Five Months After the OPM Attack.

Katherine-Archuleta-Reuters-500x293.jpg

U.S. Office of Personnel Management (OPM) Director Katherine Archuleta rubs her eyes, as she testifies before a House Committee on Oversight and Government


The 21.5 million victims of the largest known breach of federal personnel data will begin receiving notifications at the end of September five months after the government first discovered the incident.
 
In announcing an initial $133 million award for protection services to a company called "ID Experts," US officials said they proceeded with caution to ensure they do not further inconvenience victims. The government plans to offer three years of credit and identity-protection services to impacted personnel, which brings the total value of the contract through December 2018 to more than $329.8 million.

While notices detailing the safeguards will not be sent until the end of the month, affected individuals are covered as of Tuesday, Office of Personnel Management officials said. The attack struck databases maintained by OPM.
Brokering a breach response contract "is something that has taken some time, because we want to do it right,” OPM Acting Director Beth Cobert said in a Tuesday evening call with reporters.
“And we also want to make sure that in the context of the notifications, we don't create any more national security issues than we have through the data that was stolen," she said. "As somebody whose data was stolen in this incident as well as in the previous one, I can understand the frustration that people feel. But we want to make sure that we're doing this right." 
The resources available, as previously announced, include credit monitoring, ID theft monitoring, ID theft insurance and ID restoration services for three years.

The giant hack, allegedly linked to Chinese spies, compromised the personal security of millions of past and present federal employees, personnel applying for "clearances" to handle classified secrets, and their family members. Clearance forms detail the medical histories, sex lives and other sensitive details of government officials who now could be subjected to blackmail, security experts say.

Portland-based I.D. Experts specializes in, among other things, medical identity theft, and the company was tapped by UCLA Health System in July to protect 4.5 million patients affected by a network breach there.
Experts familiar with the national security implications of the government data stolen helped OPM decide which protections to offer, officials said.
OPM “concluded that this was the appropriate set of services to offer for individuals given what has been taken," Cobert said.

Some of the 4.2 million victims of a smaller, related hack of personnel records complained that notifications received in response to that incident looked like malicious emails. The notifications, sent by contractor CSID, came from a dot-com email address and contained a link to a commercial website. This time, email notifications will come from either a dot-mil or dot-gov address, Cobert said.

The Defense Department -- instead of the contractor -- will be alerting all victims this go-round, officials added.
"We have the infrastructure and the logistics system to be able to accommodate such a massive notification," said Rear Adm. Althea "Allie" Coetzee, principal deputy for defense procurement and acquisition policy. "We believed that it would be a lot better handled and managed if one entity handled it -- coming from a government entity as opposed to a contractor.”
Notification by contractor "was definitely not part of the scope of work" of the contract, she added.
Security controls on the vendors’ own systems was a consideration during the vetting process, officials said.
OPM conferred with a team of cybersecurity, privacy, contracting and legal experts from agencies across the federal government, including the Pentagon and Federal Trade Commission, to help develop security provisions.
Companies competing for the project all submitted formal security plans as a part of their proposals. The government has a right to enter I.D. Experts’ facilities to make sure safeguards comply with the contract specifications, officials said.
"We got the expertise from several different perspectives and through that, we believe that we have the best security protections that are available currently," Cobert said.

The General Services Administration on Tuesday also announced winners of a $500 million five-year award to handle ID protection services for government breaches going forward.

Along with I.D. Experts, agreements were also inked with Bearak Reports, also known as "Identity Force," and Ladlas Prince. Services for OPM victims were purchased through the blanket deal.
Nextgov: http://bit.ly/1USONuS

 

« Russia & China Use Hacked Databases to Find US Spies
North Korean Leader Has His Own Cellular Network »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

Digital Guardian

Digital Guardian

Digital Guardian is a next generation data protection platform designed to stop data theft.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

DeviQA

DeviQA

DeviQA provide best-in-class quality assurance services to companies of all sizes.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.