Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Hardware
DDoS Protection Powered By Verisign
Average Rating:
Rate this article:  
Report: Chinese Hackers Hit U.S. Personnel Networks

Report: Chinese Hackers Hit U.S. Personnel Networks

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

A report says Chinese hackers gained access to some of the U.S. Office of Personnel Management's databases in March before the threat was detected and blocked. How far the hackers penetrated the agency's systems was not yet clear. The agency doesn't think personally identifiable information for employees had been compromised.
 


Chinese hackers broke into the computer networks of the U.S. Office of Personnel Management earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to The New York Times.

Senior U.S. officials say the hackers gained access to some of the agency's databases in March before the threat was detected and blocked, the Times reported in an article posted on its website Wednesday night. How far the hackers penetrated the agency's systems was not yet clear, the newspaper said.

Accusations of hacking by China and counterclaims of such activity by the U.S. government have strained U.S.-Chinese relations. Chinese hacking has been a major theme of U.S.-China discussions this week in Beijing, though both sides have publicly steered clear of the controversy.

In May, the Justice Department filed a 31-count indictment against five Chinese military officials operating under hacker aliases and accused them of penetrating computer networks of a half-dozen steel companies and makers of solar and nuclear technology to gain a competitive advantage. The Chinese government denied the allegations and suspended a working group on cyber rules that was to be part of the annual "Strategic and Economic Dialogue" this week.

The Office of Personnel Management houses personal information for all federal employees. Those applying for security clearances would be expected to provide such information as foreign contacts, previous jobs, past drug use and other personal details, the newspaper reported.

The Times quoted an unidentified senior U.S. official as saying that the attack had been traced to China but that it wasn't clear whether the hackers were part of the government. A Homeland Security Department official confirmed to the Times that an attack occurred but said no loss of personally identifiable information had been identified.

The Office of Personnel Management oversees a system by which federal employees applying for security clearances enter financial data and other personal information, the Times said, and those who maintain such clearances are required to update their information through that system. Agencies and contractors use the information to investigate employees.

The attack in March was not announced even though the Obama administration has urged U.S. companies to share information about breaches in security with the government and with consumers, the newspaper reported.

"The administration has never advocated that all intrusions be made public," Caitlin Hayden, a spokeswoman for the Obama administration, said in a statement to the Times. "We have advocated that businesses that have suffered an intrusion notify customers if the intruder had access to consumers' personal information. We have also advocated that companies and agencies voluntarily share information about intrusions."

Hayden said the administration had no reason to believe that personally identifiable information for employees had been compromised.
 


© 2014 Associated Press under contract with NewsEdge. All rights reserved.
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Hardware
1.   New Lenovo PCs for Business Users
2.   Price Wars Hitting Laptop Market?
3.   Have Net Routers Reached The Limit?
4.   Obama Boosts Government Tech
5.   Surface Pro Ads Aim at MacBook Pro


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Chinese Hackers Nab Info on Millions of U.S. Patients
A group of Chinese hackers has stolen the personal information, including names and Social Security numbers, of about 4.5 million patients at hospitals operated by Community Health Systems.
 

Enterprise Hardware Spotlight
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Compression, Deduplication Come to Violin Concerto 2200
Violin Memory has announced that data deduplication and compression capabilities are now available on its Concerto 2200 solution. Typically, users will experience deduplication rates between 6:1 and 10:1.
 

Mobile Technology Spotlight
Apple Stock Soars Ahead of iPhone 6 Launch
The imminent release of the iPhone 6 -- and maybe even an iWatch -- has sent Apple's stock soaring to new heights. Considering what else the firm could have up its sleeve -- the stratosphere may be the limit.
 
HTC Debuts Windows Phone Version of One M8 Smartphone
HTC is bringing the Windows Phone mobile OS to its flagship One M8 device -- the first time any mainstream flagship smartphone has been offered with a choice of operating systems.
 
Verizon Earns Top Rating in Mobile Network Comparison
A new report says Verizon Wireless was the top-performing U.S. cellphone service provider in the first half of 2014, on a nationwide and state-by-state basis, as well as in metro areas.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.