**Update 08.31.2015:**
> [China and Russia are Using Hacked Data to Target U.S. Spies, Officials Say](http://www.latimes.com/nation/la-na-cyber-spy-20150831-story.html)- Los Angeles Times
**How Bad? Very Bad:**
> [Newly Disclosed Hack Got ‘Crown Jewels’; ‘This is Not the End of American Human Intelligence, but it’s a Significant Blow,’ a Former NSA Official Says](http://www.politico.com/story/2015/06/hackers-federal-employees-security-background-checks-118954.html)- Politico
> [Hackers May Have Obtained Names of Chinese With Ties to U.S. Government](http://www.nytimes.com/2015/06/11/world/asia/hackers-may-have-obtained-names-of-chinese-with-ties-to-us-government.html?_r=0) – New York Times
> [The Hack on the U.S. Government was Not a ‘cyber Pearl Harbor’ (But it was a Very Big Deal)](http://www.washingtonpost.com/blogs/monkey-cage/wp/2015/06/15/the-hack-on-the-u-s-government-was-not-a-cyber-pearl-harbor-but-it-was-a-very-big-deal/) – Washington Post
> [Officials: Chinese Had Access to U.S. Security Clearance Data for One Year](http://www.washingtonpost.com/blogs/federal-eye/wp/2015/06/18/officials-chinese-had-access-to-u-s-security-clearance-data-for-one-year/?postshare=8401434679772773) – Washington Post
> [Attack Gave Chinese Hackers Privileged Access to U.S. Systems](http://www.nytimes.com/2015/06/21/us/attack-gave-chinese-hackers-privileged-access-to-us-systems.html?_r=5) – New York Times
> [China’s Hackers Got What They Came For](http://thehill.com/policy/cybersecurity/245614-chinas-hackers-got-what-they-came-for) – The Hill
> [Hacking as Offensive Counterintelligence](http://20committee.com/2015/06/08/hacking-as-offensive-counterintelligence/); [China’s Hack Just Wrecked American Espionage](http://www.thedailybeast.com/articles/2015/06/15/china-s-hack-just-wrecked-american-espionage.html) and [China’s Spies Hit the Blackmail Jackpot With Data on 4 Million Federal Workers](http://www.thedailybeast.com/articles/2015/06/11/china-s-spies-hit-the-blackmail-jackpot-with-every-data-on-federal-worker.html) – John Schindler at his XXCommittee blog and at The Daily Beast
**How Was It Discovered? During a Product Demo:**
> [Report: Hack of Government Employee Records Discovered by Product Demo
Security Tools Vendor Found Breach, Active over a Year, at OPM During Sales Pitch](http://arstechnica.com/security/2015/06/report-hack-of-government-employee-records-discovered-by-product-demo/) – ArsTechnica
**Level of OPM Incompetency? High. Very Old Software, Unencrypted Databases, and Foreign Contractors, Including Chinese, with Root Access:**
> [Encryption “would not have helped” at OPM, Says DHS Official; Attackers had Valid User Credentials and Run of Network, Bypassing Security](http://arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/) – ArsTechnica, with details of the OPM systems and lack of security
> [](https://twitter.com/20committee/status/611272144136220673) “!! OPM IT outsourced to foreigner contractors, with root access, working from their home country. In this case, China” – John Schindler [(@20committee)](https://twitter.com/20committee): June 17, 2015
> [Oversight Chairman: Fire Leaders of Hacked Agency](http://www.politico.com/story/2015/06/katherine-archuleta-opm-computer-hack-house-119067.html) – Politico
**Related:**
> [5 Chinese Cyber Attacks That Might Be Even Worse Than the OPM Hack](http://www.defenseone.com/threats/2015/06/5-chinese-cyber-attacks-might-be-even-worse-opm-hack/115321/) – Defense One
**Quotes:**
> Former NSA and CIA Director, Michael Hayden (quote via Benjamin Wittes @ [Lawfare.com](http://www.lawfareblog.com/michael-hayden-those-records-are-legitimate-foreign-intelligence-target)) as to what he would have done if he had had the ability to get Chinese records equivalent to the OPM records when he was serving in his IC positions:
>> “I would not have thought twice. I would not have asked permission. I’d have launched the star fleet. And we’d have brought those suckers home at the speed of light . . . This is shame on us for not protecting that kind of information.”
> From Benjamin Wittes writing on the OPM hack at LawFare in his post “[Is the Privacy Community Focused on the Wrong Government?](http://www.lawfareblog.com/privacy-community-focused-wrong-government)”:
>> “For the record, I have no problem with the Chinese going after this kind of data. Espionage is a rough business and the Chinese owe as little to the privacy rights of our citizens as our intelligence services do to the employees of the Chinese government. It’s our government’s job to protect this material, knowing it could be used to compromise, threaten, or injure its people—not the job of the People’s Liberation Army to forebear collection of material that may have real utility. Yet I would have thought that privacy groups that take such strong views of the need to put limits on American collection, even American collection overseas against non-U.S. persons, would look a little askance at a foreign intelligence operation consisting of the bulk collection of the most highly-personal information—an operation involving not only government employees but also those close to them. You’d think this would raise someone’s privacy hackles, if not mine.”
> Adam Elkus writing at [BusinessInsider](http://www.businessinsider.com/the-opm-breachs-cybersecurity-paradox-2015-6#ixzz3dQmSC4FD):
>> “[C]leaning up the systematic dysfunction in OPM and other agencies will require a harsh and swift hand and plenty of pink slips. Fantasizing about super-hackers and visions of cyber-doom are more fun than the boring but necessary drudgery, for example, of modernizing a decrepit and decaying federal information technology base or ensuring that basic security protocols are observed.”
> Megan McArdle at [BloombergView](http://www.bloombergview.com/articles/2015-06-18/it-s-not-just-another-data-breach-it-s-outrageous-):
>> “The serial IT disasters we have seen over the past seven years do not need a blue-ribbon commission or a really stern memo to fix them. If we want these holes fixed before they become catastrophic, we need leaders with a scorched-earth determination to have adequate IT. The only way that determination happens is if these failures become an existential threat to the careers of the politicians in charge.”