The Washington Post

Federal workers respond to hacking of OPM network

(Reuters/Kacper Pempel) (Kacper Pempel/Reuters)

Department of Homeland Security officials confirmed Thursday that hackers may have breached the Office of Personnel Management’s network, which contains personal information about federal employees and other potentially sensitive data.

A DHS official told The Washington Post that agencies have not yet found “any loss of personally identifiable information.”

Interestingly, OPM doesn’t appear to have notified federal employees about the attack. Among 15 employees approached by The Post on Thursday, none could recall an announcement from the government, although some wondered whether they had missed an e-mail about the breach at some point.

“We haven’t heard officially,” said Takoma Park resident Suzanne Pilsk, a Smithsonian Institution librarian. She added that she learned of the issue through a Post article.

Similarly, Rosie Delaney, a Crofton resident and IT specialist for the Environmental Protection Agency, said she doesn’t remember the government sending an alert. “They’re really good about notifying us when things happen, so I probably was notified, but I get so many e-mails that it’s easy to miss something,” she said.

The government publishes certain details about its employees, such as their names, job titles and salaries, all of which is public information under the law. But some workers are worried that hackers may access more-sensitive personal data.

“I am concerned that Social Security numbers could be released, but from what I’ve read so far, it seems like that hasn’t happened,” Pilsk said.

Smithsonian librarian Alvin Hutchinson, a D.C. resident, said he is primarily concerned about potential financial loss and the extent of his legal liability if hackers use his personal information to commit fraud. But he also said he has grown accustomed to hacking threats.

“I’m not terribly afraid, because I’m sort of numb to this,” Hutchinson said. “You hear about data breaches and privacy invasions all the time. I’d like to say that I’m skittish about it, but it just happens so much.”

Pilsk expressed confidence that the government is dealing effectively with cybersecurity threats. “I know there’s a lot of infrastructure in place to protect data,” she said. “I know it’s a concern, but I feel like they’re trying their best.”

Other workers questioned whether the government can always guarantee protection against constantly evolving threats. “It’s sort of an arms race,” Hutchinson said. “Any measures the government could take to provide greater security for our data is going to be met with some innovation by hackers to get around it.”

Josh Hicks covers Maryland politics and government. He previously anchored the Post’s Federal Eye blog, focusing on federal accountability and workforce issues.



Success! Check your inbox for details. You might also like:

Please enter a valid email address

See all newsletters

Show Comments
Most Read



Success! Check your inbox for details.

See all newsletters

Your Three. Videos curated for you.
Play Videos
Sleep advice you won't find in baby books
In defense of dads
Scenes from Brazil's Carajás Railway
Play Videos
For good coffee, sniff, slurp and spit
How to keep your child safe in the water
How your online data can get hijacked
Play Videos
How to avoid harmful chemicals in school supplies
Full disclosure: 3 bedrooms, 2 baths, 1 ghoul
How much can one woman eat?
Play Videos
What you need to know about Legionnaires' disease
How to get organized for back to school
Pandas, from birth to milk to mom
Next Story
Josh Hicks · July 10, 2014

To keep reading, please enter your email address.

You’ll also receive from The Washington Post:
  • A free 6-week digital subscription
  • Our daily newsletter in your inbox

Please enter a valid email address

I have read and agree to the Terms of Service and Privacy Policy.

Please indicate agreement.

Thank you.

Check your inbox. We’ve sent an email explaining how to set up an account and activate your free digital subscription.