Cybersecurity

Rogers mum on OPM attribution, but says hack shows value of data

Admiral Michael Rogers speaking at George Washington University on May 11, 2015.

Adm. Michael Rogers did not join the chorus of anonymous officials blaming China for the OPM hack.

While plenty of U.S. officials have blamed China for the OPM hack in the media – without attaching their names to the accusation -- none are doing so in public during a week of high-level economic and security talks between Washington and Beijing. The country’s top cyber official, U.S. Cyber Command Commander Adm. Michael Rogers, declined on June 24 to attribute the hack to China, but called the intrusion “another reminder to us … [that] we are in a world in which increasingly data has value as a commodity.”

Nation-states and private groups are aggressively targeting this high-value data, regardless of whether it resides in public or private networks, added Rogers, who was speaking at the GEOINT Symposium at the Washington Convention Center.

Rogers, who also heads the National Security Agency, said U.S. officials’ ability to attribute cyber intrusions to specific actors has improved markedly over the last decade. The investigation of the hack of the Office of Personnel Management, which exposed the personal information of millions of current and former federal officials, is ongoing, he added.

The NSA, with its vaunted cyber capabilities, has had a prominent role in investigating recent major network intrusions, including the hack in November of Sony Pictures Entertainment. For U.S. officials, publicly naming Chinese actors as being behind the OPM hack, if indeed they were, arguably carries more risk than accusing North Korea of sponsoring the Sony Pictures hack. While North Korea is a rogue state, the United States has worked with China in international negotiations to curb Iran’s nuclear program. And though administration officials, particularly those from the Justice Department, have often said they will call publicly call bad cyber actors to account, geopolitics complicates this principle.

White House spokesman Josh Earnest said on June 23 that, as far as he knew, the FBI had yet to make a determination on who was behind the OPM breach, but implied that frank bilateral discussions were going on behind doors on the issue. “After all, that’s the reason that we would invite senior Chinese officials to the United States, so that we wouldn’t have conversations through the media, but actually have an opportunity in a private setting to have a direct face-to-face discussion,” Earnest said.

Josh Campbell, a spokesman for the FBI’s cyber division, said the investigation of the OPM hack is continuing and declined to say whether an attribution had been made. He said that each investigation is unique, and it remained to be seen whether the FBI would publicly present evidence it has collected on the OPM intrusion, as the bureau did after the Sony Pictures investigation.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.