Web sleuths have stumbled across an enormous trove of US Military surveillance files that were sitting wide open on the internet.

The three AWS S3 buckets contain billions of social media posts, web and forum comments and were gathered by officials working for the US Central Command in Tampa, Florida, and at Pacom, the US Pacific Command in Hawaii, over the last eight years.

They include posts about Donald Trump, ISIS and foreign politicians.

While many were not written in English or composed in the US, the files do contain some posts that were made by American citizens.

They were found by UpGuard's Chris Vickery on September 6, 2017.

Billions of files including Facebook posts and web comments from around the world which were gathered by US Military surveillance teams have been viewed and downloaded online. Some of the files are pictured above in folders called 'scraped' and 'outpost'

They were stored by CentCom, the US Central Command, under folders titled 'Centcom Archive' and 'Centcom backup'

UpGuard is a cyber security company firm which previously uncovered another stash of DoD files online. They contained the resumes and work details of thousands of military personnel.

The new files were stored on an Amazon cloud-based storage bucket and were only made available to the public because an internal security glitch known as misconfiguration.

It meant that any Amazon Web Services S3 user could download them.

UpGuard estimates that misconfigurations are among the riskiest cyber security dangers and account for up to 90 percent of breaches, far outweighing the realistic risks of hackers or viruses.

The three buckets found in September were named 'centcom-backup,''centcom-archive,' and 'pacom-archive.'

CENTCOM implemented additional security measures to prevent unauthorized access US Central Command

In one folder, titled 'scraped, there were posts from the Canadian forum Connect2Edmonton which included comments such as 'President Donald Trump what now?' and 'Anyone think a trade war developing along US boarders (sic) because of Trump is going to happen?'

In the 'centcom archive' folder, at least 1.8million posts and messages were stored.

The majority were harvested from Central Asia and the Middle East, Vickery said.

Some anti-ISIS comments written in groups for Iraqi anti-jihadi groups were discovered along with Pashto comments written on Pakistani politician Imran Khan's Facebook page.

Pacom's stash contained similar content but it was harvested from Southeast and East Asia.

Some included references to Donald Trump, trade wars and possible coups in Turkey

Another referred to 'the freeman of America'. All were gathered by troops monitoring the Middle East and Asia

Poker ads and messages from other forums referencing the boycott of Trump's companies were also stored

The DoD is tight-lipped about programmes it uses to harvest information to hone in on persons of interest.

Vickery, after compiling the data, asked in a post on UpGuard's website: 'Why, for instance, were each of these posts collected?

'What triggered their inclusion in these repositories?' He contacted the DoD after discovering the materials last month.

The DoD would not comment on the breach on Saturday morning and instead directed all questions to Centcom.

Its officials told DailyMail.com that none of the information was 'sensitive' and appeared to play down the breach, saying none was used for official intelligence and that it had been merely given to them by an unnamed 'contractor' which harvested it using an 'off the shelf program'.

'It is not collected nor processed for any intelligence purposes.

'All of the information is readily available public information related to our activities and obtained through commercial off-the-shelf programs in accordance with U.S. Code and Department of Defense policy in a consistent manner,' they said.

The official added that it was obtained to 'support public information gathering, measurement and engagement of our online programs' but would not go into more detail over why the military wanted to have it.

Centcom, the US Central Command HQ in Tampa, Florida, said none of the information was sensitive

Others were stored by the US Pacific Command whose headquarters are in Hawaii

'U.S. Central Command has used commercial off-the-shelf and web-based programs to support public information gathering, measurement and engagement activities of our online programs on public sites.

Cyber security expert Chris Vickery discovered the files and shared details of them online

'The information is widely available to anyone who conducts similar online activities.

'The data is raw data that was provided to us by a contractor,' they said.

Since discovering it their Amazon cloud-based storage unit was breached, they said they have taken 'additional measures' to prevent any other 'unauthorized access'.

Last month, it was revealed that thousands of files containing sensitive information about US military personnel had also been breached.

They were discovered by UpGuard in the same way as the new ones were.