U.S. undercover investigators among those exposed in data breach

BOSTON/WASHINGTON Sat Aug 23, 2014 10:25am EDT

A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. REUTERS/Kacper Pempel/Files

A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture.

Credit: Reuters/Kacper Pempel/Files

Related Topics

BOSTON/WASHINGTON (Reuters) - A cyber attack at a firm that performs background checks for U.S. government employees compromised data of at least 25,000 workers, including some undercover investigators, and that number could rise, agency officials said on Friday.

The breach at Falls Church, Virginia-based US Investigations Services (USIS) exposed highly personal information of workers at the Department of Homeland Security's headquarters as well as its U.S. Immigration and Customs Enforcement and U.S. Customs and Border Protection units, two officials familiar with the investigation into the breach told Reuters.

Some employees have already received letters warning them about the breach that say compromised information includes Social Security numbers, education and criminal history, birth dates along with information about spouses, other relatives and friends including their names and addresses.

"Records including this data were exposed to unauthorized users during the cybersecurity intrusion," according to a notification letter obtained by Reuters. "We do not yet know whether the data was actually taken."

One DHS official told Reuters the agency has identified some 25,000 employees whose information it believes were exposed in the breach.

"More could be notified in coming weeks as we learn more about the breach," said the official, who asked not to be identified by name.

The company disclosed the attack earlier this month, but did not say how many records had been compromised or which agencies were affected. It did say the intrusion has "all the markings of a state-sponsored attack."

While the number of employees affected is relatively small compared to breaches at retailers such as Target Corp, which have affected tens of millions of customers, security experts say the attack on USIS is nonetheless quite serious.

Files on background checks contain highly sensitive data that foreign intelligence agencies could attempt to exploit to intimidate government workers with access to classified information.

"They would be collecting this data to identify individuals who might be vulnerable to extortion and recruitment," said Dmitri Alperovitch, chief technology officer with cybersecurity firm CrowdStrike, which sells intelligence on state-sponsored cyber attacks.

The Department of Homeland Security has suspended all work with USIS since the breach was disclosed and the FBI launched an investigation.

USIS says it is the biggest commercial provider of background investigations to the federal government, with over 5,700 employees, and provides services in all U.S. states and territories, as well as abroad.

A spokeswoman for Altegrity, which owns USIS, declined comment. Altegrity is majority owned by Providence Equity Partners.

(This story has been corrected to remove inaccurate statement in penultimate paragraph saying USIS could not be reached. A representative for the company declined comment.)

(Reporting by Jim Finkle in Boston; Additional reporting by Mark Hosenball; Editing by Meredith Mazzilli, Leslie Adler, Tom Brown and Frances Kerry)

FILED UNDER:
We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/
Comments (12)
BarryHurd wrote:
As someone who grew up with operational security as a kid, I am amazed by the fact that undercover agents would be in a database/employee list that was easy to crack.

Common sense seems to have succumbed to the crushing weight of government bureaucracy. Such records should have been kept in an encrypted format and properly nestled into the right security structure.

Aug 22, 2014 10:40pm EDT  --  Report as abuse
AZ1811 wrote:
USIS was started by former OPM employees and contractors and is rife with bureaucratic and other problems. It cost the American taxpayers way more than they should have paid for background investigations at all levels. Check it out for yourself.

Aug 22, 2014 11:15pm EDT  --  Report as abuse
Bfstk wrote:
Obama can add this to his resume when he leaves office. These egregious computer flops are a regular staple in the Obama Administration and totally unacceptable.

Bottom Line: No one will be fired and another favored vendor will get a fat contract soon.

Aug 22, 2014 11:19pm EDT  --  Report as abuse
This discussion is now closed. We welcome comments on our articles for a limited period after their publication.