The System Remains Vulnerable

By Saxby Chambliss

Saxby Chambliss is a partner at DLA Piper in Atlanta.  He served as a member of the U.S. Senate for two terms, and was the Vice Chairman of the Senate Select Committee on Intelligence.  He also served on the Senate Armed Services Committee and the Senate Rules Committee.  Chambliss was a member of the U.S. House of Representatives for four terms and served as Chairman of the House Intelligence Subcommittee on Terrorism and Homeland Security.

The Office of Personnel Management (OPM) was the victim of a cyber-attack in 2014.  Hackers (the Chinese are suspected) gained access to OPM’s local-area network on or about May 7, 2014 by stealing credentials and then planting malware and creating a backdoor for exfiltration.  Actual exfiltration of data on background investigations did not begin until July 3, 2014, and it continued until August. In October 2014, the hackers pivoted to the Interior Department center where OPM’s personnel records resided. On December 15, 2014, the intruders siphoned that data away.  OPM did not discover that they had a problem until April 15, 2015.  The attack was successful in stealing personal data on 22 million current or former federal employees.

While the number of personnel files is staggering, why is this the most significant breach of the U.S. Government (USG) to date?

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:CyberTagged with:

Related Articles

Search

Close