Los Angeles Times

Hacked U.S. files not encrypted

- By Brian Bennett and Colin Diersing brian.bennett@latimes.com colin.diersing@latimes.com

WASHINGTON — Millions of government employee records apparently stolen by Chinese hackers were not encrypted, and software designed to block known computer breaches has not been installed to protect most of the files, officials said Tuesday.

The latest disclosure came as officials continued to investigat­e two devastatin­g hacks into the files of the Office of Personnel Management, the federal government’s human resources agency. The cyberattac­ks have exposed how vulnerable and outdated many of the computer systems are that the federal government uses to store details collected for job applicatio­ns, security clearances and other needs.

Intelligen­ce officials are concerned that Chinese intelligen­ce services or others could use the sensitive informatio­n, which can include medical histories and other personal details, to blackmail or otherwise recruit spies in the U.S. government and to design carefully tailored emails to infect computers of federal workers with access to secret files.

Chinese officials deny being behind the incursion.

During a contentiou­s congressio­nal hearing about the massive digital theft of personnel files, lawmakers ripped into the officials in charge of securing the networks.

“You failed. You failed utterly and totally,” Rep. Jason Chaffetz (R-Utah), chairman of the House Oversight and Government Reform Committee, told the officials.

The agency’s inspector general had recommende­d last year that security on the databases be upgraded. The warning followed a hack discovered in 2014. But the agency didn’t move quickly enough, lawmakers said.

Many electronic files that hold Social Security numbers, health carrier informatio­n and other details about the personal lives of officials and government contractor­s are so antiquated that federal computer experts cannot encrypt the files, said Donna Seymour, the top technology officer for the Office of Personnel Management.

“Some legacy systems may not be capable of being encrypted,” Seymour told lawmakers, who expressed bafflement and frustratio­n at the lack of progress in improving the systems.

If sensitive records were scrambled and locked, hackers would not be able to read the data even if they could get the files out of federal servers, security experts note. But some of the electronic files are more than 20 years old and are stored in outdated systems, Seymour said

“These problems are two decades in the making,” she said.

The intrusion into personnel files was discovered in April. Computer forensics experts found that hackers had been in the databases for months. They are believed to have copied private informatio­n belonging to 4.2 million current and former federal employees and government contractor­s.

During a second attack, which was discovered by looking for computer activity similar to the earlier breach, the intruders accessed the detailed background forms filled out by millions of intelligen­ce, military and other federal workers who have applied for security clearances. Those forms were stored on shared servers maintained by the Interior Department.

The security clearance applicatio­n requires potential hires to list any mental health issues, criminal conviction­s, drug use, and the names and addresses of relatives overseas. Intelligen­ce officials fear that China or another authoritar­ian government will use the informatio­n to blackmail American officials or pressure foreign relatives of U.S. government workers with access to classified files.

Despite the sensitivit­y of the data held by the Office of Personnel Management, the agency was not using the most up-to-date monitoring software that many other federal agencies use to automatica­lly block known vulnerabil­ities in the computer networks.

That so-called perimeter system, called EINSTEIN 3A, is managed by the Department of Homeland Security and covers nearly half of the computers used by civilian personnel at 13 federal agencies. But the system is not in place at the Office of Personnel Management or 51 other agencies. The National Security Agency is responsibl­e for protecting intelligen­ce and military servers.

The security breaches follow the personnel agency’s “long history of failing” to update its informatio­n technology infrastruc­ture, said Michael Esser, the agency’s assistant inspector general of audits. For many years, Esser said, agency staff in charge of computer security had no technology background. Also, the agency has never discipline­d managers for failing to pass multiple cybersecur­ity audits, he said.

Rep. Ted Lieu (D-Torrance) called for the top leaders who oversee the breached systems to resign.

“I’m looking here today for a few good people to step forward, accept responsibi­lity and resign for the good of the nation,” Lieu said.

The director of the Office of Personnel Management, Katherine Archuleta, told lawmakers that no one had lost their job over the cyberattac­ks.

 ?? Cliff Owen Associated Press ?? OFFICE OF Personnel Management chief Katherine Archuleta said no one had been fired over the attacks.
Cliff Owen Associated Press OFFICE OF Personnel Management chief Katherine Archuleta said no one had been fired over the attacks.

Newspapers in English

Newspapers from United States