Editing Article Page
Title
Content
<div id='article-page'><div id='article-content' data-media-url='//news-app-staging.s3.amazonaws.com' data-base-url='//news-app-staging.herokuapp.com' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/hackers_audio.m4a' data-capture-url='//staging.analytics.lingraphica.com/events/capture_news' data-article-title='Chinese Hackers Break into US Federal Worker Database' data-article-id='435'><script src='//news-app-staging.herokuapp.com/javascripts/getscripts.js'></script><link rel='stylesheet' href='//news-app-staging.herokuapp.com/stylesheets/article.css' type='text/css' /><div class='article'><p><span data-start-time='0' data-end-time='12083'>U.S. officials said hackers in China are responsible for stealing information on millions of federal government employees. </span> <span data-start-time='12083' data-end-time='18521'>It is the biggest breach of government workers information in years.</span> </p><p><span data-start-time='18521' data-end-time='34271'>The Office of Personnel Management (OPM) said Thursday that as many as four million current and former federal employees’ files may have been affected. </span> <span data-start-time='34271' data-end-time='39125'>OPM said the numbers could be even higher.</span> </p><p><span data-start-time='39125' data-end-time='51313'>The OPM is responsible for holding background information and issuing security clearances for millions of government employees. </span> <span data-start-time='51313' data-end-time='64083'>American law enforcement officials said they believe China-based hackers are behind the attack and may have connections to the Chinese government. </span> </p><p><span data-start-time='64083' data-end-time='70417'>China said Friday charges of its involvement are irresponsible. </span> <span data-start-time='70417' data-end-time='84667'>Chinese Foreign Ministry spokesman Hong Lei said that Beijing hopes the U.S. would be “less suspicious and stop making any unverified allegations.” </span> <span data-start-time='84667' data-end-time='88042'>He spoke at a regular news briefing.</span> </p><p><span data-start-time='88042' data-end-time='99750'>“We know that hacker attacks are conducted anonymously, across nations, and that it is hard to track the source,” Hong said. </span> <span data-start-time='99750' data-end-time='110792'>“It is irresponsible and unscientific to make conjectural, trumped-up allegations without deep investigation.”</span> </p><p><span data-start-time='110792' data-end-time='118625'>Representative Adam Schiff is the top Democrat on the House Intelligence Committee. </span> <span data-start-time='118625' data-end-time='131583'>He said this attack is shocking “because Americans may expect that federal computer networks are maintained with state of the art defenses.”</span> </p><p><span data-start-time='131583' data-end-time='140083'>Rob Pritchard is a cyber-security expert at the Royal United Services Institute. </span> <span data-start-time='140083' data-end-time='151500'>He said it would be somewhat uncommon for state-connected Chinese hackers to target U.S. government employee information.</span> </p><p><span data-start-time='151500' data-end-time='158458'>However, OPM can be seen as a high-value hacking target. </span> <span data-start-time='158458' data-end-time='166229'>Its computers store important and sensitive information about federal employees. </span> <span data-start-time='166229' data-end-time='181417'>For example, OPM keeps social security numbers, payroll information, job descriptions, performance reviews and family information on federal workers. </span> </p><p><span data-start-time='181417' data-end-time='193021'>Mr. Prichard said this information could be valuable to criminals who want to sell it for money, or state-sponsored hackers.</span> </p><p><span data-start-time='193021' data-end-time='199938'>Officials would not say what type of information was read or stolen. </span> <span data-start-time='199938' data-end-time='211167'>And it is not clear whether the hackers targeted individual employees, or just gathered information to be used later.</span> </p><p><span data-start-time='211167' data-end-time='218917'>Both the Federal Bureau of Investigation and the Department of Homeland Security are investigating. </span> <span data-start-time='218917' data-end-time='228705'>The FBI said it takes all threats to public and private organizations computer systems seriously. </span> <span data-start-time='228705' data-end-time='236083'>It said it will hold those who make such threats accountable, or responsible.</span> </p><p><span data-start-time='236083' data-end-time='240979'>OPM said it identified the security breach in April. </span> <span data-start-time='240979' data-end-time='248750'>Then it took what it called an “aggressive effort” to put tougher controls into place. </span> <span data-start-time='248750' data-end-time='256625'>The agency will offer help to the employees whose information may have been compromised.</span> </p><p><span data-start-time='256625' data-end-time='266875'>While this attack may be the biggest, it is not the only time hackers have gotten into U.S. government computer systems. </span> <span data-start-time='266875' data-end-time='274354'>Hackers have broken into unclassified White House and State Department computers. </span> <span data-start-time='274354' data-end-time='282833'>They also attacked the military’s U.S. Central Command Twitter and YouTube accounts.</span> </p><p><span data-start-time='282833' data-end-time='291958'>The Internal Revenue Service, which is responsible for tax collection in the U.S., was hit last month. </span> <span data-start-time='291958' data-end-time='298417'>Hackers stole information on 100,000 taxpayers.</span> </p><p><span data-start-time='298417' data-end-time='303021'>Large American businesses have also been attacked. </span> <span data-start-time='303021' data-end-time='316667'>For example, the Sony Pictures movie studio, Target, Home Depot, EBay, as well as JP Morgan Chase bank, all have been victims.</span> <span data-start-time='316667' data-end-time='323604'>Some of the attacks have been blamed on North Korea, Russia and China.</span> </p><p><span data-start-time='323604' data-end-time='330021'>Experts say China wants to get U.S. industry and trade secrets. </span> <span data-start-time='330021' data-end-time='339604'>China angrily denies the accusations, and says it has been targeted by U.S. hackers.</span> </p><p><span data-start-time='339604' data-end-time='354667'>Last year, the U.S. charged five Chinese military officers with stealing trade secrets from the computers of several American nuclear, metal and solar companies. </span> <span data-start-time='354667' data-end-time='363375'>China denounced the charges and put on hold talks with the U.S. about fighting cyber crimes.</span> </p><p><span data-start-time='363375' data-end-time='366417'>I’m Anne Ball</span> </p></div><div class='control-buttons-sticky' style='display:none;'><div class='control-buttons'><button title='Back' class='back' disabled='disabled'></button><button title='Play' class='play' disabled='disabled'></button><button title='Pause' class='pause' style='display:none;'></button><button title='Forward' class='forward' disabled='disabled'></button><button class='finished-reading' style='display:none;'>Done</button></div></div></div><div id='article-media'><div id='media-image'><img src='https://news-app-production.s3.amazonaws.com/articles/190/hackers_image.jpg'/></div></div><div id='question-content' style='display:none;'><div class='vocabulary_question question-container' data-question-id=2561 data-hint-location='99750' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/what_does_conjecture_mean.m4a'>What does <strong>conjecture</strong> mean?</div><div class='choices' data-correct-choice='without proof'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/to_be_guilty_of_a_crime.m4a'><span>to be guilty of a crime</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/without_proof.m4a'><span>without proof</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/not_named_or_identified.m4a'><span>not named or identified</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/break_into.m4a'><span>break into</span></div></div></div><div class='vocabulary_question question-container' data-question-id=2562 data-hint-location='88042' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/what_does_anonymous_mean.m4a'>What does <strong>anonymous</strong> mean?</div><div class='choices' data-correct-choice='not named or identified'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/to_be_guilty_of_a_crime.m4a'><span>to be guilty of a crime</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/without_proof.m4a'><span>without proof</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/not_named_or_identified.m4a'><span>not named or identified</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/break_into.m4a'><span>break into</span></div></div></div><div class='vocabulary_question question-container' data-question-id=2563 data-hint-location='236083' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/what_does_breach_mean.m4a'>What does <strong>breach</strong> mean?</div><div class='choices' data-correct-choice='break into'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/to_be_guilty_of_a_crime.m4a'><span>to be guilty of a crime</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/without_proof.m4a'><span>without proof</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/not_named_or_identified.m4a'><span>not named or identified</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/break_into.m4a'><span>break into</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=2564 data-hint-location='166229' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/which_is_not_a_piece_of_information_that_the_opm_would_have.m4a'>Which is NOT a piece of information that the OPM would have?</div><div class='choices' data-correct-choice='college GPA'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/payroll_information.m4a'><span>payroll information</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/performance_reviews.m4a'><span>performance reviews</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/college_gpa.m4a'><span>college GPA</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/social_security_numbers.m4a'><span>social security numbers</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=2565 data-hint-location='0' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/where_are_the_hackers_from.m4a'>Where are the hackers from?</div><div class='choices' data-correct-choice='China '><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/vietnam.m4a'><span>Vietnam</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/france.m4a'><span>France</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/china_.m4a'><span>China </span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/canada.m4a'><span>Canada</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=2566 data-hint-location='39125' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/which_group_is_responsible_for_holding_background_information_and_issuing_security_clearances.m4a'>Which group is responsible for holding background information and issuing security clearances?</div><div class='choices' data-correct-choice='OPM'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/fda.m4a'><span>FDA</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/fema.m4a'><span>FEMA</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/opm.m4a'><span>OPM</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/fbi.m4a'><span>FBI</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=2567 data-hint-location='282833' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/the_internal_revenue_service_which_is_responsible_for__blank__collection_was_also_hacked_recently_.m4a'>The Internal Revenue Service, which is responsible for <span class='blank'>tax</span> collection, was also hacked recently. </div><div class='choices' data-correct-choice='tax'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/tax.m4a'><span>tax</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/debt.m4a'><span>debt</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/charity.m4a'><span>charity</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/ticket.m4a'><span>ticket</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=2568 data-hint-location='211167' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/the__blank__and_the_department_of_homeland_security_are_investigating_the_hacking.m4a'>The <span class='blank'>FBI</span> and the Department of Homeland Security are investigating the hacking.</div><div class='choices' data-correct-choice='FBI'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/united_nations.m4a'><span>United Nations</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/fbi.m4a'><span>FBI</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/police.m4a'><span>police</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/dea.m4a'><span>DEA</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=2569 data-hint-location='323604' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/experts_say_china_wants_to_get_us_industry_and_trade__blank___.m4a'>Experts say China wants to get U.S. industry and trade <span class='blank'>secrets</span>. </div><div class='choices' data-correct-choice='secrets'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/help.m4a'><span>help</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/tips.m4a'><span>tips</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/information.m4a'><span>information</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/190/secrets.m4a'><span>secrets</span></div></div></div><div class='question-buttons'><button class='skip-button'></button><button class='hint-button'></button><button class='speak-button'></button></div></div></div>
Sound name
https://news-app-production.s3.amazonaws.com/articles/190/hackers_audio.m4a
Show
|
Back