{"id":962,"date":"2013-02-05T00:00:00","date_gmt":"2013-02-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/05\/energy-department-hacked-says-no-classified-data-compromised-technology-on-nbcnews-com\/"},"modified":"2021-12-30T11:38:29","modified_gmt":"2021-12-30T11:38:29","slug":"energy-department-hacked-says-no-classified-data-compromised-technology-on-nbcnews-com","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/05\/energy-department-hacked-says-no-classified-data-compromised-technology-on-nbcnews-com\/","title":{"rendered":"Energy Department hacked, says no classified data compromised\u00a0 &#8211; Technology on NBCNews.com"},"content":{"rendered":"<p>The Department of Energy&#8217;s electronics network was attacked by hackers in mid-January but no classified data was compromised, the agency said in a letter to employees.  The attack &#8220;resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information,&#8221; the Energy Department said in the letter, which was received by employees at its headquarters in Washington late on Friday and obtained by Reuters on Monday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The department said it was working with federal law enforcement to gather more information on the nature and scope of the attacks and assess the potential impact on staff and contractors. <\/p>\n<p>It was not clear which divisions at the agency&#8217;s headquarters were breached in the attack, and it was also uncertain who the hackers were or where they were based.<\/p>\n<p>A department spokesman declined to comment, and a spokesman for the Energy Information Administration, which publishes data that helps keep oil, gas and electricity markets stable, deferred to DOE headquarters.<\/p>\n<p>In the past, Energy Department installations that design and build nuclear weapons, including the Los Alamos National Lab in New Mexico, have faced scandals over alleged mishandling of classified information. In 2006, for example, after raiding a house trailer containing a suspected small methamphetamine lab, local police found three computer memory sticks containing classified information downloaded from the Los Alamos lab&#8217;s computers.<\/p>\n<p>One of the largest security scandals in modern U.S. history, the leaking of hundreds of thousands of State Department cables and military reports to the website WikiLeaks, allegedly occurred because, in an effort to share intelligence more widely with operations in the field, agencies sent classified reports electronically to battlefield intelligence units, where data protection measures were lax.<\/p>\n<p>In late 1999, a Los Alamos nuclear weapons scientist born in Taiwan, Wen Ho Lee, was arrested and indicted for allegedly mishandling classified information from the lab. <\/p>\n<p>Link: http:\/\/www.nbcnews.com\/technology\/technolog\/energy-department-hacked-says-no-classified-data-compromised-1B8242980<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-962","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=962"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/962\/revisions"}],"predecessor-version":[{"id":3449,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/962\/revisions\/3449"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}