The recent break of the Office of Personnel Managment has been all over the news, but we haven’t written about it because we like to focus on issues our clients are facing that they can actually do something about. But if you currently have or ever received a government security clearance, this issue affects you. This is going to prove to be one of the most serious identity theft operations of all time. The information acquired by the attackers was impressive in its scope. If this applies to you, getting good identity theft protect is going to be an imperative, and you should plan to keep it active for way more than a year, possibly for your lifetime.
The government recently released this statement: “The forms authorities believed may have been stolen en masse, known as Standard Form 86, require applicants to fill out deeply personal information about mental illnesses, drug and alcohol use, past arrests and bankruptcies. They also require the listing of contacts and relatives, potentially exposing any foreign relatives of U.S. intelligence employees to coercion. Both the applicant’s Social Security number and that of his or her cohabitant is required.”
In a related statement, the White House said that on June 8, investigators concluded there was “a high degree of confidence that … systems containing information related to the background investigations of current, former and prospective federal government employees, and those for whom a federal background investigation was conducted, may have been exfiltrated.”
Joel Brenner, a former top U.S. counterintelligence official said, “”This tells the Chinese the identities of almost everybody who has got a United States security clearance. That makes it very hard for any of those people to function as an intelligence officer. The database also tells the Chinese an enormous amount of information about almost everyone with a security clearance. That’s a gold mine. It helps you approach and recruit spies.”
- Silicon Beat – Government hack far worse than acknowledged
- Tech Dirt – Second OPM Hack Revealed: Even Worse Than The First
- Tech Dirt – Feds Who Didn’t Even Discover The OPM Hack Themselves, Still Say We Should Give Them Cybersecurity Powers
About the Author:I am a cybersecurity and IT instructor, cybersecurity analyst, pen-tester, trainer, and speaker. I am an owner of the WyzCo Group Inc. In addition to consulting on security products and services, I also conduct security audits, compliance audits, vulnerability assessments and penetration tests. I also teach Cybersecurity Awareness Training classes. I work as an information technology and cybersecurity instructor for several training and certification organizations. I have worked in corporate, military, government, and workforce development training environments I am a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com