[cryptome] Re: USG v Apple: Hack of US government Security clearance system

  • From: douglas rankine <douglasrankine2001@xxxxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Sat, 5 Mar 2016 19:04:06 +0000

"The CIA, largely appears to have been shielded from damage, especially for employees who have never worked at any other agency, officials said."
That means that by a process of sifting and sorting and elimination, every US diplomat serving abroad who is NOT on the list, must be suspected of being a CIA employee or officer....

On 05/03/2016 19:00, douglas rankine wrote:

"No evidence that breach was exposed for criminal purposes..." That is reassuring. Every govt employee must feel relieved about that...

The hackers’ access was so extensive that U.S. officials said they think it is “highly likely” that every file associated with an OPM-managed security clearance application since 2000 was exposed. Background checks before that time were less likely to be affected, officials said.

The CIA, largely appears to have been shielded from damage, especially for employees who have never worked at any other agency, officials said.

/[Officials: Hackers had access to security data for a year <http://www.washingtonpost.com/blogs/federal-eye/wp/2015/06/18/officials-chinese-had-access-to-u-s-security-clearance-data-for-one-year/>]/

Even so, some U.S. officials have said that a foreign spy service might be able to identify U.S. intelligence operatives by scrutinizing the OPM files. Names that appear on rosters of U.S. embassies but are missing from the OPM records might, through a process of elimination, reveal the identities of CIA operatives serving under diplomatic cover.

“That’s not conclusive that the person might be undercover CIA,” said one U.S. official, who spoke on the condition of anonymity to discuss the sensitive topic. “But it’s certainly worth taking a look at.”

Of those whose data was in the OPM background-check system, 19.7 million had applied for a security clearance. An additional 1.8 million were spouses, family members and other non-applicants, officials said.

Also exposed were 1.1 million sets of fingerprints, detailed financial and health records, and computer usernames and passwords that applicants used to fill out their security-clearance forms online.

OPM Director Katherine Archuleta indicated during a conference call with reporters that there is no evidence that the breach has been exploited for criminal purposes, saying, “There is no information at this time to suggest any misuse.”

On 05/03/2016 18:41, douglas rankine wrote:

When one thinks of the sheer enormity of this hack...and to see it quoted in a court case where the FBI is spending so much time and resources in finding out the info on one Iphone, yet the rest of the government appears to be doing nothing to protect all those employees who work for it. Really is quite shocking. The government is even saying that it was the Chinese government who did the hack and that the information was available for a whole year, before the hack was discovered!!! Of course, the hack was the fault of the Chinese, and they shouldn't have done it. To take advantage of the US in such a way is just downright unethical, illegal and against the very best of international friendship and diplomacy. The stuff wasn't even encrypted!!!.

It really is quite an amazing case this one. One wonders just what the American people are going to do when sufficient numbers of them discover just how much their privacy and secrecy has been compromised. Imagine, all those names, addresses, all sorts of identifiers, jobs, security clearances, who has applied for what, available to the Chinese secret services and government, yet here we have huge amount of resources being spent on mounting a campaign against Apple because the government says it can't get access to information about one terrorist and his networks and circle of friends, aquaintances and fellow conspirers. And all being exposed in the USG v Apple case...

Other related posts: