Page 3 - Ft. Huachuca Scout 7-17-15
P. 3
FRIDAY, JULY 17, 2015 The Scout 3A
2I¿FLDOSDUWLFLSDWLRQLQ*LYH7KHPFDPSDLJQQRWDXWKRUL]HG
6-$UHOHDVH veterans transitioning into the civilian has publicized its participation in the in a personal capacity should not use
workplace. The program is similar to the #GiveThem20 online campaign, either official time or Government communi-
The Office of the Judge Advo- “ALS Ice Bucket Challenge” which was through posting on websites or through cations resources in connection with the
cate General has been notified by the a popular fundraising campaign in 2014; social media, it needs to be immediately creation of a video, nor should an indi-
DOD Standards of Conduct Office however, the #GiveThem20 program removed. In addition, although this cam- vidual’s official title, authority or com-
about an online social media campaign does not involve fundraising at this time. paign does not involve fundraising, per- mand be invoked in connection with the
titled”#GiveThem20.” The action is sonnel may still be reminded that the eth- “#GiveThem20” campaign.
supported by, and draws attention to, a Army personnel may not participate ics rules (with very limited exceptions)
national nonprofit organization called in their official capacity in the #GiveT- prohibit Army personnel from officially Lastly, if asked to “tag your friends”
American Corporate Partners. The hem20 online campaign. Although endorsing or appearing to endorse fund- or “like” a fundraising video, Army per-
campaign is online at GiveThem20.org. well-intentioned, participating in the raising for any non-federal entity. sonnel may not include their official po-
The campaign proposes video record- campaign in an official capacity is an im- sition as part of their identity and may not
ing yourself or a group of people doing permissible endorsement of a non-Feder- Participation by Government em- use an official Army website to “tag” or
20 pushups (or some other activity) as a al entity. (See 5 Code of Federal Regu- ployees in the “#GiveThem20” cam- “like” the campaign or fundraising activ-
way to spread support and awareness of lations section 2635.702(c); Joint Ethics paign may be done in a personal, unof- ity. Doing so improperly suggests offi-
Regulation para. 3-209.). If a Command ficial capacity. Employees participating cial Army endorsement of the activity.
OPM announces steps to protect federal workers, others from cyber threats
230UHOHDVH nancial history; and other details. Some the background investigation databases. * Fraud monitoring services beyond
records also include findings from inter- This includes 19.7 million individuals credit files
WASHINGTON, D.C. – U.S. Office views conducted by background inves- that applied for a background investi-
of Personnel Management (OPM) an- tigators and fingerprints. Usernames gation, and 1.8 million non-applicants, The protections in this suite of ser-
nounced July 15 the results of the in- and passwords that background inves- predominantly spouses or co-habitants vices are tailored to address potential
teragency forensics investigation into a tigation applicants used to fill out their of applicants. As noted above, some re- risks created by this particular incident,
recent cyber incident involving federal background investigation forms were cords also include findings from inter- and will be provided for a period of at
background investigation data and the also stolen. views conducted by background inves- least 3 years, at no charge.
steps it is taking to protect those im-
pacted. While background investiga- tigators and approximately 1.1 In the coming weeks, OPM will begin
tion records do contain some million include fingerprints. to send notification packages to these
Throughout this investigation, OPM information regarding mental There is no information at individuals, which will provide details
has been committed to providing infor- health and financial history this time to suggest any mis- on the incident and information on how
mation in a timely, transparent and accu- provided by those that have use or further dissemination to access these services. OPM will also
rate manner. As information has become applied for a security clear- of the information that was provide educational materials and guid-
available and verifiable, the agency has ance and by individuals con- stolen from OPM’s systems. ance to help them prevent identity theft,
updated Congress, the Inspector Gen- tacted during the background in- If an individual underwent a better secure their personal and work-
eral, federal employee representatives, vestigation, there is no evidence that related data, and become more generally
and – most importantly – those that are separate systems that store information background investigation through informed about cyber threats and other
affected. This announcement is the lat- regarding the health, financial, payroll OPM in 2000 or afterwards (which oc- risks presented by malicious actors.
est in this series of updates, and OPM and retirement records of federal person- curs through the submission of forms
will continue to provide additional in- nel were impacted by this incident (for SF 86, SF 85, or SF 85P for a new inves- 2. Helping other individuals who had
formation going forward. example, annuity rolls, retirement re- tigation or periodic reinvestigation), it is other information included on back-
cords, USA JOBS, Employee Express). highly likely that the individual is im- ground investigation forms – Beyond
Background on the intrusion into pacted by this cyber breach. If an indi- background investigation applicants and
OPM’s systems. Since the end of 2013, This incident is separate but related vidual underwent a background investi- their spouses or co-habitants described
OPM has undertaken an aggressive ef- to a previous incident, discovered in gation prior to 2000, that individual still above, there are other individuals whose
fort to upgrade the agency’s cybersecu- April 2015, affecting personnel data for may be impacted, but it is less likely. name, address, date of birth, or other
rity posture, adding numerous tools and current and former federal employees. similar information may have been list-
capabilities to its various legacy net- OPM and its interagency partners con- Assistance for impacted individuals. ed on a background investigation form,
works. As a direct result of these steps, cluded with a high degree of confidence OPM is also announcing the steps it is but whose Social Security Numbers are
OPM was able to identify two separate that personnel data for 4.2 million indi- taking to protect those impacted: not included. These individuals could
but related cybersecurity incidents on its viduals had been stolen. This number include immediate family members or
systems. has not changed since it was announced 1. Providing a comprehensive suite other close contacts of the applicant. In
by OPM in early June, and OPM has of monitoring and protection services many cases, the information about these
OPM announced July 15 the results worked to notify all of these individuals for background investigation applicants individuals is the same as information
of the interagency forensic investiga- and ensure that they are provided with and non-applicants whose Social Secu- generally available in public forums,
tion into the second incident. As previ- the appropriate support and tools to pro- rity Numbers, and in many cases other such as online directories or social
ously announced, in late-May 2015, as tect their personal information. sensitive information, were stolen – For media, and therefore the compromise
a result of ongoing efforts to secure its the 21.5 million background investiga- of this information generally does not
systems, OPM discovered an incident Analysis of background investigation tion applicants, spouses or co-habitants present the same level of risk of identity
affecting background investigation re- incident. Since learning of the incident with Social Security Numbers and other theft or other issues.
cords of current, former, and prospec- affecting background investigation re- sensitive information that was stolen
tive federal employees and contractors. cords, OPM and the interagency inci- from OPM databases, OPM and the De- The notification package that will be
Following the conclusion of the foren- dent response team have moved swiftly partment of Defense (DOD) will work sent to background investigation appli-
sics investigation, OPM has determined and thoroughly to assess the breach, with a private-sector firm specializing cants will include detailed information
that the types of information in these re- analyze what data may have been sto- in credit and identity theft monitoring to that the applicant can provide to indi-
cords include identification details such len, and identify those individuals who provide services such as: viduals he or she may have listed on a
as Social Security Numbers; residency may be affected. The team has now background investigation form. This
and educational history; employment concluded with high confidence that * Full service identity restoration information will explain the types of
history; information about immediate sensitive information, including the So- support and victim recovery assistance data that may have been included on the
family and other personal and business cial Security Numbers (SSNs) of 21.5 form, best practices they can exercise to
acquaintances; health, criminal and fi- million individuals, was stolen from * Identity theft insurance protect themselves, and the resources
* Identity monitoring for minor chil-
dren See 230, Page 7A
* Continuous credit monitoring