Tensions ran high Tuesday during a House Oversight and Government Reform Committee hearingĀ investigating the hack of the Office of Personnel Management (OPM). At times outright contentious, several lawmakers lashed out at representatives from the OPM, including both its director and chief information officer (CIO), laying blame at the feet ofĀ the agencyās data protection policies and systems and calling for the resignation of its leadership.
Committee Chairman Jason Chaffetz (R-UT) was perhaps the most vocal critic of the OPM, naming, for example, a number of data breach incidents affecting the agency in recent years. āThis has been going on for a long time," he said, "and yet when I read the testimony (submitted by the OPM) that was provided here today saying, āHey, weāre doing a great job,'āYouāre not!"
āWeāre talking about the most vital information about the people we care about the most,ā he said. āFor years, it has been a complete and total, utter failure. I read the letter you sent out to employees, and itās grossly inadequate.ā
At issue during the hearings were two separate breaches of the OPM, one including as many as 4.2 million federal employees, the other compromising the security background checks of current, former and prospective federal employees and contractors. It is not yet known how broad the latter breach is because, according to OPM Director Katherine Archuleta, the agency is currently working with other agencies that had access to OPM data to determine the breadth of the data breach. She also admitted theĀ total number of affected workers will likely be more than 4.2 million.
Archuleta said the agency, which faces approximately 10 million cyber intrusions per month, has taken āan aggressive postureā but admitted it has ānot yet determined the scope or impactā of the breach. Defending her actions since being appointed by President Barack Obama in 2013, she said, āIf we hadnāt introduced new technology, we would not have known about these intrusions, and we immediately implemented additional security measures.ā
But that wasnāt enough for many of the lawmakers on the committee.
Rep. Ted Lieu (D-CA), who has a background in computer science, said databases with unencrypted Social Security numbers, like the ones affected in the OPM breach, are ātotally unacceptable.ā He scoffed at the agency for not conducting a risk assessment, calling it a āfailure of leadership,ā something that goes beyond the OPM. āLeadership at the DEA, the VA and SSA have all been fired," he said, adding, "The status quo is not acceptableā and that heās ālooking for leadership to resign for the good of the nation.ā
Chaffetz chimed in, āWell said.ā
Rep. Carolyn Maloney (D-NY) said she considers the OPM hacks to be more damaging to U.S. national security than the 9/11 attacks because of an apparently coordinated effort by foreign actors to target government workers and contractors by accessing troves of detailed background information, including health and employment data. Rep. Gerry Connolly (D-WV) likened the spate of recent breaches to a āroad mapā of government employees.
āThe United States of America is under attack,ā said Ranking Member Elijah Cummings (D-MD). āForeign countries are targeting the personal information of millions of Americans.ā He said the OPM breaches are part of a larger trend of state-sponsored data collection on individual Americans in sensitive national security and leadership positions. He also questioned whether there are links to last yearās USIS and Keypoint hacks, both of which were contractors that supplied background checks to the agency.
Though the witnesses could not publicly testify to all the questions asked during the hearing, including the Keypoint connection, a second classified hearing was set for early Tuesday afternoon to discuss more sensitive national security issues, such as the potential effect the OPM hack would have on U.S. government personnel and specific foreign allies tied to the U.S., and whether a zero-day vulnerability or connections to other data breaches were to blame for the OPM hacks.
Following those classified hearings, Cummings issued a press release, noting, āI now feel more strongly than ever that the Oversight Committee must hear directly from OPMās two contractorsāKeyPoint and USISāeither in transcribed interviews or in formal testimony before the Committee. I also believe the Committee should now request a much more detailed, comprehensive and classified briefing from government IT experts about the specific vulnerabilities that contractors pose to our governmentās cybersecurity.āĀ
Throughout the course of the morningās hearing, the OPM's Archuleta took the brunt of the committeeās ire. In particular, Chaffetz peppered Archuleta about why more wasnāt done to protect the OPM's databases.Ā He queried why the OPM did not shut down 11 of its computer security systems upon recommendation last year from the Office of the Inspector General (IG). At the time, the IG said the systems were operating without the agency's certification.
"You didnāt shut down your systems," Chaffetz said. "I want to know why.ā
Archuleta explained that in addition to legacy systems, the OPM has other responsibilities, including payroll and health benefit processing for government employees. Archuleta repeatedly blamed legacy systems, some of which dated back to 1985 and use outdated COBOLĀ programming language, as part of the problem. Such legacy systems, she said, could not be encrypted, for example. Office of Management and Budget (OMB) CIO Tim Scott noted that information-security practices such as data segmentation in databases areĀ much more difficult in legacy systems.
Assistant IG for Audits Michael Esser said critical weaknesses identified in the audits included continued information-security governance issues dating back to 2007, decentralized controls over its systemsāan area, he testified, that has recently improvedāsecurity access and authorization as well as technical controls and tools that have not been used properly.
OPM CIO Donna Seymour, who was hired by Archuleta, said the agency isĀ launching a new architecture system that will implement additional security features. Plus, since learning of the breach, the OPM has instituted two-factor authentication for remote access to its databases and implemented new firewalls with tighter restrictions on access. But, Seymour testified, it takes time to make necessary changes.
OMB's Scott said the federal government must get better at sharing threat data across federal agencies as well as in partnership with private organizations. He also backed a defense-in-depth approach that lines up multiple information-security protections without relying on one silver-bullet solution. āYou have to have a number of different measures,ā he said, āso if that one doesnāt work, thereās another oneā to help. But, he admitted, to the consternation of the committee, the government is āyears and yearsā from a comprehensive solution. He advocated, however, for a triage-like system that prioritizes more sensitive systems.
āWe 're conducting regular cyber-state reviews with agencies,ā Scott said, where solutions such as two-factor authentication, continuous security patching and minimizing the number of system administrators all contribute to what he called āhygiene factors that lead to good cybersecurity.ā
Rep. Matt Cartwright (D-PA) also asked how federal agencies can better leverage their contracts with vendors to improve cybersecurity. Archuleta said the OPM is currently working to ensure that all federal agencies are applying the same standards to contractors, for example. Additionally, Department of the Interior CIO Sylvia Burns said itās important for agencies to ābeef up security contracts and to continuously monitorā them.
āSite inspections are also important,ā OPMās Seymour added. āWe do that.ā She stressed the importance of continuous monitoring. āLooking at a system every three years is not good enough.ā
As for the breach that sparked the hearings, Rep. Glenn Grothman (R-WI) asked if the attackers have been fully rooted out of the OPM systems. Department of Homeland Security Office of Cybersecurity and Communications Assistant Secretary Andy Ozment said, āWe have a joint-interagency task force led by the DHS in conjunction with the FBI and NSA and have worked with the OPM and DoI, and they have assessed the adversary has been fully removed from the networks, but itās extremely difficult to have 100-percent certainty in these cases."
āSo they could be, but you think probably not?ā Grothman asked.Ā
āYes sir.āĀ
Want to watch all the fireworks for yourself? The full hearing is archived here:
photo credit: Cyber Security - Cyber Crime via photopin (license)
![Default Article Featured Image_laptop-newspaper-global-article-090623[95].jpg](https://images.contentstack.io/v3/assets/bltd4dd5b2d705252bc/blt61f52659e86e1227/64ff207a8606a815d1c86182/laptop-newspaper-global-article-090623[95].jpg?width=3840&quality=75&format=pjpg&auto=webp)
