Feeds

State Department workers snooped on all three prez candidates

'Imprudent curiosity' runs amok

Gartner critical capabilities for enterprise endpoint backup

In an incident underscoring the insecurity of many government records, the State Department revealed that at least four workers snooped into supposedly private passport files of all three presidential contenders.

The breaches involved electronic files that contained personal information about Senators Barack Obama, Hillary Clinton and John McCain. State Department officials refused to say exactly what was in the files, but it could have included a wealth of personal details that could aid political opponents such as the candidates' date and place of birth, address, and the countries the person had traveled to.

A State Department spokesman said "imprudent curiosity" was the likely motivation for the incidents, a claim some critics characterized as doubtful. They said the spying was reminiscent of a 1992 breach by a Republican political appointee at the department into Bill Clinton's passport records when he was a presidential candidate running against President George H.W. Bush.

Two of the workers were employed by Virginia-based Stanley Inc., which earlier this week won a five-year, $570m contract to provide passport services for the State Department. The firm has provided government services since 1992, when it helped establish the National Passport Center, according to Federal Computer Week. The employees were fired Friday, a day after the incident came to light.

Obama's passport file was improperly accessed on three separate occasions, in January, February and March, by the two Stanley employees and a third contract employee whose employer remains unknown. This third person, who has been disciplined but remains on the job, also accessed the records of McCain earlier this year. The individual no longer has access to passport records.

The snooping episodes were detected by an internal process inside the State Department's computer system that flags each time a high-profile person's records are viewed without a valid reason. Despite the system, senior department officials only learned of the breaches on Thursday after receiving an inquiry from a reporter at The Washington Times.

Hilary Clinton's file was accessed last summer during a training session for State Department employees. The person was immediately admonished for the violation.

The State Department's inspector general is investigating. The House Foreign Affairs Committee also plans to look into the breach. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.