Accession Number:

ADA623611

Title:

Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Descriptive Note:

Congressional rept.

Corporate Author:

LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE

Report Date:

2015-07-17

Pagination or Media Count:

11.0

Abstract:

On June 4, 2015, the U.S. Office of Personnel Management OPM revealed that a cyber intrusion had impacted its information technology systems and data, potentially compromising the personal information of about 4.2 million former and current federal employees. Later that month, OPM reported a separate cyber incident targeting OPM s databases housing background investigation records. This breach is estimated to have compromised sensitive information of 21.5 million individuals. Amid criticisms of how the agency managed its response to the intrusions and secured its information systems, Katherine Archuleta has stepped down as the director of OPM, and Beth Cobert has taken on the role of acting director. In addition, OPM s Electronic Questionnaires for Investigations Processing e-QIP application, the system designed to help process forms used in conducting background investigations, has been taken offline for security improvements. Officials are still investigating the actors behind the breaches and what the motivations might have been. Theft of personally identifiable information PII may be used for identity theft and financially motivated cybercrime, such as credit card fraud. Many have speculated that the OPM data were taken for espionage rather than for criminal purposes, however, and some have cited China as the source of the breaches. It remains unclear how the data from the OPM breaches might be used if they are indeed now in the hands of the Chinese government. Some suspect that the Chinese government may build a database of U.S. government employees that could help identify U.S. officials and their roles or that could help target individuals to gain access to additional systems or information. National security concerns include whether hackers could have obtained information that could help them identify clandestine and covert officers and operations.

Subject Categories:

  • Government and Political Science
  • Personnel Management and Labor Relations
  • Computer Systems Management and Standards

Distribution Statement:

APPROVED FOR PUBLIC RELEASE