Hack at USDA puts 26,000 at risk

USDA news release on data theft

Related Links

Editor's note:This story was updated at 1 p.m. Aug. 9, 2006, with new information. The Agriculture Department announced July 13 that personal identity information was not downloaded or transferred outside its computer system when it was illegally accessed in June. Because of this, the agency is no longer offering free credit monitoring services.

A hacker broke into an Agriculture Department information technology system that contained names, Social Security numbers and other employee data during the first weekend in June, department officials said last week. The security breach put 26,000 current and retired employees and contractors in the Washington, D.C., area at risk of identity theft and other cybercrimes.

Security analysts asked to comment on the incident said the federal government has become a growing target for economic crime and espionage. Despite laws that require the safeguarding of government information and personal data, the recent publicized breaches are simply the tip of the iceberg, the analysts said.

Computer forensic examiners confirmed that an unauthorized person accessed a computer system in the USDA’s Office of Operations. Although examiners could not determine whether a database containing personal information was viewed or downloaded, their forensic analysis indicated the data could be at risk, USDA officials said.

The USDA is sending letters to all affected employees and contractors and will offer them free credit-monitoring services for a year. The USDA notified them of the problem June 21 via e-mail.

The USDA incident is the latest in a string of revelations about agency security breaches, and it does not surprise Paul Kurtz, executive director of the Cyber Security Industry Alliance. “It seems like every week it’s a new federal agency,” he said. In recent weeks, the Department of Veterans Affairs and the Energy Department have also revealed details of information security incidents.

The federal government is a tempting target for economic crime and espionage, said Alan Paller, director of research at the SANS Institute. He estimates that 10 to 20 computer breaches occur weekly in which unauthorized outsiders take control of federal computer systems. Most agencies don’t know how damaging the attacks are and don’t admit they occurred, he said.

“It would be like having a thief in your house for four hours and having no videotape [so] you don’t know what he did,” Paller said. “By keeping it a secret, they take away any pressure on executives to fix it.”

The recently publicized breaches are likely just a small fraction of the real damage, with hundreds of others that could be lurking outside public knowledge, said Bruce Brody, vice president for information security at Input, a market research and consulting firm. Brody has served as chief information security officer at DOE and the VA.

“We know the controls aren’t in place that [could] prevent other [attacks] from occurring,” Brody said.

Michael Arnone contributed to this article.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group