US personnel chief quits after first refusing to leave office following massive data breach that saw hackers download 21.5 MILLION social security numbers and even finger prints

  • Katherine Archuleta initially said she had no plans to resign
  • She was in charge when details including social security numbers, employment history, health, criminal and financial history were hacked
  • It was 'separate but related to' incident in April, affecting 4.2 million
  • There were bipartisan calls for Obama to 'take stand against incompetence'
  • Most of the files accessed in May were from background checks on people who applied for jobs with the government, or on their spouse or partner 
  • At least 1.1 million of the stolen records included fingerprints  
  • White House 'not really prepared to comment' on whether it was China  

America's personnel chief has quit after first refusing to resign over the news that hackers stole the personal information of 21.5 million people on her watch.

Katherine Archuleta, director of the Office of Personnel Management (OPM), initially dismissed calls for her to leave office, insisting she planned to help resolve the extraordinary oversight.

She was in charge when social security numbers, health histories and even finger prints were downloaded from the OPM database in May. It was just a month after another massive breach affecting 4.2 million federal employees. 

Finally, on Friday afternoon, the White House caved to bipartisan calls for the president to 'take a strong stand against incompetence' by letting Archuleta go. Obama appointed her in 2013.

House Speaker John Boehner, Majority Leader Kevin McCarthy and Whip Steve Scalise have appealed to President Obama to fire Archuleta and 'take a strong stand against incompetence'.

Katherine Archuleta, who was appointed head of OPM in 2013, has stepped down after the breach emerged

Katherine Archuleta, who was appointed head of OPM in 2013, has stepped down after the breach emerged

The White House initially said there were no plans the remove Archuleta from her position, which she has held since 2013, after waiting a month to share news of the hack with the public. 

However, Michael Daniel, cyber security coordinator for the National Security Council, cryptically told reporters on Friday morning: 'Just because we're not doing public attribution does not mean that we're not taking steps to deal with the matter.'

In a statement released on Thursday, Boehner said: 'After today's announcement, I have no confidence that the current leadership at OPM is able to take on the enormous task of repairing our national security.'

Scalise says the president's response to the security breach has been 'nothing short of breathtaking in its inadequacy.'

McCarthy calls the latest news 'absolutely inexplicable.' 

The files, accessed in May, included those of 19.7 million individuals who had applied for security clearances to qualify for a job with the government. Another 1.8 million belonged to non-applicants, such as applicants' spouses or partners.

At least 1.1 million of the stolen records included fingerprints, the OPM said in a news release.

Michael Daniel, who is also a special assistant to the president, said he was 'not really prepared to comment' on whether China was responsible for the hack.

The incident comes after a 'separate, but related' incident in April, when files of 4.2 million current and former federal workers were stolen.

According to OPM, both breaches were discovered as the agency conducted a forensics investigation into the way federal data is managed.  

The government will now be forced to provide three years of support from a private firm specializing in data breaches for all 21.5 million victims to monitor their children, credit files and identity.  

Data breach: Hackers stole sensitive information, including social security numbers, of about 21.5 million people from background investigation databases. At least 1.1 million of the records include fingerprints

Data breach: Hackers stole sensitive information, including social security numbers, of about 21.5 million people from background investigation databases. At least 1.1 million of the records include fingerprints

Stolen records include identification details such as Social Security Numbers; residency and educational history; employment history; information about immediate family and other personal and business acquaintances; health, criminal and financial history; and more.

Some records also include findings from interviews conducted by background investigators and fingerprints. 

Usernames and passwords that background investigation applicants used to fill out their background investigation forms were also stolen.

There is significant overlap between the two groups, according to the OPM news release.

Human vices, such as infidelity, compulsive gambling, problems with alcohol or drugs, as well as emotional and behavioral issues, raise red flags for officials who gather so-called 'adjudication information' - information that government investigators gather during the vetting process of potential hires and current employees seeking a higher level of clearance.

The U.S. government has attributed sophisticated attacks - including the original large-scale data theft last month - to increasingly advanced state-affiliated teams from China.

China has denied any connection with the OPM attack and little is known about the identities of those involved in it.

Asked during a conference call with reporters whether China was responsible, Michael Daniel said that 'at this point the investigation into the attribution of this event is still ongoing and we are exploring all of the different options that we have.'

He added that 'we're not really prepared to comment at this time on the attribution behind this event.' 

 

 

 

 

 

The comments below have not been moderated.

The views expressed in the contents above are those of our users and do not necessarily reflect the views of MailOnline.

By posting your comment you agree to our house rules.

Who is this week's top commenter? Find out now