This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at http://www.bbc.co.uk/news/world-us-canada-33120405
The article has changed 3 times. There is an RSS feed of changes available.
Version 1 | Version 2 |
---|---|
US hacking: Military and intelligence data 'accessed' | US hacking: Military and intelligence data 'accessed' |
(about 2 hours later) | |
Hackers with suspected links to China appear to have accessed sensitive data on US intelligence and military personnel, American officials say. | Hackers with suspected links to China appear to have accessed sensitive data on US intelligence and military personnel, American officials say. |
Details of a major hack emerged last week, but officials have now given details of a potential second breach. | Details of a major hack emerged last week, but officials have now given details of a potential second breach. |
It is feared that the attack could leave US security personnel or their families open to blackmail. | It is feared that the attack could leave US security personnel or their families open to blackmail. |
The agency involved, the Office of Personnel Management (OPM), is yet to comment on the reports. | The agency involved, the Office of Personnel Management (OPM), is yet to comment on the reports. |
Officials, who spoke on condition of anonymity to the Associated Press (AP) news agency, believe the attackers have targeted the forms submitted by intelligence and military personnel for security clearances. | Officials, who spoke on condition of anonymity to the Associated Press (AP) news agency, believe the attackers have targeted the forms submitted by intelligence and military personnel for security clearances. |
The document includes personal information - everything from eye colour, to financial history, to past substance abuse, as well as contact details for the individual's friends and relatives. | |
Loans and drug use | Loans and drug use |
A 127-page vetting document called Standard Form 86 may have been accessed. Among the questions potential employees are asked: | A 127-page vetting document called Standard Form 86 may have been accessed. Among the questions potential employees are asked: |
A White House statement said investigators had a "high degree of confidence" that background information on government employees had been accessed. | A White House statement said investigators had a "high degree of confidence" that background information on government employees had been accessed. |
Joel Brenner, a former US counterintelligence official, called the data a "gold mine" for hackers. | Joel Brenner, a former US counterintelligence official, called the data a "gold mine" for hackers. |
It is also believed the breach of personal data of US government workers announced last week may be far larger than previously reported. | It is also believed the breach of personal data of US government workers announced last week may be far larger than previously reported. |
Initial estimates put the number of people potentially affected at four million, but officials close to the investigation told AP that as many as 14 million might be involved. | Initial estimates put the number of people potentially affected at four million, but officials close to the investigation told AP that as many as 14 million might be involved. |
Previous hack attacks on US government | Previous hack attacks on US government |
The US has said the hackers, thought to be behind both attacks, are believed to be based in China. Beijing called the claims "irresponsible". | The US has said the hackers, thought to be behind both attacks, are believed to be based in China. Beijing called the claims "irresponsible". |
The Obama administration meanwhile announced further measures to beef up cybersecurity on Friday. | The Obama administration meanwhile announced further measures to beef up cybersecurity on Friday. |
"Recent events underscore the need to accelerate the administration's cyber strategy and confront aggressive, persistent malicious actors that continue to target our nation's cyber infrastructure," a White House statement said. | "Recent events underscore the need to accelerate the administration's cyber strategy and confront aggressive, persistent malicious actors that continue to target our nation's cyber infrastructure," a White House statement said. |