Arkansas Democrat-Gazette

Fingerprin­t thefts raised fivefold

U.S. personnel office says hackers stole data on 5.6 million

- KEN DILANIAN

WASHINGTON — The number of people applying for or receiving security clearances whose fingerprin­t images were stolen in one of the worst government data breaches is now believed to be 5.6 million, not 1.1 million as first thought, the Office of Personnel Management announced Wednesday.

The agency was the victim of what the U.S. believes was a Chinese espionage operation that affected an estimated 21.5 million current and former federal employees or job applicants. The theft could give Chinese intelligen­ce a huge leg up in recruiting informants inside the U.S. government, experts believe. It also could help the Chinese identify U.S. spies abroad, according to U.S. officials.

The White House has said it’s going to discuss cybersecur­ity with Chinese President Xi Jinping when he visits President Barack Obama later this week.

Obama’s administra­tion has not publicly blamed China or taken any public action in retaliatio­n for the cybertheft. Intelligen­ce officials have called the data a fair intelligen­ce target, one the U.S. would pursue if it had the chance.

The Office of Personnel Management said the ability of an adversary to misuse fingerprin­t data is limited, though an agency statement acknowledg­ed that “this probabilit­y could change over time as technology evolves.”

For U.S. intelligen­ce agencies, the notion that the Chinese have fingerprin­ts on millions of federal security clearance holders, some of whom may be intelligen­ce officers overseas, is troubling. Any intelligen­ce officer whose prints have been taken would face great risk in operating under an alias because those prints would give away a true identity.

Personnel Management spokesman Samuel Schumach said in the statement that the agency identified the “additional fingerprin­t data not previously analyzed” while working with the Department of Defense. Mike Rogers, the director of the Pentagon’s National Security Agency, has said his agency was called in to help.

Republican­s accused the administra­tion of putting out the update at a time when Washington was preoccupie­d with the pope’s visit.

“Today’s blatant news dump is the clearest sign yet that the administra­tion still acts like the OPM hack is a PR crisis instead of a national security threat,” said Sen. Ben Sasse, R-Neb., a member of the Senate Homeland Security and Government­al Affairs Committee.

In response, Schumach said the agency only “very recently” learned of the new fingerprin­t data, and confirmed the final number Wednesday morning.

The Office of Personnel Management hack exposed the state of federal cybersecur­ity and cost the agency director her job. Intelligen­ce officials say the full extent of damage will play out over years and may never be visible to the public.

The stolen records included detailed biographic­al forms that federal employees must fill out to obtain security clearances, and they would have provided identifyin­g informatio­n about friends and family in the U.S. and overseas.

That kind of informatio­n would give the Chinese vast new opportunit­ies to target people for recruitmen­t, a process that can take years of intelligen­ce-gathering. It also could allow the Chinese to pinpoint U.S. intelligen­ce officers abroad, given that CIA case officers are not in the database unless they held a previous government job.

Newspapers in English

Newspapers from United States