State Department officials revealed over the weekend that their non-classified email system was breached in late October, around the same time White House emails were also compromised by hackers.
Rep. Elijah Cummings, the ranking Democrat on the House Committee on Oversight and Government Reform, wants more information about the incident, sending a letter Monday to Secretary of State John Kerry.
“The increased frequency and sophistication of cyberattacks on both public and private entities highlights the need for greater collaboration to improve data security,” Cummings wrote to Kerry. “The State Department’s knowledge, information, and experience in combating data breaches will be helpful as Congress examines federal cybersecurity laws and any necessary improvements to protect sensitive consumer and government financial information.”
Cummings set a Jan. 5 deadline for Kerry to send him information about the attack, how it happened and what kind of stepped-up security is now in place to prevent a re-occurrence.
Government officials have said they believe the hacking originated in China or Russia.
Below is the text of Cummings’ letter to Kerry.
I am writing to request additional information about an apparent cyber-attack against the State Department that was reported this weekend.[1] Press accounts report that, as a result of this suspected attack, the State Department was forced to shut down “its entire unclassified email system as technicians repair possible damage from a suspected hacker attack.”[2]
I would like to thank your staff for agreeing to provide a briefing on this cyber-attack in the near future.
The increasing number of cyber-attacks in both the public and private sectors is unprecedented and poses a clear and present danger to our nation’s security. For example, USA Today recently ran a front-page story reporting that 500 million records have been stolen from various financial institutions as a result of cyber-attacks over the past year, according to federal law enforcement officials. The report stated:
Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.[3]
The report also explained that law enforcement officials believe the “U.S. financial sector is one of the most targeted in the world.”[4]
Large companies such as Home Depot, Target, Kmart, and Community Health Partners—one of the nation’s largest hospital chains—have also been the victims of cyber-attacks in the past year.[5]
Federal contractors have also been targeted, including USIS, the nation’s largest private provider of federal background investigations. USIS’s network was penetrated in August, compromising the personal information of tens of thousands of federal employees. During a hearing before our Committee in September, the director of the U.S. Computer Emergency Readiness Team testified that malware attacks are “very frequent” and “happen every day across the globe on the Internet.”[6]
The increased frequency and sophistication of cyber-attacks upon both public and private entities highlights the need for greater collaboration to improve data security. The State Department’s knowledge, information, and experience in combating data breaches will be helpful as Congress examines federal cybersecurity laws and any necessary improvements to protect sensitive consumer and government financial information.
For these reasons, I request that the State Department provide the following information:
(1) a description of the cyber-attack, including the date and the manner in which it was first discovered, the dates the attack is believed to have begun and ended, and the actions you took after learning of this attack;
(2) the types of data breached, the number of employees and others potentially affected, the manner in which employees and others were notified of the breach, and the scope of any adverse actions that resulted from the breach;
(3) the findings from forensic investigative analyses or reports concerning the breaches, including findings about vulnerabilities to malware, the use of data segmentation to protect Personally Identifiable Information (PII), and why the breach went undetected for the length of time it did;
(4) a description of data protection improvement measures the State Department has undertaken since discovering the breaches;
(5) a description of the data security policies and procedures that govern your relationships with vendors, third-party service providers, and subcontractors, including the manner by which you ensure that entities performing work on your behalf have reasonable data security controls in place to thwart cyber-attacks; and
(6) any recommendations for improvements in cybersecurity laws or the coordination of efforts to identify and respond to emerging trends in cybersecurity risks to help prevent future data breaches.
Please provide the requested information by January 5, 2015. If you have any questions about this request, please contact Timothy D. Lynch at (202) 225-0312 (202) 225-0312.