's Will Oremus. "There's no indication that bank account numbers or passwords were included."
"The group's Pastebin posting claims that the stolen list was taken from the notebook computer of FBI Supervisor special agent Christopher K. Stangl's computer in March 2012 using a Java AtomicReferenceArray vulnerability," writes BYTE's Larry Seltzer. "The purloined file was named 'NCFTA_iOS_devices_intel.csv' and contained UDIDs for 12,367,232 iOS devices, although not all of them with full personal information."
"AntiSec said they 'decided a million [UDIDs] would be enough to release' from the list of data for more than 12 million Apple devices that was allegedly accessed from Stangl's computer," writes The Hill's Jennifer Martinez.https://o1.qnsr.com/log/p.gif?;n=203;c=204660766;s=9477;x=7936;f=201812281312070;u=j;z=TIMESTAMP;a=20392931;e=i
"Antisec suggests that the FBI is using the information to track citizens," write Gizmodo's Jamie Condliffe and Sam Biddle. "It's not clear, of course, whether any of these claims are true -- but if they are, the NCFTA acronym in Antisec's file name could likely stand for National Cyber-Forensics & Training Alliance, which 'functions as a conduit between private industry and law enforcement.' If that's the case, it could mean Apple is feeding the FBI user data though the NCTFA, that the FBI is mining its own data... or something else entirely."
To help you find out whether your device ID is included in the breach, TheNextWeb has created an online tool that checks your device's UDID against the published list.