Title: Chinese Hackers Break into US Federal Worker Database

Content: <div id='article-page'><div id='article-content' data-media-url='//news-app-staging.s3.amazonaws.com' data-base-url='//news-app-staging.herokuapp.com' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/hackers_audio.m4a' data-capture-url='//staging.analytics.lingraphica.com/events/capture_news' data-article-title='Chinese Hackers Break into US Federal Worker Database' data-article-id='435'><script src='//news-app-staging.herokuapp.com/javascripts/getscripts.js'></script><link rel='stylesheet' href='//news-app-staging.herokuapp.com/stylesheets/article.css' type='text/css' /><div class='article'><p><span data-start-time='0' data-end-time='12083'>U.S. officials said hackers in China are responsible for stealing information on millions of federal government employees. </span> <span data-start-time='12083' data-end-time='18521'>It is the biggest breach of government workers information in years.</span> </p><p><span data-start-time='18521' data-end-time='34271'>The Office of Personnel Management (OPM) said Thursday that as many as four million current and former federal employees&rsquo; files may have been affected. </span> <span data-start-time='34271' data-end-time='39125'>OPM said the numbers could be even higher.</span> </p><p><span data-start-time='39125' data-end-time='51313'>The OPM is responsible for holding background information and issuing security clearances for millions of government employees. </span> <span data-start-time='51313' data-end-time='64083'>American law enforcement officials said they believe China-based hackers are behind the attack and may have connections to the Chinese government. </span> </p><p><span data-start-time='64083' data-end-time='70417'>China said Friday charges of its involvement are irresponsible. </span> <span data-start-time='70417' data-end-time='84667'>Chinese Foreign Ministry spokesman Hong Lei said that Beijing hopes the U.S. would be &ldquo;less suspicious and stop making any unverified allegations.&rdquo; </span> <span data-start-time='84667' data-end-time='88042'>He spoke at a regular news briefing.</span> </p><p><span data-start-time='88042' data-end-time='99750'>&ldquo;We know that hacker attacks are conducted anonymously, across nations, and that it is hard to track the source,&rdquo; Hong said. </span> <span data-start-time='99750' data-end-time='110792'>&ldquo;It is irresponsible and unscientific to make conjectural, trumped-up allegations without deep investigation.&rdquo;</span> </p><p><span data-start-time='110792' data-end-time='118625'>Representative Adam Schiff is the top Democrat on the House Intelligence Committee. </span> <span data-start-time='118625' data-end-time='131583'>He said this attack is shocking &ldquo;because Americans may expect that federal computer networks are maintained with state of the art defenses.&rdquo;</span> </p><p><span data-start-time='131583' data-end-time='140083'>Rob Pritchard is a cyber-security expert at the Royal United Services Institute. </span> <span data-start-time='140083' data-end-time='151500'>He said it would be somewhat uncommon for state-connected Chinese hackers to target U.S. government employee information.</span> </p><p><span data-start-time='151500' data-end-time='158458'>However, OPM can be seen as a high-value hacking target. </span> <span data-start-time='158458' data-end-time='166229'>Its computers store important and sensitive information about federal employees. </span> <span data-start-time='166229' data-end-time='181417'>For example, OPM keeps social security numbers, payroll information, job descriptions, performance reviews and family information on federal workers. </span> </p><p><span data-start-time='181417' data-end-time='193021'>Mr. Prichard said this information could be valuable to criminals who want to sell it for money, or state-sponsored hackers.</span> </p><p><span data-start-time='193021' data-end-time='199938'>Officials would not say what type of information was read or stolen. </span> <span data-start-time='199938' data-end-time='211167'>And it is not clear whether the hackers targeted individual employees, or just gathered information to be used later.</span> </p><p><span data-start-time='211167' data-end-time='218917'>Both the Federal Bureau of Investigation and the Department of Homeland Security are investigating. </span> <span data-start-time='218917' data-end-time='228705'>The FBI said it takes all threats to public and private organizations computer systems seriously. </span> <span data-start-time='228705' data-end-time='236083'>It said it will hold those who make such threats accountable, or responsible.</span> </p><p><span data-start-time='236083' data-end-time='240979'>OPM said it identified the security breach in April. </span> <span data-start-time='240979' data-end-time='248750'>Then it took what it called an &ldquo;aggressive effort&rdquo; to put tougher controls into place. </span> <span data-start-time='248750' data-end-time='256625'>The agency will offer help to the employees whose information may have been compromised.</span> </p><p><span data-start-time='256625' data-end-time='266875'>While this attack may be the biggest, it is not the only time hackers have gotten into U.S. government computer systems. </span> <span data-start-time='266875' data-end-time='274354'>Hackers have broken into unclassified White House and State Department computers. </span> <span data-start-time='274354' data-end-time='282833'>They also attacked the military&rsquo;s U.S. Central Command Twitter and YouTube accounts.</span> </p><p><span data-start-time='282833' data-end-time='291958'>The Internal Revenue Service, which is responsible for tax collection in the U.S., was hit last month. </span> <span data-start-time='291958' data-end-time='298417'>Hackers stole information on 100,000 taxpayers.</span> </p><p><span data-start-time='298417' data-end-time='303021'>Large American businesses have also been attacked. </span> <span data-start-time='303021' data-end-time='316667'>For example, the Sony Pictures movie studio, Target, Home Depot, EBay, as well as JP Morgan Chase bank, all have been victims.</span> <span data-start-time='316667' data-end-time='323604'>Some of the attacks have been blamed on North Korea, Russia and China.</span> </p><p><span data-start-time='323604' data-end-time='330021'>Experts say China wants to get U.S. industry and trade secrets. </span> <span data-start-time='330021' data-end-time='339604'>China angrily denies the accusations, and says it has been targeted by U.S. hackers.</span> </p><p><span data-start-time='339604' data-end-time='354667'>Last year, the U.S. charged five Chinese military officers with stealing trade secrets from the computers of several American nuclear, metal and solar companies. </span> <span data-start-time='354667' data-end-time='363375'>China denounced the charges and put on hold talks with the U.S. about fighting cyber crimes.</span> </p><p><span data-start-time='363375' data-end-time='366417'>I&rsquo;m Anne Ball</span> </p></div><div class='control-buttons-sticky' style='display:none;'><div class='control-buttons'><button title='Back' class='back' disabled='disabled'></button><button title='Play' class='play' disabled='disabled'></button><button title='Pause' class='pause' style='display:none;'></button><button title='Forward' class='forward' disabled='disabled'></button><button class='finished-reading' style='display:none;'>Done</button></div></div></div><div id='article-media'><div id='media-image'><img src='https://news-app-production.s3.amazonaws.com/articles/190/hackers_image.jpg'/></div></div><div id='question-content' style='display:none;'><div class='vocabulary_question question-container' data-question-id=2561 data-hint-location='99750' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/what_does_conjecture_mean.m4a'>What does <strong>conjecture</strong> mean?</div><div class='choices' data-correct-choice='without proof'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/to_be_guilty_of_a_crime.m4a'><span>to be guilty of a crime</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/without_proof.m4a'><span>without proof</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/not_named_or_identified.m4a'><span>not named or identified</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/break_into.m4a'><span>break into</span></div></div></div><div class='vocabulary_question question-container' data-question-id=2562 data-hint-location='88042' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/what_does_anonymous_mean.m4a'>What does <strong>anonymous</strong> mean?</div><div class='choices' data-correct-choice='not named or identified'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/to_be_guilty_of_a_crime.m4a'><span>to be guilty of a crime</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/without_proof.m4a'><span>without proof</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/not_named_or_identified.m4a'><span>not named or identified</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/break_into.m4a'><span>break into</span></div></div></div><div class='vocabulary_question question-container' data-question-id=2563 data-hint-location='236083' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/what_does_breach_mean.m4a'>What does <strong>breach</strong> mean?</div><div class='choices' data-correct-choice='break into'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/to_be_guilty_of_a_crime.m4a'><span>to be guilty of a crime</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/without_proof.m4a'><span>without proof</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/not_named_or_identified.m4a'><span>not named or identified</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/break_into.m4a'><span>break into</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=2564 data-hint-location='166229' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/which_is_not_a_piece_of_information_that_the_opm_would_have.m4a'>Which is NOT a piece of information that the OPM would have?</div><div class='choices' data-correct-choice='college GPA'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/payroll_information.m4a'><span>payroll information</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/performance_reviews.m4a'><span>performance reviews</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/college_gpa.m4a'><span>college GPA</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/social_security_numbers.m4a'><span>social security numbers</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=2565 data-hint-location='0' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/where_are_the_hackers_from.m4a'>Where are the hackers from?</div><div class='choices' data-correct-choice='China '><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/vietnam.m4a'><span>Vietnam</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/france.m4a'><span>France</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/china_.m4a'><span>China </span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/canada.m4a'><span>Canada</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=2566 data-hint-location='39125' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/which_group_is_responsible_for_holding_background_information_and_issuing_security_clearances.m4a'>Which group is responsible for holding background information and issuing security clearances?</div><div class='choices' data-correct-choice='OPM'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/fda.m4a'><span>FDA</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/fema.m4a'><span>FEMA</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/opm.m4a'><span>OPM</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/fbi.m4a'><span>FBI</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=2567 data-hint-location='282833' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/the_internal_revenue_service_which_is_responsible_for__blank__collection_was_also_hacked_recently_.m4a'>The Internal Revenue Service, which is responsible for <span class='blank'>tax</span> collection, was also hacked recently. </div><div class='choices' data-correct-choice='tax'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/tax.m4a'><span>tax</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/debt.m4a'><span>debt</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/charity.m4a'><span>charity</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/ticket.m4a'><span>ticket</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=2568 data-hint-location='211167' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/the__blank__and_the_department_of_homeland_security_are_investigating_the_hacking.m4a'>The <span class='blank'>FBI</span> and the Department of Homeland Security are investigating the hacking.</div><div class='choices' data-correct-choice='FBI'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/united_nations.m4a'><span>United Nations</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/fbi.m4a'><span>FBI</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/police.m4a'><span>police</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/dea.m4a'><span>DEA</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=2569 data-hint-location='323604' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/experts_say_china_wants_to_get_us_industry_and_trade__blank___.m4a'>Experts say China wants to get U.S. industry and trade <span class='blank'>secrets</span>. </div><div class='choices' data-correct-choice='secrets'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/help.m4a'><span>help</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/tips.m4a'><span>tips</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/information.m4a'><span>information</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/secrets.m4a'><span>secrets</span></div></div></div><div class='question-buttons'><button class='skip-button'></button><button class='hint-button'></button><button class='speak-button'></button></div></div></div>

Sound Name: https://news-app-production.s3.amazonaws.com/articles/190/hackers_audio.m4a

Preview

U.S. officials said hackers in China are responsible for stealing information on millions of federal government employees. It is the biggest breach of government workers information in years.

The Office of Personnel Management (OPM) said Thursday that as many as four million current and former federal employees’ files may have been affected. OPM said the numbers could be even higher.

The OPM is responsible for holding background information and issuing security clearances for millions of government employees. American law enforcement officials said they believe China-based hackers are behind the attack and may have connections to the Chinese government.

China said Friday charges of its involvement are irresponsible. Chinese Foreign Ministry spokesman Hong Lei said that Beijing hopes the U.S. would be “less suspicious and stop making any unverified allegations.” He spoke at a regular news briefing.

“We know that hacker attacks are conducted anonymously, across nations, and that it is hard to track the source,” Hong said. “It is irresponsible and unscientific to make conjectural, trumped-up allegations without deep investigation.”

Representative Adam Schiff is the top Democrat on the House Intelligence Committee. He said this attack is shocking “because Americans may expect that federal computer networks are maintained with state of the art defenses.”

Rob Pritchard is a cyber-security expert at the Royal United Services Institute. He said it would be somewhat uncommon for state-connected Chinese hackers to target U.S. government employee information.

However, OPM can be seen as a high-value hacking target. Its computers store important and sensitive information about federal employees. For example, OPM keeps social security numbers, payroll information, job descriptions, performance reviews and family information on federal workers.

Mr. Prichard said this information could be valuable to criminals who want to sell it for money, or state-sponsored hackers.

Officials would not say what type of information was read or stolen. And it is not clear whether the hackers targeted individual employees, or just gathered information to be used later.

Both the Federal Bureau of Investigation and the Department of Homeland Security are investigating. The FBI said it takes all threats to public and private organizations computer systems seriously. It said it will hold those who make such threats accountable, or responsible.

OPM said it identified the security breach in April. Then it took what it called an “aggressive effort” to put tougher controls into place. The agency will offer help to the employees whose information may have been compromised.

While this attack may be the biggest, it is not the only time hackers have gotten into U.S. government computer systems. Hackers have broken into unclassified White House and State Department computers. They also attacked the military’s U.S. Central Command Twitter and YouTube accounts.

The Internal Revenue Service, which is responsible for tax collection in the U.S., was hit last month. Hackers stole information on 100,000 taxpayers.

Large American businesses have also been attacked. For example, the Sony Pictures movie studio, Target, Home Depot, EBay, as well as JP Morgan Chase bank, all have been victims. Some of the attacks have been blamed on North Korea, Russia and China.

Experts say China wants to get U.S. industry and trade secrets. China angrily denies the accusations, and says it has been targeted by U.S. hackers.

Last year, the U.S. charged five Chinese military officers with stealing trade secrets from the computers of several American nuclear, metal and solar companies. China denounced the charges and put on hold talks with the U.S. about fighting cyber crimes.

I’m Anne Ball

Edit | Back