State Department, VA disclose two new data breaches
One affects passport applicants, the other, VA patients
Computerworld - Two federal agencies that have already drawn attention this year for data security breaches are back in the spotlight again -- for the same reason.
One of them is the U.S. Department of State, which last week disclosed that it had notified close to 400 individuals that the data they had submitted with their passport applications had been stolen in a database intrusion (download PDF).
And last Saturday, the U.S. Department of Veteran's Affairs (VA) said that one of its medical centers in Oregon had accidentally posted personal data on about 1,600 patients on its public Web site.
The breach at the State Department occurred in March at around the same time the agency disclosed that some of its contractors had illegally snooped on passport records belonging to Sen. Barack Obama (D-Ill.), Sen. John McCain (R-Ariz.) and other high-profile citizens, according to a spokeswoman.
That disclosure triggered a review of the security controls protecting the State Department's Passport Information Electronic Records System (PIERS), which contains records on 192 million passports for 127 million people. An Inspector General's report (download PDF) was released in July and identified "many control weaknesses" -- including a general lack of policies, procedures and training for protecting passport data at the State Department. The report noted that there were about 20,500 users with active PIERS accounts as of May, with about 12,200 of them being employees or contractors at the department.
According to a State Department spokeswoman, 383 records were illegally accessed by a State Department employee. That worker has since been terminated, the spokeswoman said. All of those who were affected by the incident have been notified by the department and have been offered one year's worth of free credit monitoring. The notifications were sent out in two batches, with the first set going out on July 10 and the second on Oct. 6.
When asked how the agency discovered the breach and why it took so long to notify affected individuals, the spokeswoman cited a previous explanation of the events by Sean McCormack, another spokesman at the agency. McCormack said the department learned of the breach at around the same time the snooping incidents were disclosed publicly, but offered no further details.
According to The Washington Post, the State Department was tipped off to the intrusion in March by police officers in Washington who discovered nearly two-dozen credit cards and printouts of eight passport applications during the search of a car that was stopped for having excessively tinted windows. Four of the names on the credit cards matched four of the names on the passport applications, leading police to conclude the passport information had been stolen for identity theft purposes.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- 10 Things Your Next Firewall Must do Next-Generation Firewalls Defined
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have. All Privacy White Papers | Webcasts