OPM: millions more government fingerprints stolen in cyberattack

The number of federal security clearance holders whose fingerprint images were stolen in one of the worst government data breaches is now believed to be 5.6 million, not 1.1 million as first thought, the Office of Personnel Management announced Wednesday.

|
Shannon Stapleton/Reuters/File
A traveler has his fingerprints scanned at the airport in 2008.

The number of people applying for or receiving security clearances whose fingerprint images were stolen in one of the worst government data breaches is now believed to be 5.6 million, not 1.1 million as first thought, the Office of Personnel Management announced Wednesday.

The agency was the victim of what the U.S. believes was a Chinese espionage operation that affected an estimated 21.5 million current and former federal employees or job applicants. The theft could give Chinese intelligence a huge leg up in recruiting informants inside the U.S. government, experts believe. It also could help the Chinese identify U.S. spies abroad, according to American officials.

The White House has said it's going to discuss cybersecurity with Chinese President Xi Jinping when he visits President Obama later this week.

The Obama administration has not publicly blamed China or taken any public action in retaliation for the hack. Intelligence officials have called the data a fair intelligence target, one the U.S. would pursue if it had the chance.

OPM says the ability of an adversary to misuse fingerprint data is limited, though an agency statement acknowledged that "this probability could change over time as technology evolves."

For American intelligence agencies, the notion that the Chinese have fingerprints on millions of federal security clearance holders, some of whom may be intelligence officers overseas, is troubling. Any intelligence officer whose prints have been taken would face great risk in operating under an alias because those prints would give away someone's true identity.

OPM spokesman Samuel Schumach said in the statement that the agency identified the "additional fingerprint data not previously analyzed" while working with the Department of Defense. Mike Rogers, the director of the Pentagon's National Security Agency, has said his agency was brought in to help.

Republicans accused the administration of putting out the update at a time when Washington was preoccupied with the pope's visit.

"Today's blatant news dump is the clearest sign yet that the administration still acts like the OPM hack is a PR crisis instead of a national security threat," said Republican Sen. Ben Sasse of Nebraska, a member of the Senate Homeland Security and Governmental Affairs Committee.

In response, Schumach said the agency only "very recently" learned of the new fingerprint data.

The OPM hack exposed the state of federal cybersecurity and cost the agency director her job. Intelligence officials say the full extent of damage will play out over years and may never be visible to the public.

The stolen records included detailed biographical forms that federal employees must fill out to obtain security clearances, and they would have provided identifying information about friends and family in the U.S. and overseas. That kind of information would give the Chinese vast new opportunities to target people for recruitment, a process that can take years of intelligence-gathering. It also could allow the Chinese to pinpoint American intelligence officers abroad, given that CIA case officers are not in the database unless they held a previous government job.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to OPM: millions more government fingerprints stolen in cyberattack
Read this article in
https://www.csmonitor.com/USA/2015/0923/OPM-millions-more-government-fingerprints-stolen-in-cyberattack
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe