Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
United States China Government Security

US Office of Personnel Management Hacked Again 73

tranquilidad writes: According to a story in the Washington Post, China hacked into the computer system of the United States' Office of Personnel Management last December. This was the second major intrusion in less than a year. Personally identifiable information of approximately 4 million individuals may have been compromised. The compromised information was related to security clearances and employee records. "The FBI is working with our interagency partners to investigate this matter. We take all potential threats to public and private sector systems seriously, and will continue to investigate and hold accountable those who pose a threat in cyberspace," an FBI spokesman said.
This discussion has been archived. No new comments can be posted.

US Office of Personnel Management Hacked Again

Comments Filter:
  • by Anon-Admin ( 443764 ) on Thursday June 04, 2015 @05:22PM (#49843363) Journal

    Government: Crap, we got hacked again. How are we supposed to protect our lists of security clearances and employee records? Its so confusing.

    IT people of the wold collectively reply: ID10T Errors, you have to solve them first! Then you can protect your data.

    • Re: (Score:3, Informative)

      by Anonymous Coward

      Federal personnel records: Some of the personnel records (the change forms, personnel actions) are stored in an online system which can be accessed online, via a username and password for each employee. A security requirement is that the password has to be changed every 90 days. And for YEARS, whenever the password was changed, the system would send a plain text email that included the new password, "for verification". Complaints about this obvious and basic security breach fell on deaf ears for about f

  • by Anonymous Coward

    The FBI spokesman then added "Fuck them. Fuck them up their stupid asses."

  • HELP HELP WHO CAN I TRUST...

    We're from the government and we're here to help you...

    'The most terrifying words you can hear' Ronald Reagan
    • We're from the government and we're here to help you...

      'The most terrifying words you can hear' Ronald Reagan

      Self fulfilling prophecy!

    • Re: (Score:3, Insightful)

      'The most terrifying words you can hear' Ronald Reagan

      The president whose government brought in guilty-until-proven-innocent drug testing and citizenship checks to the workplace.

  • by Anonymous Coward

    You mean United States citizens using hacked Chinese botnets to proxy their true identities?

    Remember that all major news media outlets push a CIA agenda http://en.wikipedia.org/wiki/Operation_Mockingbird [wikipedia.org]

    Now that you realize the agenda, you know the truth that it was not Chinese nationals.

  • by bogaboga ( 793279 ) on Thursday June 04, 2015 @05:37PM (#49843481)

    "...and will continue to investigate and hold accountable those who pose a threat in cyberspace,"

    I am sure they will investigate. What I am not sure about is whether, "hold accountable those who pose a threat in cyberspace" means anything if history is to be believed.

    I beg to be enlightened: What has my the [mighty] USA done in the past, that should make me think holding accountable in the case of China means anything really?

    Now, remember we as a country, do the same stuff to other countries regularly.

    • Hold Accountable != punish

      It just means that once they find out WHO did it, (or who they intend to say did it) they will blame them for doing it. It doesn't mean they will bomb them back to the stone age or put them on trial it says they will hold them accountable. Whatcha gona do? Send them a bill you cannot force them to pay?

      Saying "Don't look at me, that guy over there, see him? HE DID IT!" = promise kept.

  • Not Impressed (Score:2, Interesting)

    by Anonymous Coward

    Having helped the JD secure some applications is the past... I am no longer impressed by hackers who get into these systems. Many government applications use templated login IDs and even templated passwords. Account sharing is common as many of these systems cant handle simultaneous access of records. It is truly harder to not hack a government system than it is to hack one. The whole government's security audit is a FAIL in my opinion.

  • Encrypting and protecting sensitive information flies in the face of government's innate need to collect and parse all the information it can get its greedy little hands on.

    Not that the two are mutually exclusive, but for your governing overlords, it boils down to implementing effective strategies to protect information or having access to it.

    It's not very difficult to see which side your elected leaders currently line up on.

  • Trivial (Score:5, Insightful)

    by Charliemopps ( 1157495 ) on Thursday June 04, 2015 @05:57PM (#49843629)

    So, I think that the word we need to get out to the uninformed public is that hackers do not have magic powers that are impossible to defend against. Governments and Corporations responsible for these breaches keep trying to portray the hackers as if they were mad-men flying planes into buildings. How can you stop a fully loaded 747 flying at 800mph right?!?!

    But that's not the case. Every single one of these breaches has been the result of mistakes made my the organization that was attacked as trivial as leaving keys in the lock of your safe with a big sign that says "Money inside!" These agencies and companies could easily, and with little monetary investment, make breaches like this nearly impossible.

    In most cases the mistakes aren't even technological, they're institutional. Usually those attacked had well qualified security folks on staff who were doing their best to prevent the attack. But when the "VP of operations" (or whatever) comes in and says "The project is late, everyone's telling me it's because you're department is insisting on two factor authentication. I'm going to sign off on that and we're going to move forward" there's not much they can do.

    Look at the Sony attack. You had executives of the company sitting there with the entire companies financial records down to the penny sitting on their windows desktop... WHILE their security department was telling them the entire network had an active virus infection running rampant. Basically nothing happened to any of the people responsible.

  • Trying to think, what the guys like Benjamin Franklin or Thomas Jefferson would've said, had anybody told them, that mere 200 years later the Republic they founded will have millions of Federal-government employees and that the collective spending of governments will dance around 50% of the nation's GDP [blogspot.com]...

    Oh, some of those aren't employees, but are contractors. Sure, that changes everything...

  • I mean, I know only pedophiles and terrorists use encryption in the those Dark Places of the internet, but they might consider at least giving it a try, if only on a temporary basis.
  • sigh ! one more story about fecklessness with peoples personal details. I understand they may have stolen a bunch of clearance records, but how many new clearances did they upload ?
  • by tlambert ( 566799 ) on Thursday June 04, 2015 @07:03PM (#49844161)

    Should we be so concerned with what they took?

    How about we be a little more concerned with what they inserted?

    I wonder how many Ministry of State Security agents are now vetted for U.S. high security clearances?

    • It isn't like you get a badge that says "show me your secret stuff!" that you can wave around to random people. You'd need to insert records into innumerable other locations to create a sufficient e-paper trail to pass the background check, in addition to actually getting a job where you'd have a need to know whatever it was you were after. This alone isn't even enough to get a passport.
  • by trout007 ( 975317 ) on Thursday June 04, 2015 @07:23PM (#49844297)

    This happened before when one of NASA's HR people left their laptop with every employees information in an unencrypted file in their car and it was stolen. We got 2 whole years of credit monitoring.

  • by Anonymous Coward

    The US Government claims it was China, but has offered no evidence. We should not just assume the US Government is telling the truth, because it seldom does.

    If I had to venture a guess, I would suspect Israel long before I suspected China. Israel is no friend to the US, and is keenly interested in developing enemy lists. This would fit very well with those initiatives.

  • Only 18 months of monitoring from this, and 24 from Anthem. Keep your 2017 schedule open.
  • I worked for DHS so here is my personal viewpoint. This breech has huge implications. The first of which being that your 10 year background check covers EVERY aspect of your life, opening the way for those 4 million that were hacked to face identity theft. The info that is stored about your covers every single security question you might be asked to prove your identity. Mothers maiden name, check. Elementary school you attended, check. Every address you've lived at over the last 10 years, check - etc.
    • by Kythe ( 4779 )
      It really depends. Initial news stories are that it *doesn't* include BI/clearance investigation material. I really sort of hope that's true.

      Not that I think breach of *that* material will never happen (when, not if).

      Hate to say it, but regardless, this is a pretty serious breach of trust on OPM's part. It's difficult to secure systems. It's not impossible.
  • With their billions of petabytes of data, they still didn't see this coming or actually know who did it. The FBI treats identity theft as a LOW PRIORITY crime, they usually advise you to get credit monitoring and then they do zero to catch the criminals.

    Mark my words: Nothing will be done. BAU. Our government's policy is "you are on your own", unless you were attached by a muslim terrorist, in which case, they will spend trillions on security theater.
     

    • ... or actually know who did it.

      Other than the fact they've said who did it. Other than that part.

Real programmers don't comment their code. It was hard to write, it should be hard to understand.

Working...