Jump to content

Any current or former Military get a letter


buck1032

Recommended Posts

Yup, three times a...no wait, four times a charm. DA published the E8 list with socials, VA twice lost computers with my info on them and now OPM. This time I am taking advantage of the identity monitoring service they are providing, my clearance paperwork is extensive and quite detailed so no telling what they can get off it.
Link to comment

WOW, I hope this is not as bad as it sounds. I have not received a letter yet but I have plenty of SF86's under my belt as well as dealing regularly with the VA>

My wife just got hers, I received mine a couple of weeks ago. It's big enough that if you had even one you are probably on the hit list.
Link to comment

I cant keep from thinking this isn't for credit fraud. The info stolen is very specific and detailed. It sort makes me want to up arm myself even more.

Well, if I remember correctly, they arrested some foreigner(s) for either selling, or trying to sell military personnel's private info to ISIS. Seems we are not getting the full story here, we should all stay vigilant.
Link to comment

Maybe this:

http://www.foxnews.com/politics/2015/06/12/officials-hack-exposed-up-to-14-million-federal-records/

 

 

WASHINGTON –  Hackers linked to China appear to have gained access to the sensitive background information submitted by intelligence and military personnel for security clearances, several U.S. officials said Friday, describing a second cyberbreach of federal records that could dramatically compound the potential damage.

 

The forms authorities believed to have been accessed, known as Standard Form 86, require applicants to fill out deeply personal information about mental illnesses, drug and alcohol use, past arrests and bankruptcies. They also require the listing of contacts and relatives, potentially exposing any foreign relatives of U.S. intelligence employees to coercion. Both the applicant's Social Security number and that of his or her cohabitant is required.

 

The officials spoke on condition of anonymity because the security clearance material is classified.

 

"This tells the Chinese the identities of almost everybody who has got a United States security clearance," said Joel Brenner, a former top U.S. counterintelligence official. "That makes it very hard for any of those people to function as an intelligence officer. The database also tells the Chinese an enormous amount of information about almost everyone with a security clearance. That's a gold mine. It helps you approach and recruit spies."

 

The Office of Personnel Management, which was the target of the hack, has not officially notified military or intelligence personnel whose security clearance data was breached, but news of the second hack was starting to circulate in both the Pentagon and the CIA.

 

The officials said they believe the hack into the security clearance database was separate from the breach of federal personnel data announced last week — a breach that is itself appearing far worse than first believed. It could not be learned whether the security database breach happened when an OPM contractor was hacked in 2013, an attack that was discovered last year. Members of Congress received classified briefings about that breach in September, but there was no mention of security clearance information being exposed.

 

The OPM had no immediate comment Friday.

 

Nearly all of the millions of security clearance holders, including CIA, National Security Agency and military special operations personnel, are potentially exposed in the security clearance breach, the officials said. More than 2.9 million people had been investigated for a security clearance as of October 2014, according to government records.

 

In the hack of standard personnel records announced last week, two people briefed on the investigation disclosed Friday that as many as 14 million current and former civilian U.S. government employees have had their information exposed to hackers, a far higher figure than the 4 million the Obama administration initially disclosed.

 

American officials have said that cybertheft originated in China and that they suspect espionage by the Chinese government, which has denied any involvement.

 

The newer estimate puts the number of compromised records between 9 million and 14 million going back to the 1980s, said one congressional official and one former U.S. official, who spoke to The Associated Press on condition of anonymity because information disclosed in the confidential briefings includes classified details of the investigation.

 

There are about 2.6 million executive branch civilians, so the majority of the records exposed relate to former employees. Contractor information also has been stolen, officials said. The data in the hack revealed last week include the records of most federal civilian employees, though not members of Congress and their staffs, members of the military or staff of the intelligence agencies.

 

On Thursday, a major union said it believes the hackers stole Social Security numbers, military records and veterans' status information, addresses, birth dates, job and pay histories; health insurance, life insurance and pension information; and age, gender and race data.

 

The personnel records would provide a foreign government an extraordinary roadmap to blackmail, impersonate or otherwise exploit federal employees in an effort to gain access to U.S. secrets —or entry into government computer networks.

 

Outside experts were pointing to the breaches as a blistering indictment of the U.S. government's ability to secure its own data two years after a National Security Agency contractor, Edward Snowden, was able to steal tens of thousands of the agency's most sensitive documents.

 

After the Snowden revelations about government surveillance, it became more difficult for the federal government to hire talented younger people into sensitive jobs, particularly at intelligence agencies, said Evan Lesser, managing director of ClearanceJobs.com, a website that matches security-clearance holders to available slots.

 

"Now, if you get a job with the government, your own personal information may not be secure," he said. "This is going to multiply the government's hiring problems many times."

The Social Security numbers were not encrypted, the American Federation of Government Employees said, calling that "an abysmal failure on the part of the agency to guard data that has been entrusted to it by the federal workforce."

 

"Unencrypted information of this kind this is disgraceful — it really is disgraceful," Brenner said. "We've had wakeup calls now for 20 years or more, and we keep hitting the snooze button."

Samuel Schumach, an OPM spokesman, would not address how the data was protected or specifics of the information that might have been compromised, but said, "Today's adversaries are sophisticated enough that encryption alone does not guarantee protection." OPM is nonetheless increasing its use of encryption, he said.

 

The Obama administration had acknowledged that up to 4.2 million current and former employees whose information resides in the Office of Personnel Management server are affected by the December cyberbreach, but it had been vague about exactly what was taken.

 

J. David Cox, president of the American Federation of Government Employees, said in a letter Thursday to OPM director Katherine Archuleta that based on incomplete information OPM provided to the union, "the hackers are now in possession of all personnel data for every federal employee, every federal retiree and up to 1 million former federal employees."

 

Another federal employee group, the National Active and Retired Federal Employees Association, said Friday that "at this point, we believe AFGE's assessment of the breach is overstated." It called on the OPM to provide more information.

 

Rep. Mike Rogers, the former chairman of the House Intelligence Committee, said last week that he believes China will use the recently stolen information for "the mother of all spear-phishing attacks."

 

Spear-phishing is a technique under which hackers send emails designed to appear legitimate so that users open them and load spyware onto their networks.

Link to comment

Maybe this:
http://www.foxnews.com/politics/2015/06/12/officials-hack-exposed-up-to-14-million-federal-records/

No, that's the guys who hacked the OPM, a Chinese Intel Op IMO. I was talking about this:
http://www.cnn.com/2015/10/15/politics/malaysian-hacker-isis-military-data/

And these are just the ones we know about, remember that the OPM was hacked earlier than was reported. Some is to protect the investigation, some is political, and some is to keep us from realizing just how inept many federal departments are.
Link to comment

I've changed mailing addresses about five times since I left the Army.  So, if I was sent a letter, it's not likely to make it to me.  Anybody know if they have a website where I can enter my info and find out if I'm on the list?  I've been paying for credit monitoring through USAA for years now since I knew this was coming sooner or later.

Link to comment
I just changed addresses so who knows. I'd much rather get my SSN compromised (like the VA did for me) than have my SF 86 out there. The type of people sifting through that information may very well be some bad people. Regardless of my address changing since my last one, that has all my close personal contacts, professional contacts, much of my military related history, and the clearances I have held.

I just submitted my renewal last month, so hopefully they figured this out before then. Friggin idiots.


Sent from my iPhone using Tapatalk
Link to comment
This link can tell you if you have been effected. The letter, similar to those that contain your credit card pin number, contain a code to get you the free credit monitoring. You should be able to give them a current address in that link, but if you file taxes...they know where you live ?

https://www.opm.gov/cybersecurity

Example letter:
https://www.opm.gov/cybersecurity/sample-letter.pdf

The examples are almost identical except one mentions fingerprints (if compromised) and one don't; Mine were of course. Edited by Omega
Link to comment
If it was backed up on digits at the OPM it is compromised for sure.

I do not think this is about credit fraud, probably about target analysis - it gives every bit of PPI in addition to known friends/associates. What unit you were in. What info you had access to and what your MOS(S) were.

So they know who is SF, EOD, Intel, PSYOPS, linguists, snipers, special skilled people - anyone with SOF ties, read-on to classified materials...they know who all of us are and where we live

Sent from my SPH-L720 using Tapatalk Edited by CommsNBombs
Link to comment

If it's just the SF 86 then it shouldn't be more than what is on that paperwork though. I wouldn't think that OPM tracks all that other stuff; at least not in the same place.

It all gets reported/shared with JPAS, and other orgs. Hopefully it is just the SF86 but the investigator also marks those things up. And it keeps getting amended especially if you got read-on, added caveats, upgraded to TS, had a SCI/presidential schedule on it, etc

Sent from my SPH-L720 using Tapatalk
Link to comment

F'ing Chinese are really starting to get under my skin.  I guess I shouldn't worry about various muzzie groups getting ahold of that information though, since it's probably safer on Chinese servers than it is at OPM/DoD.

Link to comment
The Chinamen will sell it to the Russians who will "accidently" lose it to the Chechens who will trade it for 14 year old Yazidi girls.

Then some derkajerka on a TOR will hit up his brother Ahmed here in Nashville with all the info, he will follow us for a week, get the feel for our optempo and additional HUMINT and when we are up at 0430 making our way to the car for PT he comes and buries an axe in our head or puts some 9mm in our dome.

All Ahmed had to do was buy a glock on Armslist and wait for the call. He did it all for the equivelent of $200

Sent from my SPH-L720 using Tapatalk
Link to comment

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

TRADING POST NOTICE

Before engaging in any transaction of goods or services on TGO, all parties involved must know and follow the local, state and Federal laws regarding those transactions.

TGO makes no claims, guarantees or assurances regarding any such transactions.

THE FINE PRINT

Tennessee Gun Owners (TNGunOwners.com) is the premier Community and Discussion Forum for gun owners, firearm enthusiasts, sportsmen and Second Amendment proponents in the state of Tennessee and surrounding region.

TNGunOwners.com (TGO) is a presentation of Enthusiast Productions. The TGO state flag logo and the TGO tri-hole "icon" logo are trademarks of Tennessee Gun Owners. The TGO logos and all content presented on this site may not be reproduced in any form without express written permission. The opinions expressed on TGO are those of their authors and do not necessarily reflect those of the site's owners or staff.

TNGunOwners.com (TGO) is not a lobbying organization and has no affiliation with any lobbying organizations.  Beware of scammers using the Tennessee Gun Owners name, purporting to be Pro-2A lobbying organizations!

×
×
  • Create New...

Important Information

By using this site, you agree to the following.
Terms of Use | Privacy Policy | Guidelines
 
We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.