Language Selection

English French German Italian Portuguese Spanish

FDIC latest to fall victim to theft of employee data

Filed under
Security

In a letter to current and former FDIC workers obtained by GCN, Arleas Upton Kea, director of the agency's administration division, said that in early 2004 someone accessed current and former employee personal data without authorization. That data includes name, date of birth, salary, Social Security number and length of service.

Officials discovered the problem in March and sent letters to those affected. In the subsequent investigation, the FBI found that data of all FDIC employees and former employees has been stolen. The FBI, which would not comment on the investigation, alerted FDIC June 9, and Kea sent the letter June 10.

FDIC's inspector general also is investigating the crime. "The case still is under investigation," said a FDIC spokesperson. "There is not a lot we can say at this point."

The spokesperson confirmed that no one hacked into the agency's system but wouldn't say how the data was stolen except that it was not similar to the Bank of America situation in February. Bank of America lost back-up tapes containing data on 1.2 million federal employees.

FDIC is asking former and current employees to check their credit reports over the next 12 to 24 months for suspicious activity.

News of FDIC's security breach comes as Congress is considering a number of laws that would require immediate notification when personal data is lost. Sen. Dianne Feinstein (D-Calif.), a sponsor of one of those bills, testified yesterday before the Senate Commerce Committee.

Feinstein told the committee that "data breaches and identity theft [are] national problems that require a federal solution. One strong notification standard is what we need, not a patchwork of state laws like we are beginning to see in California, Arkansas, Georgia, Indiana, Montana, North Dakota and Washington state."

The senator's bill would require federal agencies and private-sector companies to notify individuals "without unreasonable delay" if their personal data is lost or stolen, unless law-enforcement officials say it would impede their investigation.

Along with Feinstein, Sen. Charles Schumer (D-N.Y.) and Rep. Ed Markey (D-Mass.) are among those who have introduced identity theft bills over the past few months.

Source.

More in Tux Machines

Intel Pentium vs. AMD Ryzen 3 Performance For Linux Gaming

For those that may be looking to assemble a new low-end Linux gaming system in early 2018, here is a look at the Linux gaming performance of an Intel Pentium (Kabylake) processor to an AMD Ryzen 3 while testing with the GeForce GTX 1050 and Radeon RX 560 graphics cards. Read more

Containers, the GPL, and copyleft: No reason for concern

Though open source is thoroughly mainstream, new software technologies and old technologies that get newly popularized sometimes inspire hand-wringing about open source licenses. Most often the concern is about the GNU General Public License (GPL), and specifically the scope of its copyleft requirement, which is often described (somewhat misleadingly) as the GPL’s derivative work issue. One imperfect way of framing the question is whether GPL-licensed code, when combined in some sense with proprietary code, forms a single modified work such that the proprietary code could be interpreted as being subject to the terms of the GPL. While we haven’t yet seen much of that concern directed to Linux containers, we expect more questions to be raised as adoption of containers continues to grow. But it’s fairly straightforward to show that containers do not raise new or concerning GPL scope issues. Read more

Get ready to use Linux containers

One of the most exciting things to happen in the Linux world in the past few years is the emergence of containers — self-contained Linux environments that live inside another OS and provide a way to package and isolate applications. They're not quite virtual systems, since they rely on the host OS to operate, nor are they simply applications. Dan Walsh from Red Hat has said that on Linux, "everything is a container," reminding me of the days when people claimed that everything on Unix was a file. But the vision has less to do with the guts of the OS and more to do with explaining how containers work and how they are different than virtual systems in some very interesting and important ways. Read more

Samsung unveils 860 PRO and EVO SATA SSDs with improved Linux compatibility

If you haven’t yet upgraded your operating system drive from a mechanical hard disk to a solid state drive, you are really missing out. Prices have dropped dramatically over the years, while at the same time, reliability has improved. Swapping an HDD for an SSD can be very easy too, thanks to cloning software that often comes with the drive. Before you buy some random SSD, please know that they are not all the same. True, SATA models largely have equal speeds these days, but the brand really matters from a reliability standpoint. If you want a dependable solid state drive for your data, you should take a look at Samsung. Its offerings are top notch, and today the company launches its newest SATA models -- the 860 PRO and EVO. Read more