Home
/
RELIGION & LIBERTY ONLINE
/
Cyber Hack Affected 1 in 15 Americans
Cyber Hack Affected 1 in 15 Americans
Jan 26, 2026 6:05 PM

Last month the Office of Personnel Management (OPM) announced that because of a cybersecurity breach, the records of 4 million citizens had been stolen by unknown hackers. Yesterday, the OPM released its official damage assessment, and it turns out the number is much, much larger: 21.5 million, or 1 in every 15 Americans.

Despite the colossal failure, OPM Director Katherine Archuleta told reporters she will not resign and won’t fire her chief information officer. In fact, the Obama Administration doesn’t seem to be holding anyone—other than the perpetrators—responsible for a leak that exposed even the records of the FBI Director James Comey. (UPDATE: Today, Archuleta decided that she will resign after all.)

“I’m sure the adversary has my SF-86 now,” said Comey. “My SF-86 lists every place I’ve ever lived since I was 18, every foreign travel I’ve ever taken, all of my family, their addresses. So it’s not just my identity that’s affected. I’ve got siblings. I’ve got five kids. All of that is in there.”

Here is what you need to know about what some have called the “cyber Pearl Harbor.”

What is the “OPM hack”?

The “OPM hack” refers to a massive data breach in which hackers, believed to be based in China, acquired personnel records of federal employees from the Office of Personnel Management (OPM).

What is the OPM?

The OPM (Office of Personnel Management) serves as the human resource department for the federal government. Among other duties the agency conducts background investigations for prospective employees, issues security clearances, piles records of all federal government employees.

How many records were stolen?

The OPM said that 21.5 million employees, both current and past employees, have been affected.

The exact amount of data stolen, however, may be unknowable since, according to one U.S. official, “OPM officials and other authorities still don’t have a good handle on how much information was actually stored by OPM in the first place.”

What type of records were stolen?

Some of the records stolen were the Questionnaire for National Security Positions form, known as the SF-86 form. The 126-page form contains a plethora of information about an individual, including their Social Security number, birthdate, addresses, passport information, financial information, previous employment activities, connections to foreign nationals, etc.

When did the data breach occur?

The OPM, which publicly acknowledged the hack this week, says the agency identified a cybersecurity incident” two months ago affecting its information technology (IT) systems and data. But according to ABC News, the hackers had access to the government databases for more than a year before they were detected.

How could the data be used?

As Kim Zetter and Andy Greenberg of Wired explain, federal background checks are meant to suss out information that might be used by foreign enemies to blackmail a government staffer into turning over classified information.

Ken Ammon, chief strategy officer for a cyber security firm, told the BBC the hacked data could be used to impersonate or blackmail federal employees with access to sensitive information.

And as former counterintelligence officer John R. Schindler says,

Whoever now holds OPM’s records possesses something like the Holy Grail from a [counterintelligence] perspective. They can target Americans in their database for recruitment or influence. After all, they know their vices, every last one — the gambling habit, the inability to pay bills on time, the spats with former spouses, the taste for something sexual on the side (perhaps with someone of a different gender than your normal partner) — since all that is recorded in security clearance paperwork.

Do you have friends in foreign countries, perhaps lovers past and present? They know all about them. That embarrassing dispute with your neighbor over hedges that nearly got you arrested? They know about that too. Your college drug habit? Yes, that too. Even what your friends and neighbors said about you to investigators, highly personal and revealing stuff, that’s in the other side’s possession now.

What does the government plan to do about the data breach?

The OPM will be offering identity theft monitoring for those who have been affected. According to an OPM press release:

In order to mitigate the risk of fraud and identity theft, OPM is offering credit report access, credit monitoring and identify theft insurance and recovery services to potentially affected individuals through CSID®, pany that specializes in these services. prehensive, 18-month membership includes credit monitoring and $1 million in identity theft protection services at no cost to enrollees.

Additionally, the U.S. government is preparing to order the first round of sanctions against foreign entities or individuals involved in hacking, in what will be the first test of the government’s newest tool in cyber deterrence.

Comments
Welcome to mreligion comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
RELIGION & LIBERTY ONLINE
The soul of civil society
Bob Woodson of National Center for Neighborhood Enterprise fame taught me a lot about strategic partnerships. In the interest of getting something important done for needy people, it’s ok to invite others with good contributions to make to join you, despite disagreements with them on other issues. Good advice. And on the 50th anniversary of Dr. Jonas Salk’s vaccine and Dr. Albert Sabin’s oral polio vaccine, Rotary International demonstrates an impressive strategic partnership with the Global Polio Eradication Initiative, partnering...
‘The least natural of loves’
C.S. Lewis calls “Friendship” the “least natural of loves; the least instinctive, organic, biological, gregarious and necessary.” Head on over to Mere Comments to see my response to “Walking With Friendships.” ...
What do you call this?
From Live Science, there are plans to create a pseudo-woolly mammoth from frozen DNA. The trick is to take the male sperm DNA from a woolly mammoth sample and the egg from its closest living relative, the elephant. “By repeating the procedure with offspring, a creature 88 percent mammoth could be produced within fifty years.” Such a creature is technically a chimera, “an organism or tissue created from two or more different genetic sources.” This usage is related to the...
Nigeria fights corruption
For those concerned about the way corruption hinders development in Africa, a hopeful story in the Wall Street Journal today (subscription required). Here’s one paragraph: “Since taking charge of the new Economic and Financial Crimes Commission, Mr. Ribadu has pursued oil mobsters, Internet fraudsters and corrupt politicians. The former street cop has 185 active fraud and corruption cases working their way through the courts, up from zero before mission started its work two years ago. Working in the capital of...
A costly good
In the words of the Cornwall Declaration, “A clean environment is a costly good.” A round-up of recent stories attests to the truth of this statement. Wal-Mart pledged on Tuesday to provide $35 million for use to protect wildlife habitat. Wal-Mart can afford to use this money to “buy an amount of land equal to all the land its stores, parking lots and distribution centers use over the next 10 years” in part because of its economic success, topping the...
‘With God all things are possible’
Matthew 19:23-26 (New International Version) Then Jesus said to his disciples, “I tell you the truth, it is hard for a rich man to enter the kingdom of heaven. Again I tell you, it is easier for a camel to go through the eye of a needle than for a rich man to enter the kingdom of God.” When the disciples heard this, they were greatly astonished and asked, “Who then can be saved?” Jesus looked at them and said,...
Saul Bellow’s Henderson the Rain King
Saul Bellow died last week at the age of 89. He wrote the novel that was most influential and deeply important in my life, Henderson the Rain King. In this book, Bellow engages the hollow atheism at the heart of the modern secular world. Beginning as a larger-than-life American millionaire in a society bereft of meaning, Eugene Henderson embarks on a spiritual journey to find purpose in his life. After many misadventures, Henderson finally arrives at a point where he...
Taxes and tuition: families squeezed by rising costs of religious education
136 Catholic schools were closed nationwide in 2004, even as the Catholic population in the United States has been rising. Kevin Schmiesing writes that “the economic bind that religious schools and their students increasingly find themselves in highlights an injustice at the heart of American education.” Read the full text here. ...
What is the legacy of Pope John Paul II?
When asked about the legacy of Pope John Paul II, Prof. Gregory R. Beabout responds “that the life and legacy of John Paul II is best understood in light of the history and culture of Poland.” The important distinctions between nation and state, culture and government, were operative both in Polish history as well as in the life of Karol Wojtyla. Read the full text here. ...
A book the next pope should read
What one book would you send to the next pope to read? William Rees-Mogg has decided what his “inaugural present” would be: The Wealth of Nations by Adam Smith. ...
Related Classification
Copyright 2023-2026 - www.mreligion.com All Rights Reserved