Five Months After the OPM Attack.

Katherine-Archuleta-Reuters-500x293.jpg

U.S. Office of Personnel Management (OPM) Director Katherine Archuleta rubs her eyes, as she testifies before a House Committee on Oversight and Government


The 21.5 million victims of the largest known breach of federal personnel data will begin receiving notifications at the end of September five months after the government first discovered the incident.
 
In announcing an initial $133 million award for protection services to a company called "ID Experts," US officials said they proceeded with caution to ensure they do not further inconvenience victims. The government plans to offer three years of credit and identity-protection services to impacted personnel, which brings the total value of the contract through December 2018 to more than $329.8 million.

While notices detailing the safeguards will not be sent until the end of the month, affected individuals are covered as of Tuesday, Office of Personnel Management officials said. The attack struck databases maintained by OPM.
Brokering a breach response contract "is something that has taken some time, because we want to do it right,” OPM Acting Director Beth Cobert said in a Tuesday evening call with reporters.
“And we also want to make sure that in the context of the notifications, we don't create any more national security issues than we have through the data that was stolen," she said. "As somebody whose data was stolen in this incident as well as in the previous one, I can understand the frustration that people feel. But we want to make sure that we're doing this right." 
The resources available, as previously announced, include credit monitoring, ID theft monitoring, ID theft insurance and ID restoration services for three years.

The giant hack, allegedly linked to Chinese spies, compromised the personal security of millions of past and present federal employees, personnel applying for "clearances" to handle classified secrets, and their family members. Clearance forms detail the medical histories, sex lives and other sensitive details of government officials who now could be subjected to blackmail, security experts say.

Portland-based I.D. Experts specializes in, among other things, medical identity theft, and the company was tapped by UCLA Health System in July to protect 4.5 million patients affected by a network breach there.
Experts familiar with the national security implications of the government data stolen helped OPM decide which protections to offer, officials said.
OPM “concluded that this was the appropriate set of services to offer for individuals given what has been taken," Cobert said.

Some of the 4.2 million victims of a smaller, related hack of personnel records complained that notifications received in response to that incident looked like malicious emails. The notifications, sent by contractor CSID, came from a dot-com email address and contained a link to a commercial website. This time, email notifications will come from either a dot-mil or dot-gov address, Cobert said.

The Defense Department -- instead of the contractor -- will be alerting all victims this go-round, officials added.
"We have the infrastructure and the logistics system to be able to accommodate such a massive notification," said Rear Adm. Althea "Allie" Coetzee, principal deputy for defense procurement and acquisition policy. "We believed that it would be a lot better handled and managed if one entity handled it -- coming from a government entity as opposed to a contractor.”
Notification by contractor "was definitely not part of the scope of work" of the contract, she added.
Security controls on the vendors’ own systems was a consideration during the vetting process, officials said.
OPM conferred with a team of cybersecurity, privacy, contracting and legal experts from agencies across the federal government, including the Pentagon and Federal Trade Commission, to help develop security provisions.
Companies competing for the project all submitted formal security plans as a part of their proposals. The government has a right to enter I.D. Experts’ facilities to make sure safeguards comply with the contract specifications, officials said.
"We got the expertise from several different perspectives and through that, we believe that we have the best security protections that are available currently," Cobert said.

The General Services Administration on Tuesday also announced winners of a $500 million five-year award to handle ID protection services for government breaches going forward.

Along with I.D. Experts, agreements were also inked with Bearak Reports, also known as "Identity Force," and Ladlas Prince. Services for OPM victims were purchased through the blanket deal.
Nextgov: http://bit.ly/1USONuS

 

« Russia & China Use Hacked Databases to Find US Spies
North Korean Leader Has His Own Cellular Network »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

European Organisation for Security (EOS)

European Organisation for Security (EOS)

EOS represents all domains of security solutions and services.providers including ICT information and communications technologies.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

Concorde Technology Group

Concorde Technology Group

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.