Skip to main content
Skip to content
Case File
kaggle-ho-020319House Oversight

USIS and Contractor Security Lapses Exposed as Potential Vector for Chinese and Russian Espionage

USIS and Contractor Security Lapses Exposed as Potential Vector for Chinese and Russian Espionage The passage outlines specific security failures at USIS, Booz Allen Hamilton, and the OPM's E‑QIP system that may have exposed millions of intelligence personnel records to foreign hackers, notably China and Russia. It cites concrete dates, settlement amounts, and breach timelines, offering clear investigative angles (e.g., follow the August 2014 DHS counter‑intelligence finding, the 2015 USIS $30 M forfeiture, and the 2015 congressional briefing on E‑QIP). While the claims are not yet verified, they link high‑level contractors and a federal personnel system to foreign intelligence threats, making it a strong lead for further inquiry. Key insights: USIS allegedly “flushed” cases to meet bonus quotas, potentially compromising vetting of NSA contractors.; USIS settled a lawsuit by forfeiting $30 M on August 20 2015.; DHS counterintelligence unit detected a massive breach of USIS data in August 2014, attributing it to Chinese hackers.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020319
Pages
1
Persons
1
Integrity
No Hash Available

Summary

USIS and Contractor Security Lapses Exposed as Potential Vector for Chinese and Russian Espionage The passage outlines specific security failures at USIS, Booz Allen Hamilton, and the OPM's E‑QIP system that may have exposed millions of intelligence personnel records to foreign hackers, notably China and Russia. It cites concrete dates, settlement amounts, and breach timelines, offering clear investigative angles (e.g., follow the August 2014 DHS counter‑intelligence finding, the 2015 USIS $30 M forfeiture, and the 2015 congressional briefing on E‑QIP). While the claims are not yet verified, they link high‑level contractors and a federal personnel system to foreign intelligence threats, making it a strong lead for further inquiry. Key insights: USIS allegedly “flushed” cases to meet bonus quotas, potentially compromising vetting of NSA contractors.; USIS settled a lawsuit by forfeiting $30 M on August 20 2015.; DHS counterintelligence unit detected a massive breach of USIS data in August 2014, attributing it to Chinese hackers.

Tags

kagglehouse-oversighthigh-importancecontractor-securitycyber-espionagechinese-hackingrussian-hackingnsa-personnel

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
167 alleged that USIS employees often “flushed,” or ended cases before completing a full investigation, to meet corporate-imposed quotas for getting bonuses. One employee said in an email cited in the government’s complaint “Flushed everything like a dead goldfish.” As a result, some of information specialists entering the NSA through the back door of outside contractors were not fully vetted. (On August 20, 2015 USIS agreed to forfeit $30 million in fees to settle the law suit.) USIS was also opened to sophisticated hacking attacks by outsiders. For example, in August 2014, the Department of Homeland Security’s counterintelligence unit discovered such a massive and persistent breach in USIS that it shut down its entire exchange of data with USIS. The intrusion into USIS records in this case was attributed to hackers in China most likely linked to the Chinese intelligence service. Such massive intrusions dated back to 2011. USIS’ lack of security in its website left a gaping hole through which outside parties, including Chinese and Russian hackers, could learn both the identity and background of information specialists applying for jobs at the NSA. These private companies had one further security weakness. They did sufficiently protect the personal data of their off-premise employees working at the NSA. Consider, for example, the successful 2011 attack on the Booz Allen Hamilton servers. The previously-mentioned hackers' group “Anonymous” took credit for it. It not only breached the security of Booz Allen servers but cracked the algorithms it used to protect its employees. It next injected so-called Trojan- horse viruses and other malicious codes on Booz Allen servers that allowed it to have future entry. Presumably, if amateur hackers such as Anonymous could break into the computers of the NSA’s largest contractor, so could the state espionage services with far more advanced hacking tools such as those of Russia and China. From these sites, an adversary intelligence service could obtain all the job applications and personal resumes submitted to contractors such as Booz Allen. It could then compile a list of the candidates looking to work at the NSA. These deficiencies in the private sector were compounded by the failure of security in the government’s own Office of Personnel Management. It used a computer system called E-QIP in which intelligence employees with security clearances, including outside contractors, updated their computerized records to maintain or upgrade their security clearances. For example, Snowden updated his clearance in 2011. To do so, these employees constantly updated their financial and personal information. As it turned out, there was a major hole in the E-QIP system. It was repeatedly hacked since 2010 by unknown parties. In 2015, the US government told Congress that China was most likely responsible but Russia and other nations with sophisticated cyber services could have also participated in the hacking. In any case, the records of over 19 million employees, including intelligence workers, became available to a hostile intelligence service. This breach would allow hostile services a great deal of information about independent contractors working at the NSA. They could then use this data to follow the movements of movement of any of these intelligence workers they deemed of interest.

Related Documents (6)

House OversightFeb 26, 2019

Cowen CBD Market Outlook Report – No Evident Investigative Leads

Cowen CBD Market Outlook Report – No Evident Investigative Leads The document is a commercial research note on CBD market size and analyst ratings, containing no references to political figures, financial misconduct, or intelligence activities. It offers no actionable investigative leads. Key insights: Provides market size estimate for U.S. CBD ($16 bn by 2025).; Cites a proprietary survey showing 7% adult usage.; Mentions analyst ratings for WEED, TLRY, TPB.

1p
House OversightUnknown

Snowden’s alleged acquisition of the 2013 Black Budget and its potential value to foreign intelligence services

Snowden’s alleged acquisition of the 2013 Black Budget and its potential value to foreign intelligence services The passage suggests Snowden stole a highly classified Congressional Budget Justification (the 2013 black budget) that details intelligence priorities and funding across multiple agencies. It claims the document would be valuable to adversary nations such as Russia’s SVR, implying a possible financial or strategic motive beyond whistleblowing. This provides a concrete lead (specific document, fiscal year, agencies) and ties to high‑level actors (NSA, CIA, President, Congress) and foreign intelligence services, making it a strong investigative angle, though the claim is unverified and relies on secondary commentary. Key insights: Snowden allegedly took the 2013 Congressional Budget Justification (black budget) while at Booz Allen.; The document lists funding and priorities for NSA, CIA, DIA, NRO, and other agencies.; Former CIA deputy director Michael Morell is quoted saying the SVR would pay millions for such a document.

1p
House OversightUnknown

Empty House Oversight Document Lacks Substantive Content

Empty House Oversight Document Lacks Substantive Content The provided file contains only a title and no substantive text, offering no names, transactions, dates, or allegations to pursue. Consequently, it provides no investigative leads, controversy, novelty, or power linkages. Key insights: Document contains only a header and filename.; No mention of individuals, agencies, or actions.

1p
House OversightUnknown

Speculative commentary on digital surveillance and a vague “New Caste” elite

Speculative commentary on digital surveillance and a vague “New Caste” elite The passage offers no concrete names, dates, transactions, or actionable leads. It merely reflects philosophical criticism of mass surveillance and references historical figures without linking them to specific misconduct. While it mentions the NSA and a “Pullthrough Steering Group,” no identifiable individuals or actionable details are provided, limiting investigative usefulness. Key insights: Mentions a “Pullthrough Steering Group Meeting #16” from The Intercept.; References NSA PowerPoint presentations as propaganda for totalitarian surveillance.; Uses the term “New Caste” to describe an unnamed elite controlling digital monitoring.

1p
House OversightJan 5, 2018

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content The file contains only a title and file identifier with no substantive information, names, dates, transactions, or allegations. It provides no actionable leads or novel insights into any controversial actions or actors. Key insights: File appears to be a placeholder or index page; No mention of individuals, agencies, or financial details

1p
House OversightOtherNov 11, 2025

Chinese Hack of U.S. Personnel Records and Potential Exploitation of Sensitive Clearance Data

The passage describes a large‑scale breach of U.S. federal employee and intelligence‑worker records by Chinese hackers, including detailed personal and security‑clearance information. It suggests a se OPM breach traced to 2009, with 20 M personnel files and 14 M background checks stolen by 2015. Chinese hackers also accessed medical records from Anthem and other health‑care firms. Data includes fo

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.