Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Thursday January 04 2018, @06:50PM   Printer-friendly
from the surprising-to-no-one dept.

From Security Week we have a report that nearly a quarter-million people have had Personally Identifiable Information (PII) compromised by the Department of Homeland Security:

The privacy incident involved a database used by the DHS Office of the Inspector General (OIG) which was stored in the DHS OIG Case Management System.

The incident impacted approximately 247,167 current and former federal employees that were employed by DHS in 2014. The exposed Personally identifiable information (PII) of these individuals includes names, Social Security numbers, birth dates, positions, grades, and duty stations.

Individuals (both DHS employees and non-DHS employees) associated with DHS OIG investigations from 2002 through 2014 (including subjects, witnesses, and complainants) were also affected by the incident, the DHS said.

The PII associated with these individuals varies depending on the documentation and evidence collected for a given case and could include names, social security numbers, alien registration numbers, dates of birth, email addresses, phone numbers, addresses, and personal information provided in interviews with DHS OIG investigative agents.

The data breach wasn’t the result of an external attack, the DHS claims. The leaked data was found in an unauthorized copy of the DHS OIG investigative case management system that was in the possession of a former DHS OIG employee.

The data breach was discovered on May 10, 2017, as part of an ongoing criminal investigation conducted by DHS OIG and the U.S. Attorney’s Office.

“The privacy incident did not stem from a cyber-attack by external actors, and the evidence indicates that affected individual’s personal information was not the primary target of the unauthorized exfiltration,” DHS explained.

No word on whether or not the copy was encrypted in any fashion. Is this a genuine issue, or just the result of an employee making a local copy of the DHS case management system for working at from home?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Funny) by LoRdTAW on Thursday January 04 2018, @07:19PM (3 children)

    by LoRdTAW (3755) on Thursday January 04 2018, @07:19PM (#617890) Journal

    Figures the government is so outdated that it still uses Pentium II's.

    Starting Score:    1  point
    Moderation   +3  
       Funny=3, Total=3
    Extra 'Funny' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 3, Funny) by Dr Spin on Thursday January 04 2018, @07:53PM

    by Dr Spin (5239) on Thursday January 04 2018, @07:53PM (#617904)

    Well PIIs are vulnerable to Meltdown, so I thought much the same!

    --
    Warning: Opening your mouth may invalidate your brain!
  • (Score: 4, Funny) by realDonaldTrump on Thursday January 04 2018, @08:41PM (1 child)

    by realDonaldTrump (6614) on Thursday January 04 2018, @08:41PM (#617937) Homepage Journal

    Our government does use a lot of old cyber. For our nuclear, our nuclear arsenal. And for many things. Some people -- foolish people -- laughed at that, they said "get the new cyber, the old one is too slow!" But I said "wait, sometimes the old ones are the best." And I was right. Because a lot, a lot of the new cyber has something called "Intel Speculative Execution Vulnerability." And it makes the new cyber very slow. Or not safe. If you try to make it safe, it gets very slow.

    We kept what we had. We saved the taxpayers a lot of money. It's what we do. #TRUMP2020 [twitter.com]