Officials: Second hack exposed military and intel data

ABC News

Hackers linked to China appear to have gained access to the sensitive background information submitted by intelligence and military personnel for security clearances, several U.S. officials said Friday, describing a second cyberbreach of federal records that could dramatically compound the potential damage.

The forms authorities believed to have been accessed, known as Standard Form 86, require applicants to fill out deeply personal information about mental illnesses, drug and alcohol use, past arrests and bankruptcies. They also require the listing of contacts and relatives, potentially exposing any foreign relatives of U.S. intelligence employees to coercion. Both the applicant’s Social Security number and that of his or her cohabitant is required.  

The officials spoke on condition of anonymity because the security clearance material is classified.

“This tells the Chinese the identities of almost everybody who has got a United States security clearance,” said Joel Brenner, a former top U.S. counterintelligence official. “That makes it very hard for any of those people to function as an intelligence officer. The database also tells the Chinese an enormous amount of information about almost everyone with a security clearance. That’s a gold mine. It helps you approach and recruit spies.”

The Office of Personnel Management, which was the target of the hack, has not officially notified military or intelligence personnel whose security clearance data was breached, but news of the second hack was starting to circulate in both the Pentagon and the CIA.

The officials said they believe the hack into the security clearance database was separate from the breach of federal personnel data announced last week — a breach that is itself appearing far worse than first believed. It could not be learned whether the security database breach happened when an OPM contractor was hacked in 2013, an attack that was discovered last year. Members of Congress received classified briefings about that breach in September, but there was no mention of security clearance information being exposed.

The OPM had no immediate comment Friday.

Nearly all of the millions of security clearance holders, including CIA, National Security Agencyand military special operations personnel, are potentially exposed in the security clearance breach, the officials said. More than 4 million people had been investigated for a security clearance as of October 2014, according to government records.

In the hack of standard personnel records announced last week, two people briefed on the investigation disclosed Friday that as many as 14 million current and former civilian U.S. government employees have had their information exposed to hackers, a far higher figure than the 4 million the Obama administration initially disclosed.

American officials have said that cybertheft originated in China and that they suspect espionage by the Chinese government, which has denied any involvement.

The newer estimate puts the number of compromised records between 9 million and 14 million going back to the 1980s, said one congressional official and one former U.S. official, who spoke to The Associated Press on condition of anonymity because information disclosed in the confidential briefings includes classified details of the investigation.

There are about 2.6 million executive branch civilians, so the majority of the records exposed relate to former employees. Contractor information also has been stolen, officials said. The data in the hack revealed last week include the records of most federal civilian employees, though not members of Congress and their staffs, members of the military or staff of the intelligence agencies.

On Thursday, a major union said it believes the hackers stole Social Security numbers, military records and veterans’ status information, addresses, birth dates, job and pay histories; health insurance, life insurance and pension information; and age, gender and race data.

The personnel records would provide a foreign government an extraordinary roadmap to blackmail, impersonate or otherwise exploit federal employees in an effort to gain access to U.S. secrets —or entry into government computer networks.

Outside experts were pointing to the breaches as a blistering indictment of the U.S. government’s ability to secure its own data two years after a National Security Agency contractor, Edward Snowden, was able to steal tens of thousands of the agency’s most sensitive documents.

After the Snowden revelations about government surveillance, it became more difficult for the federal government to hire talented younger people into sensitive jobs, particularly at intelligence agencies, said Evan Lesser, managing director of ClearanceJobs.com, a website that matches security-clearance holders to available slots.

“Now, if you get a job with the government, your own personal information may not be secure,” he said. “This is going to multiply the government’s hiring problems many times.”

The Social Security numbers were not encrypted, the American Federation of Government Employees said, calling that “an abysmal failure on the part of the agency to guard data that has been entrusted to it by the federal workforce.”

“Unencrypted information of this kind this is disgraceful — it really is disgraceful,” Brenner said. “We’ve had wakeup calls now for 20 years or more, and we keep hitting the snooze button.”

Samuel Schumach, an OPM spokesman, would not address how the data was protected or specifics of the information that might have been compromised, but said, “Today’s adversaries are sophisticated enough that encryption alone does not guarantee protection.” OPM is nonetheless increasing its use of encryption, he said.

The Obama administration had acknowledged that up to 4.2 million current and former employees whose information resides in the Office of Personnel Management server are affected by the December cyberbreach, but it had been vague about exactly what was taken.

J. David Cox, president of the American Federation of Government Employees, said in a letter Thursday to OPM director Katherine Archuleta that based on incomplete information OPM provided to the union, “the hackers are now in possession of all personnel data for every federal employee, every federal retiree and up to 1 million former federal employees.”

Another federal employee group, the National Active and Retired Federal Employees Association, said Friday that “at this point, we believe AFGE’s assessment of the breach is overstated.” It called on the OPM to provide more information.

Rep. Mike Rogers, the former chairman of the House Intelligence Committee, said last week that he believes China will use the recently stolen information for “the mother of all spear-phishing attacks.”

Spear-phishing is a technique under which hackers send emails designed to appear legitimate so that users open them and load spyware onto their networks.

———

Associated Press writer Lolita C. Baldor contributed to this story.

http://abcnews.go.com/Technology/wireStory/union-federal-workers-fell-victim-hackers-31712811?singlePage=true

11 thoughts on “Officials: Second hack exposed military and intel data

  1. “That makes it very hard for any of those people to function as an intelligence officer.”

    That, and no intelligence to begin with.

    “American officials have said that cybertheft originated in China…”

    So they said.

    The only real question is: did it even happen at all.

    1. “Yes, let’s give out everyone’s personal information for anyone to exploit. Yup, that’s the ticket!”

  2. Another reason to point and laugh at the gov weenie tells you their data storage is absolutely and never been hacked. Lets go back to paper records.

  3. I’m still waiting for that headline….” US Government so incompetent, it can’t even protect it’s own computers.”
    Seems to me the jews are setting everyone up for a “cyber 911” to crack down on the internet.

  4. According to my computer geek, you can hack a system,using an IT address from anywhere. Mybe the government is just handing us a bunch of BS just to make a group look bad.

  5. they were warning us about this years ago before it even happened. drilling it into our heads so when it did happen we were already programmed to believe it.
    i’ve had enough of this bullshit!
    i’m out.

  6. As usual, the elephant in the room is NSA/DHS are getting billions of our taxpayer dollars to NOT stop things like this, OR they are the ones doing it.

  7. Boy, if the Chinese ever discover what we’re up to we’re gonna’ have to have to have 27 spy agencies to discover what they’re up to ’cause every state exists to free their populations, right?

  8. I can’t trust their word, and I can’t dig in their system myself.
    NSA could claim Russia hacked, could claim China did, and could have DONE ITSELF!

    I talked to senators about this, they are RETARDS.
    OUR SENATORS ARE oath breakin RETARDS
    How do you know that AT&T didn’t do it for the FBI who did it as a proxy for the NSA, who did it for another political target like GUN owners, or Anti UN / CFR / TC / Bankster / monsanto / nestle people, obamafraud people, tpp people, bengazi people.

    now it’s happened, or has it? IF it has, about the only thing I can think to re-set is NEW NAMES AND NUMBERS (doesn’t fix the addresses) AND NEW GUNS FOR PROTECTION

    interesting they say it was hacked for more than a YEAR!
    If I Have a stack of creditcards for a year I am using some. but I don’t see these being used. Even if I did, how could I believe it?
    See the dilema? Their story changes, cause it’s never the truth, or is it?

    Further, what about security, weapons, defence for all these people.

    I personally like to have some full auto machine guns for my Front door now. I don’t know who the hell this idiot government has given my data to! What about FAMILY, might they be targets as well by foreign threat?

    just saying. My data stolen three times now. that’s not a mistake, it’s also my charm. ENOUGH. every time someone ask for data I going to make their day SHIT about it.

    (my stuff here is my opinion)

Join the Conversation

Your email address will not be published. Required fields are marked *


*