Cyber Primer
AEWhbF
AEWhbF
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Cyber</strong> threats<br />
Annex 2A – Threat actor case studies<br />
Case study 1 – <strong>Cyber</strong> used for personal data theft<br />
Theft of personal data – United States Office of Personnel Management<br />
Who<br />
What<br />
There has been no official attribution of those responsible, although General<br />
(Retired) James Clapper, the United States National Director for Intelligence, has<br />
been quoted as saying China remains the ‘lead suspect’. According to the Wall<br />
Street Journal, United States government officials suspect that Chinese hackers<br />
perpetrated the breach. The Washington Post has also reported that the attack<br />
originated in China, citing unnamed government officials.<br />
In 2015, the United States Office of Personnel Management (OPM) announced<br />
that it had been the target of two separate, but related, cyber security<br />
breaches. In the first event records of as many as four million people may have<br />
been compromised with personally identifiable information such as Social<br />
Security numbers, as well as names, dates and places of birth, and addresses<br />
being targeted. The data breach was noticed by the OPM in April 2015 and is<br />
believed to have started in March 2014, but may started even earlier. In the<br />
second event, identified in June 2015, OPM discovered that the background<br />
investigation records of current, former and prospective Federal employees and<br />
contractors had been stolen. The OPM and the interagency incident response<br />
concluded with high confidence that sensitive information, including the Social<br />
Security numbers of 21.5 million individuals, was stolen from the background<br />
investigation databases. This included 19.7 million individuals that applied for a<br />
background investigation, and 1.8 million non-applicants, primarily spouses or<br />
co-habitants of applicants. Some records also included findings from interviews<br />
conducted by background investigators and approximately 5.6 million include<br />
fingerprints and the usernames and passwords that background investigation<br />
applicants used to fill out their background investigation forms. The theft was<br />
more significant as this was the first event where physical data was stolen in the<br />
form of the 5.6 million sets of fingerprints. These breaches were described by<br />
Federal officials as among the largest breach of government data in the history<br />
of the United States.<br />
36<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)