What's new
Fantasy Football - Footballguys Forums

Welcome to Our Forums. Once you've registered and logged in, you're primed to talk football, among other topics, with the sharpest and most experienced fantasy players on the internet.

could someone start a thread on that OPM data breach? (1 Viewer)

johnnycakes

Footballguy
I suck at searching, especially on an iPhone. I didn't see anything going but if they got complete background search data, SSNs, and so forth.. on guys like our very own DD,shouldn't we be just a little concerned?

http://www.wsj.com/articles/when-does-a-hack-become-an-act-of-war-1434189601

national-security weapons

By DAMIAN PALETTA

June 13, 2015 6:00 a.m. ET

WASHINGTONA tremendous number of personnel recordsincluding some quite personal recordshave likely been stolen by computer hackers. The White House wont say who did it, but a number of U.S. officials and even some lawmakers have said all signs point to China.

The Chinese government has denied it, but the staggering haul of records could amount to one of the biggest feats of espionage in decades.

Right now, the White House and Congress are trying to ascertain what was stolen and how to protect people whose identifies have been compromised, not to mention their foreign contacts that are listed on the security clearance forms that could now be on the hard drives of the hackers.

But very soon a much different question will be asked in Washington: If the White House finds out who stole the information, what will President Barack Obama do about it?

Even though large-scale cyberattacks have been used for more than a decade, they have only become extremely effective national-security weapons in the past few years.

In December, the White House accused North Korea of stealing and destroying a large amount of records from Sony Pictures Entertainment. President Barack Obama called it cyber vandalism, angering some of his critics who wanted the U.S. government to retaliate.

But cyberattacks by nation-states are a relatively new phenomenon, in which there isnt a road map of deterrents and responses.

Defense Secretary Ash Carter and National Security Agency Director Adm. Michael Rogers have said in recent weeks that U.S. policy makers need to decide how they are going to respond to cyberattacks as countries become more brazen in their attempts.

What weve seen in the last six to nine months in general...trends are going in the wrong direction, Adm. Rogers said in January. Doing more of the same and expecting different results, my military experience tells me, is not a particularly effective strategy.

Mr. Carter told Congress in February that we need to improve our abilities to respond. And those responses can be in cyberspace or in other ways, but certainly they should include the option to respond in cyberspace.

But is there a difference between stealing security clearance records and stealing nuclear-launch codes? What about a computer attack that shuts down an electrical grid or freezes all financial transactions?

The Pentagon in 2011 determined that computer sabotage coming from another country could constitute an act of cyberwar, which could trigger a U.S. government or military response.

So far, the White House hasnt revealed that anything was sabotaged as part of the recent breach, only that data was compromised and likely stolen.

The implications could change, however, if some of the records are used to blackmail government officials, whose mental-health records, credit reports, and other files were exposed in the breach. And the debate could intensify even more if anything happened to any of the foreign contacts listed on page 59 of the background investigation files.

The North Atlantic Treaty Organization, a military alliance that includes the U.S., has tried to define what constitutes an act of cyberwarfare but views remain split. Many believe a cyber act of war must demonstrate a use of force.

A use of force is somewhat easier to recognize in the traditional military sense, but it is much harder when the weapons are computers and malware.

Write to Damian Paletta at damian.paletta@wsj.com
 
Last edited by a moderator:
At his point, wouldn't you be in the minority if your name, address and SS# hasn't been breached by someone. I think it's going to get to the point we just throw our hands up in the air and find a new way to identify ourselves.

Maybe microchips in bedded in our bodies would work.

 
At his point, wouldn't you be in the minority if your name, address and SS# hasn't been breached by someone. I think it's going to get to the point we just throw our hands up in the air and find a new way to identify ourselves.

Maybe microchips in bedded in our bodies would work.
Certainly have to pay for some type of monitoring service. I have ever since the state of SC let everyone's SSNs out a few years ago.

Another large data breach from the federal government makes me feel even worse about how much information we allow the NSA to collect....

 
At his point, wouldn't you be in the minority if your name, address and SS# hasn't been breached by someone. I think it's going to get to the point we just throw our hands up in the air and find a new way to identify ourselves.

Maybe microchips in bedded in our bodies would work.
Certainly have to pay for some type of monitoring service. I have ever since the state of SC let everyone's SSNs out a few years ago.

Another large data breach from the federal government makes me feel even worse about how much information we allow the NSA to collect....
Sure, but if he government can't protect your personal information, what does 18 months of free monitoring do? You can change you credit card, or bank account number. But you're still stuck with the same name, address, and social security number. Crooks just wait two years to steal your identity.

Time for the government to move away from SS#.

 
Last edited by a moderator:
At his point, wouldn't you be in the minority if your name, address and SS# hasn't been breached by someone. I think it's going to get to the point we just throw our hands up in the air and find a new way to identify ourselves.

Maybe microchips in bedded in our bodies would work.
Certainly have to pay for some type of monitoring service. I have ever since the state of SC let everyone's SSNs out a few years ago.

Another large data breach from the federal government makes me feel even worse about how much information we allow the NSA to collect....
Sure, but if he government can't protect your personal information, what does 18 months of free monitoring do? You can change you credit card, or bank account number. But you're still stuck with the same name, address, and social security number. Crooks just wait two years to steal your identity.

Time for the government to move away from SS#.
Sorry for the lack of clarity; I pay for something like this ongoing.

 
At his point, wouldn't you be in the minority if your name, address and SS# hasn't been breached by someone. I think it's going to get to the point we just throw our hands up in the air and find a new way to identify ourselves.

Maybe microchips in bedded in our bodies would work.
Certainly have to pay for some type of monitoring service. I have ever since the state of SC let everyone's SSNs out a few years ago.

Another large data breach from the federal government makes me feel even worse about how much information we allow the NSA to collect....
Sure, but if he government can't protect your personal information, what does 18 months of free monitoring do? You can change you credit card, or bank account number. But you're still stuck with the same name, address, and social security number. Crooks just wait two years to steal your identity.

Time for the government to move away from SS#.
Sorry for the lack of clarity; I pay for something like this ongoing.
We've had two different monitoring companies over the past few years. It seems like every time there is a breach, they give you a year for free. But I still feel like it's the governments fault, they force you to have a SS#, everyone wants the number to conduct simple financial transactions, but they also fail to protect it.

As an American consumer, what's my other option besides paying for a monitoring service?

 
'Shattered': Inside the secret battle to save America's undercover spies in the digital age

*****************

When hackers began slipping into computer systems at the Office of Personnel Management in the spring of 2014, no one inside that federal agency could have predicted the potential scale and magnitude of the damage. Over the next six months, those hackers — later identified as working for the Chinese government — stole data on nearly 22 million former and current American civil servants, including intelligence officials.

The data breach, which included fingerprints, personnel records and security clearance background information, shook the intelligence community to its core. Among the hacked information’s other uses, Beijing had acquired a potential way to identify large numbers of undercover spies working for the U.S. government. The fallout from the hack was intense, with the CIA reportedly pulling its officers out of China. (The director of national intelligence later denied this withdrawal.)

Personal data was being weaponized like never before. In one previously unreported incident, around the time of the OPM hack, senior intelligence officials realized that the Kremlin was quickly able to identify new CIA officers in the U.S. Embassy in Moscow — likely based on the differences in pay between diplomats, details on past service in “hardship” posts, speedy promotions and other digital clues, say four former intelligence officials. Those clues, they surmised, could have come from access to the OPM data, possibly shared by the Chinese, or some other way, say former officials.

The OPM hack was a watershed moment, ushering in an era when big data and other digital tools may render methods of traditional human intelligence gathering extinct, say former officials. It is part of an evolution that poses one of the most significant challenges to undercover intelligence work in at least a half century — and probably much longer.

*****************

 
I've said, along with several others, our country's leadership is ill equipped to understand the immediate problems we face in the cyber security arena.  Not ONE of the candidates on the Dem ticket have made this a top three issue and it's pretty clear Trump can't even handle traditional war scenarios much less cyber security.  The world is shifting and we're being left behind.

 

Users who are viewing this thread

Top