Menu
Hackers had access to US security clearance data for a year

Hackers had access to US security clearance data for a year

The government still hasn't said how much data it fears was stolen

Privacy

Privacy

Hackers who breached a database containing highly personal information on government employees with security clearances had access to the system for about a year before being discovered, The Washington Post reported on Friday.

The breach at the U.S. Office of Personnel Management dates back to June or July last year and was only discovered earlier this month.

The database in question contains applications for security clearances, which ask for information on all aspects of a person's life including social security numbers, passport numbers, names of former neighbors, and information on family members. It also asks about, over the past seven years, any contact with foreign nationals and problems with drug or alcohol abuse, debts or bankruptcy, imprisonment and run-ins with law enforcement.

The OPM hasn't said how much data it believes was stolen, but the longer intruders have to explore a network, the more data they can access. With the year they had, there are fears the theft could be substantial.

It is the second major breach uncovered and made public at the government department in recent weeks. The first, which came to light in early June, involved OPM's database on federal employees and is thought to have resulted in the theft of data on as many as 4 million workers.

While a perpetrator hasn't been named, U.S. officials, speaking under the cloak of anonymity, have said they suspect the Chinese government of playing a role.

The Chinese government has denied the accusations.

The OPM essentially serves as the government's human resources department and handles functions like hiring and retaining staff and running background checks. The office has information that could be used to identify people, including financial data and details about employees' families. The breach also raised concerns that information on intelligence workers was exposed.

Fred O'Connor writes about IT careers and health IT for The IDG News Service. Follow Fred on Twitter at @fredjoconnor. Fred's e-mail address is fred_o'connor@idg.com


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags governmentsecurityOffice of Personnel Management

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments