Hackers Took Fingerprints of 5.6 Million U.S. Workers, Government Says

WASHINGTON — Just a day before the arrival of President Xi Jinping here for a meeting with President Obama that will be focused heavily on limiting cyberespionage, the Office of Personnel Management said Wednesday that the hackers who stole security dossiers from the agency also got the fingerprints of 5.6 million federal employees.

The attack on the agency, which is the main custodian of the government’s most important personnel records, has been attributed to China by American intelligence agencies, but it is unclear exactly what group or organization engineered it. Before Wednesday, the agency had said that it lost only 1.1 million sets of fingerprints among the records of roughly 22 million individuals that were compromised.

video Xi Jinping Addresses U.S. ConcernsSEPT. 23, 2015
Pentagon Says Chinese Pilot Flew Too Close to U.S. Spy PlaneSEPT. 23, 2015
President Xi Jinping and his wife, Peng Liyuan, in Washington on Tuesday.Xi Jinping Pledges to Work With U.S. to Stop CybercrimesSEPT. 22, 2015
Katherine Archuleta, director of the Office of Personnel Management, right, at hearing before the House Oversight and Government Reform Committee last month.Hacking of Government Computers Exposed 21.5 Million PeopleJULY 9, 2015
Network specialists at the Department of Homeland Security’s National Cybersecurity and Communications Integration Center in Arlington, Va., during an unclassified tour for members of the news media last week. Classified information was excluded from screen displays.U.S. vs. Hackers: Still Lopsided Despite Years of Warnings and a Recent PushJULY 18, 2015
President Obama in Washington this month. The data breach is the third major foreign intrusion into an important federal computer system in the past year. In an earlier attack, some of the president’s unclassified emails were apparently obtained by intruders.Hacking Linked to China Exposes Millions of U.S. WorkersJUNE 4, 2015
The home of the Office of Personnel Management headquarters in Washington. The Obama administration has decided that it must retaliate against China for the theft of personal information from the office.U.S. Decides to Retaliate Against China’s HackingJULY 31, 2015
“Federal experts believe that, as of now, the ability to misuse fingerprint data is limited,” the agency said in a written statement. But clearly the uses are growing as biometrics are used more frequently to assure identity, in secure government facilities and even on personal iPhones.

The working assumption of investigators is that China is building a huge database of information about American officials or contractors who may end up entering China or doing business with it. Fingerprints could become a significant part of that effort: While a Social Security number or a password can be changed, fingerprints cannot.

Customs and immigration officials frequently fingerprint incoming travelers; millions of fingerprints in a Chinese database would help track the true identities of Americans entering the country.

“I am assuming there will be people we simply can’t send to China,” a senior intelligence official said this summer, before the most recent revelation. “That’s only part of the damage.”

The agency said that an “interagency working group,” with help from the F.B.I., the Department of Homeland Security and the intelligence agencies, “will review the potential ways adversaries could misuse fingerprint data now and in the future.”

One of the biggest concerns about the breach of personnel records has been that China, or any other states given access to the data, could use it to identify intelligence agents, defense personnel or government contractors. Other data on the forms that were obtained, about matters as varied as bankruptcies and personal and sexual relationships, could be used for blackmail.

Democratic and Republican lawmakers have been unsparing in their criticism of the personnel agency’s handling of the data breach and its aftermath — and its habit of periodically revising upward the amount of information that was lost. Government officials have not been able to explain publicly why it took more than a year to discover that information was leaving its systems at a tremendous rate.

Senator Mark Warner, Democrat of Virginia, said in a statement on Wednesday that “the massive new number of employees’ fingerprints that was breached is shocking.” He continued, “And it does little to instill confidence in O.P.M. that it took them so long to detect that the number was so much larger than originally thought.”

He called for “lifetime identity protection coverage” for the affected employees and contractors. But that assumes there was a financial motive to the theft; officials say it seems more likely that it was a national security motive.

In testimony to a House committee recently, the director of the National Security

In testimony to a House committee recently, the director of the National Security Agency, Adm. Michael S. Rogers, said it had seen no evidence that the data lifted from the O.P.M. over more than a year had been used for any financial purpose, like gaining access to bank accounts or credit cards.

During Mr. Xi’s visit to Washington, he and Mr. Obama are expected to announce, at a minimum, that they are working on a set of rules for cyberspace that would amount to a first effort at a digital arms control agreement. But that would not cover traditional espionage, which both sides conduct against each other. So the theft of personnel files, which the administration has never publicly blamed on China, would not be covered.

In fact, the director of national intelligence, James R. Clapper Jr., said over the summer that if the United States had the opportunity to steal that much data about an adversary, it would probably try to do it. And testifying to Congress alongside Admiral Rogers recently, he pushed back at members of Congress who called the breach at O.P.M. an “attack.” Instead, he suggested, it was ordinary espionage.

But despite those public statements, several officials have said in background briefings that the scale of the breach was so vast that it might require some kind of government response. Hackers did not just get the data on federal employees, but also on job applicants, contractors and many others who have been subjected to government background checks.

“It was so big,” one senior intelligence official said, “that we have to ask the question of whether the scope of it changed the nature of the theft.”

Although Mr. Obama has hinted at sanctions against China, largely for intellectual property theft, the administration has decided to put off the decision until after Mr. Xi’s visit.

Ahead of the meeting with Mr. Xi, administration officials have been coy about what form, and how extensive, any effort to come up with common rules for cyberspace may take. “I don’t want to suggest that we reached an arms control agreement here,” Benjamin J. Rhodes, a deputy national security adviser, said on Tuesday in a briefing to reporters about Mr. Xi’s visit.

“But I do want to suggest that ultimately the goal here is we start from a common understanding that you have agreed-upon principles which we believe must include that cybertheft does not go forward. And then as the two largest economies in the world, I think we can lead an effort to develop international norms that govern cyberactivity.”

But he emphasized that America’s main concern was the theft of intellectual property that is used by an adversary for commercial purposes. The breach does not fit into that category, and Mr. Obama has not said exactly how he would respond to it.

Testing iPhone 6s’s 3D Touch and Live Photos Features

NOW that smartphones can do more than a million different things with apps, you have to wonder whether it matters when Apple adds two main new features to its latest iPhones. The answer, to cut to the chase, is yes. That’s because when Apple incorporates new smartphone capabilities, the features may become widely used by … Continue reading

IPhone 6s’s Hands-Free Siri Is an Omen of the Future

The headline feature in Apple’s latest smartphones, the iPhone 6s and 6s Plus, is something called 3D Touch, which lets you activate shortcuts on the phone by pressing a bit harder on the screen. For now, though, I found a less novel, but far handier feature in the new iPhone — one that has long … Continue reading

Apple Presses Ahead With Efforts to Create Car, Though Big Issues Remain

Apple is continuing its efforts to create a car, though some of the big questions around the project remain undecided. The company is still working out whether it will make a self-driving car, an electric vehicle or a combination of the two, according to a person with knowledge of the product, who spoke on the … Continue reading

Investors flee the stock market with speed

These days, the favorite word of investors is to “sell”. Common investors in the United States are getting rid of investments to prefer cash at levels not seen since the financial crisis of 2008. It is a “rebellion of investors”, as he called it Credit Suisse. When investors panicked by the stock market crash, they sell shares … Continue reading

Avoid falling into scams circulating on WhatsApp

In recent months, WhatsApp users are receiving messages that offer discounts of up to 500,000 pesos in shops like Starbucks and Zara. However, as Kaspersky and ESETsecurity companies, determined that it is a fraudulent campaign to collect informationfrom users. (See also: new threat of WhatsApp circulates in the form of bonusdiscount). The cybercriminals tactic is to … Continue reading

Learn how to spot if your mobile phone is ‘infected’ with malware

If you have recently noticed that your Smartphone works slower, consumes moreenergy than usual or have installed applications that were never authorized, yourcomputer could be infected with some type of malware. The popularity of mobiledevices have acquired over the past years has led to that the attention ofcybercriminals pose on this type of device, which … Continue reading

Do you need a driver chosen tonight? These ‘apps’ will help you

Gracias al rápido avance de la tecnología hoy en día es posible encontrar diferentes aplicaciones móviles que le permitirán solicitar conductor elegido. Esta semana en tutoriales queremos mostrarle tres herramientas que le ayudarán a entregar las llaves con gran comodidad, y llegar a casa seguro y sin poner en riesgo a nadie. Alianza por la … Continue reading

Nuevos dispositivos de Apple

iPhones con toque 3D Apple ha llegado con algunos términos para describir las nuevas características de pantalla táctil sensible a la presión sobre el iPhone 6 y iPhone 6S adorables Plus. Cuando pulsa la pantalla táctil 3D, se obtiene un “vistazo” a lo que está sucediendo en una aplicación o correo electrónico.Por ejemplo, presione hacia … Continue reading

Cómo escoger la contraseña perfecta

Los hackers han conseguido descodificar contraseñas encriptadas más de 11 millonesrobadas desde la Web de Ashley Madison, brilla nueva luz sobre la importancia de laseguridad de contraseña. El martes, la agencia del gobierno de Reino Unido GCHQpublicó nuevas directrices de contraseña diseñado para “mejorar la seguridad,mejorando la usabilidad de los sistemas”. Su informe había cuestionado … Continue reading