
The US Army as a member of Allied Including Britain and Canada landed on the coast of Normandy in France and the D - 62 anniversary of June 6, 1944, when many of France and Europe were released from the fortress, all US military There is no better time than memorizing the sacrifice of members and their families. And such a sacrifice not only respects the memories of the US government and the people but also assures the safety of the most important information in absolute duty while serving the military A veteran who should remind you of something.
However, all the US veterans were exiled from the fact that the most important personal information of the veteran office they learned just before the Memorial Day in 1975 was stolen and still remained in the public domain. On May 22, 2006, according to the report of veterans secretary, some of the service members and their spouses whose names such as telephone number and address, birth date, social security number were stolen by 26.5 million cases , The total amount of information and the number of other service members were not included. Information discovered after that
Everything began on May 3, 2006, when a 30 - year advanced information technology expert at Office of Better 's Affairs (VA) was in breach of security procedures . He brought back a laptop computer belonging to VA. He was working on an annual survey of veterans. Demographics. It was also revealed that it is unknown to his supervisor that he was doing such things for three years, including downloading unencrypted information from his home.
The laptop contained a hard drive with information and had a house computer disk and a flash memory stick. Employees reported to the local Montgomery County Police immediately after theft of Deputy Director Michael H. McClendon declared home of Aspen Hill, MD. Law enforcement offenses the theft, but the impact of theft represents the discarding of the largest identity card containing social security number in either the public or private sectors in the US history.
Also, the timeline of the Virginia state commander has been documented for at least 5 years, only the suspicious and gentle basic security criticism of Virginia increased. On May 5, 2006, Dennis M. Duffy served as a deputy secretary for policy planning and preparation and told about theft. On May 9, 2006, Duffy informed VA's chief, staff, Thomas Bowman, a senior management suggested to the veterans that infringement of information security was infringed. However, Bowman notified Vice Minister Gordon Mansfield, the second public servant of VA, until May 10, 2006. Both Duffy and Mansfield did not advise Secretary Nicholson until May 16, 2006.
On May 25, 2006, attended the regular meeting of the House of Representatives, the Senate Veteran's Committee, the VA Inspector and Governor who testified by the Senate Homeland Security and Government Affairs Chairman, George Opfer VA Central Office, and VA's Another information security official who could have stolen the employee's home and possibly have stolen VA's electronic records said, "he said. Information is also similar.
IG Opfer began criminal investigation on May 12, 2006, and was investigated on May 15, 2006. The local police had been conducting a theft investigation since May 3, 2006, but until Federal Bureau of Investigation (FBI) May 17, 2006, Nicholson has not been notified the day after the recommendation. Nicholson reported to Chair Alberto Gonzales of Deborah Platt Majoras of the Federal Circuit Court of Appeals (Federal Trade Commission) and Co-Chair of the President's Special Committee on Anti-Theft Measures. And finally, when the official announcement was made on May 22, 2006, I received advice from the US Congress.
Currently, the details of this timeline may seem more information than the information needed, but monitoring information including VA and the command chain that exists in the culture of 235,000 employees And security management dysfunction. Since the first guess of lost information, we have found that there are also lacking additional identification of many other veterans and active employees. This data includes the number of personnel discharged before 1975, persons who requested VA for any number of services, veterans who retired before 1975, veterans who receive medical treatment through VA, participated in a chemical test program for mustard Diagnostic codes relating to World War II veterans' gas, biological weapons, and unidentified veterans.
As of June 6, 2006, active personnel information that had been missing currently includes at least 55,000 at least a second active survey in Iraq, at least 30,000 active duties at the beginning of 1991 Navy personnel who completed the enlistment condition of. However, it is now confirmed that 1.1 million active armies from all troops are at risk of identity theft.
Data analysts were dismissed with full benefits and retirement payments, so McLendon Deputy Minister resigned and Deputy Duffy served as Head of Policy Planning and Preparedness and took administrative leave. Nicholson has served as secretary of VA since 2005 and hires Rick Romley as a new adviser on information security and aid Nicholson to amend VA policies and procedures on information security for more than three months. Romuly is former Arizona state Maricopa County, Arizona lawyer, veteran veteran and former president Republican national president.
The long history of security vulnerabilities within VA has not been reported by many people within the VA offices of Accountability Office (GAO) and Inspector General. And for that reason, it is even more difficult for parliamentarians. "The chronology that you gave to us is totally confused and I can not think that there was such a long delay." Susan Collins Senate Chairman of the Senate Homeland Security and Government Armed Forces Congressman (R Main) testified before the committee on 25 May of IG Opfer.
Senator Collins In light of other opportunities last year when her and her committee reaffirmed this phrase, Michael Brown, former president of the Federal Emergency Management Agency (FEMA) Other bureaucratic misunderstandings during the testimony of Hurricane Katrina during the hearing on the Foreign Investment Commission (CFIUS) in the United States, advising all members of the Council of the Dubai Government's specific US port purchase approval Without giving,
Virginia was among the eight institutions granted failure grade for computer security practice in 2005 by GAO. However since 2001 the President of the VA Inspector has informed the VA that information access control is virtually insufficient and substantial and serious vulnerability has occurred and remains unmodified.
Since such vulnerability can not encrypt electronically transmitted files or files placed on disk, permission to access information by unauthenticated person is one of VA security breaches It is much simpler than thinking. Also, the Federal Privacy Protection Policy is based on the Privacy Act of 1974 and the Federal Information Security Management Act of 2002, but even though the law is still pending, employees will comply with policies and procedures is needed.
Due to the interconnectivity of large federal agencies, more diligence is needed to protect data and computer systems. Actually, the employee who had the laptop had not reported the theft, so there would not be a way for VA to know infringement of the information. However, given the unique policies of each agency on data protection, actual differences are broad. The Senate is seeking to request such data protection not only for agencies but also for federal government, as well as for notification of infringed information. Such notifications are currently required only for competent states as well as for the financial industry or data credit brokers.
However, it is important to note the other cases of security breaks within the VA during the last few years. In April 2006, it turned out that military computers including personnel records were sold in a bazaar outside the US military base in Afghanistan. In September 2005, thieves collect personnel information on soldiers deployed from Fort Carson, CO. In December 2002, records of more than 560,000 troops, veterans and dependents were stolen from Arizona medical institutions' computers. All such data was stored in an unencrypted database. In addition, physical identity cards and identification cards of military personnel are stolen from outside the VA and non-military soldiers.
The cost of setting up the system to notify the soldier may be needed again if the soldier helps access credit reports and identity theft becomes a problem and lost credit and loss of identity occurs. $ 25 million and $ 100 million. Unfortunately, funding will come from veterans' budgets. Under the 2007 pending law, the allocation amount required to build hospitals and new clinics in the next 5 years is less than $ 8 billion. There are already nearly 20,000 injured people since the war in Iraq and at this time it is impossible to reduce the budget in Virginia.
The abundance of VA bread is much clearer than the stolen credit card number. Usually, the victim only cancels the credit card account. However, due to the loss of birthdays and social security numbers, thieves can continue to borrow money, withdraw money, open additional credit card accounts, as well as their own assets. In addition, non-legal US legal status can be undertaken by theft of one social security number.
Nicholson Secretary General later instructed all VA staff to complete the annual VA cyber security enlightenment course and general employee privacy awareness raising course by June 30, 2006. He signed the Annual Employee Pledge on all VA staff, the VA will immediately inventory, review all current positions that need to access confidential information and require access to confidential information I instructed people to perform their duties to receive the latest background investigation.
Sadly, these measures have followed everything. And now, due to our present and fallen heroes, there is little consensus in the second half.
Copyright © 2006 Diane M. Grassi

EmoticonEmoticon