Five Months After the OPM Attack.

Katherine-Archuleta-Reuters-500x293.jpg

U.S. Office of Personnel Management (OPM) Director Katherine Archuleta rubs her eyes, as she testifies before a House Committee on Oversight and Government


The 21.5 million victims of the largest known breach of federal personnel data will begin receiving notifications at the end of September five months after the government first discovered the incident.
 
In announcing an initial $133 million award for protection services to a company called "ID Experts," US officials said they proceeded with caution to ensure they do not further inconvenience victims. The government plans to offer three years of credit and identity-protection services to impacted personnel, which brings the total value of the contract through December 2018 to more than $329.8 million.

While notices detailing the safeguards will not be sent until the end of the month, affected individuals are covered as of Tuesday, Office of Personnel Management officials said. The attack struck databases maintained by OPM.
Brokering a breach response contract "is something that has taken some time, because we want to do it right,” OPM Acting Director Beth Cobert said in a Tuesday evening call with reporters.
“And we also want to make sure that in the context of the notifications, we don't create any more national security issues than we have through the data that was stolen," she said. "As somebody whose data was stolen in this incident as well as in the previous one, I can understand the frustration that people feel. But we want to make sure that we're doing this right." 
The resources available, as previously announced, include credit monitoring, ID theft monitoring, ID theft insurance and ID restoration services for three years.

The giant hack, allegedly linked to Chinese spies, compromised the personal security of millions of past and present federal employees, personnel applying for "clearances" to handle classified secrets, and their family members. Clearance forms detail the medical histories, sex lives and other sensitive details of government officials who now could be subjected to blackmail, security experts say.

Portland-based I.D. Experts specializes in, among other things, medical identity theft, and the company was tapped by UCLA Health System in July to protect 4.5 million patients affected by a network breach there.
Experts familiar with the national security implications of the government data stolen helped OPM decide which protections to offer, officials said.
OPM “concluded that this was the appropriate set of services to offer for individuals given what has been taken," Cobert said.

Some of the 4.2 million victims of a smaller, related hack of personnel records complained that notifications received in response to that incident looked like malicious emails. The notifications, sent by contractor CSID, came from a dot-com email address and contained a link to a commercial website. This time, email notifications will come from either a dot-mil or dot-gov address, Cobert said.

The Defense Department -- instead of the contractor -- will be alerting all victims this go-round, officials added.
"We have the infrastructure and the logistics system to be able to accommodate such a massive notification," said Rear Adm. Althea "Allie" Coetzee, principal deputy for defense procurement and acquisition policy. "We believed that it would be a lot better handled and managed if one entity handled it -- coming from a government entity as opposed to a contractor.”
Notification by contractor "was definitely not part of the scope of work" of the contract, she added.
Security controls on the vendors’ own systems was a consideration during the vetting process, officials said.
OPM conferred with a team of cybersecurity, privacy, contracting and legal experts from agencies across the federal government, including the Pentagon and Federal Trade Commission, to help develop security provisions.
Companies competing for the project all submitted formal security plans as a part of their proposals. The government has a right to enter I.D. Experts’ facilities to make sure safeguards comply with the contract specifications, officials said.
"We got the expertise from several different perspectives and through that, we believe that we have the best security protections that are available currently," Cobert said.

The General Services Administration on Tuesday also announced winners of a $500 million five-year award to handle ID protection services for government breaches going forward.

Along with I.D. Experts, agreements were also inked with Bearak Reports, also known as "Identity Force," and Ladlas Prince. Services for OPM victims were purchased through the blanket deal.
Nextgov: http://bit.ly/1USONuS

 

« Russia & China Use Hacked Databases to Find US Spies
North Korean Leader Has His Own Cellular Network »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

InfoSec People

InfoSec People

InfoSec People is a leading UK provider of specialist recruitment services for Information Security, Business Continuity and Risk Management.

CDW

CDW

CDW delivers a comprehensive range of IT Solutions and Managed IT services to its customers, allowing them to focus on running their organisation, not managing their IT.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Cybersprint

Cybersprint

Cybersprint's Digital Risk Protection platform continuously monitors your digital footprint so you can make informed decisions on exposure to online threats, identify vulnerabilities and take action.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

BCN Group

BCN Group

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

AML Global Solutions (AMLGS)

AML Global Solutions (AMLGS)

AMLGS delivers Financial Crime prevention training programmes and consultancy services encompassing Anti-Money Laundering (AML), Counter Terrorism Financing (CTF), Bribery & Corruption and Fraud.

PT Prima Cyber Solusi

PT Prima Cyber Solusi

PT Prima Cyber Solusi is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.