[Senate Hearing 109-577]
[From the U.S. Government Publishing Office]



                                                        S. Hrg. 109-577
 
VETERANS AFFAIRS DATA PRIVACY BREACH: TWENTY-SIX MILLION PEOPLE DESERVE 
                                ANSWERS

=======================================================================

                             JOINT HEARING

                               BEFORE THE

                     COMMITTEE ON VETERANS' AFFAIRS
                          AND THE COMMITTEE ON
                           HOMELAND SECURITY
                        AND GOVERNMENTAL AFFAIRS
                          UNITED STATES SENATE

                       ONE HUNDRED NINTH CONGRESS

                             SECOND SESSION

                               __________

                              MAY 25, 2006

                               __________

       Printed for the use of the Committee on Veterans' Affairs


 Available via the World Wide Web: http://www.access.gpo.gov/congress/
                                 senate


                                 ______

                    U.S. GOVERNMENT PRINTING OFFICE
28-754                      WASHINGTON : 2006
_____________________________________________________________________________
For Sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov  Phone: toll free (866) 512-1800; (202) 512�091800  
Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�090001

                     COMMITTEE ON VETERANS' AFFAIRS

                      Larry Craig, Idaho, Chairman
Arlen Specter, Pennsylvania          Daniel K. Akaka, Hawaii, Ranking 
Kay Bailey Hutchison, Texas              Member
Lindsey O. Graham, South Carolina    John D. Rockefeller IV, West 
Richard Burr, North Carolina             Virginia
John Ensign, Nevada                  James M. Jeffords, (I) Vermont
John Thune, South Dakota             Patty Murray, Washington
Johnny Isakson, Georgia              Barack Obama, Illinois
                                     Ken Salazar, Colorado
                  Lupe Wissel, Majority Staff Director
               D. Noelani Kalipi, Minority Staff Director
                              ----------                              

        COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS

                   Susan M. Collins, Maine, Chairman
Ted Stevens, Alaska                  Joseph I. Lieberman, Connecticut
George V. Voinovich, Ohio            Carl Levin, Michigan
Norm Coleman, Minnesota              Daniel K. Akaka, Hawaii
Tom Coburn, Oklahoma                 Thomas R. Carper, Delaware
Lincoln D. Chafee, Rhode Island      Mark Dayton, Minnesota
Robert F. Bennett, Utah              Frank Lautenberg, New Jersey
Pete V. Domenici, New Mexico         Mark Pryor, Arkansas
John W. Warner, Virginia
           Michael D. Bopp, Staff Director and Chief Counsel
                   Thomas R. Eldridge, Senior Counsel
             Michael L. Alexander, Minority Staff Director
               Lawrence B. Novey, Minority Senior Counsel
                  Trina Driessnack Tyrer, Chief Clerk


                            C O N T E N T S

                              ----------                              

                              May 25, 2006
                                SENATORS

                                                                   Page
Craig, Hon. Larry E., Chairman, Committee on Veterans' Affairs, 
  U.S. Senator from Idaho........................................     1
Collins, Hon. Susan M., Chairman, Committee on Homeland Security 
  and Governmental Affairs, U.S. Senator from Maine..............     3
Akaka, Hon. Daniel K., Ranking Member, U.S. Senator from Hawaii..     4
    Prepared statement...........................................     5
Lieberman, Hon. Joseph I., U.S. Senator from Connecticut.........     6
Warner, Hon. John W., U.S. Senator from Virginia.................     7
Jeffords, Hon. James M., U.S. Senator from Vermont...............     8
Murray, Hon. Patty, U.S. Senator from the State of Washington....     8
Isakson, Hon. Johnny, U.S. Senator from Georgia..................     9
    Letter from Richard F. Smith, Chairman and Chief Executive 
      Officer, Equifax, Inc......................................    10
Lautenberg, Hon. Frank R., U.S. Senator from New Jersey..........    10
Thune, Hon. John, U.S. Senator from South Dakota.................    11
Burr, Hon. Richard M., U.S. Senator from North Carolina..........    12
Obama, Hon. Barack, U.S. Senator from Illinois...................    13
Salazar, Hon. Ken, U.S. Senator from Colorado....................    14
    Prepared statement...........................................    15
Chafee, Hon. Lincoln D., U.S. Senator from Rhode Island..........    16
Pryor, Hon. Mark, U.S. Senator from Arkansas.....................    16

                               WITNESSES

Nicholson, Hon. R. James, Secretary, Department of Veterans 
  Affairs; accompanied by Tim S. McClain, General Counsel, 
  Department of Veterans Affairs.................................    16
    Prepared statement...........................................    22
    Response to written questions submitted by:
        Hon. Daniel K. Akaka.....................................    24
        Hon. Norm Coleman........................................    25
        Hon. Pete V. Domenici....................................    26
        Hon. Lincoln D. Chafee...................................    26
Opfer, Hon. George J., Inspector General, Department of Veterans 
  Affairs; accompanied by Jon A. Wooditch, Deputy Inspector 
  General, Department of Veterans Affairs........................    28
    Prepared statement...........................................    29

                                APPENDIX

Coleman, Hon. Norm, U.S. Senator from Minnesota, prepared 
  statement......................................................    51
Center for Democracy and Technology, prepared statement..........    51
Department of Veterans Affairs, prepared statement...............    53
VA's Notification letter to veterans.............................    53
Press Release: Frequently asked questions on VA's letter to 
  veterans.......................................................    54


VETERANS AFFAIRS DATA PRIVACY BREACH: TWENTY-SIX MILLION PEOPLE DESERVE 
                                ANSWERS

                              ----------                              


                         THURSDAY, MAY 25, 2006

                               U.S. Senate,
                     Committee on Veterans Affairs,
and Committee on Homeland Security and Governmental 
                                           Affairs,
                                                    Washington, DC.
    The Committees met, pursuant to notice, at 10:09 a.m., in 
room SD-342, Dirksen Senate Office Building, Hon. Larry E. 
Craig, Chairman of the Committee, presiding.
    Present: Senators Craig, Burr, Thune, Isakson, Collins, 
Chafee, Warner, Akaka, Murray, Obama, Salazar, Lieberman, 
Carper, Lautenberg, Pryor and Jeffords.

 OPENING STATEMENT OF HON. LARRY E. CRAIG, CHAIRMAN, COMMITTEE 
         ON VETERANS' AFFAIRS, U.S. SENATOR FROM IDAHO

    Chairman Craig. The Committee will be in order.
    I will ask the Secretary to sit down, take a deep breath 
and collect his thoughts. He has just come from a hearing in 
the House. Then we would appreciate photographers and media 
keeping it down as much as you can in the front. Thank you.
    We have an announced vote at or around 20 after, so we will 
attempt to get opening statements as much as we can prior.
    Good morning, ladies and gentlemen. On behalf of Chairman 
Collins, as well as the Ranking Members of the two Committees, 
Senator Akaka of Veterans' Affairs and Senator Joe Lieberman of 
Homeland Security and Governmental Affairs, I want to welcome 
all of you to this joint hearing this morning.
    First, I want to thank all of the Members of our two 
Committees for their willingness to participate jointly in this 
important hearing. I think the American public should 
understand that while this hearing is about the Department of 
Veterans Affairs and the compromising of sensitive personal 
information about our veterans, the issue of data security is a 
concern all across Government.
    As I said on the Senate floor just 2 days ago, nearly every 
agency of the Federal Government maintains sensitive 
information on millions of American citizens. Most of this data 
is not of the classified nature. Rather, it is information 
compiled simply to carry out the mission and programs of 
various agencies.
    For example, the Federal student financial aid form 
requires that you provide your name, address, Social Security 
number, date of birth, information of your parents, and their 
addresses, along with many other things. Clearly, the release 
of that data would be as devastating to the privacy of millions 
of students and their families as VA's breach was to millions 
of America's veterans and their families.
    Still, we are here today to talk about what the Secretary 
of Veterans Affairs announced to the Nation this past Monday. 
He told my Committee and other Members that an employee of the 
Department downloaded data of nearly 26 million veterans and 
then walked right out the front door with it. Subsequently, the 
data was stolen from this employee's home.
    Mr. Secretary, I must tell you, that is pretty 
unbelievable. How is it that VA's computer system permits one 
person to download the records of 26 million individuals and do 
so without any alert going off to anyone else who has the 
responsibility of the integrity of that system.
    Candidly to me, that is not even the most absurd part of 
the story as I now know it. What is even more important and 
mind-boggling is after he revealed the facts of the theft to 
his supervisor, it took 13 more days for anyone else to 
discover the lost data was on 26 million veterans and their 
families. Then it took 2 more days for the FBI to be notified. 
So somebody lost the names, the birthdates and the Social 
Security numbers of 26 million veterans and their families and 
the FBI knew nothing for nearly 2 weeks.
    Mr. Secretary, I read your statement yesterday in the press 
about the anger you felt at having discovered the lapse in 
security nearly 13 days after it happened. I am glad you are 
angry. You should be. You can only imagine how I and millions 
of veterans felt and now feel.
    I just came from doing C-SPAN. I did call-ins. America's 
veterans across this country are frustrated. The word scared 
was used. The words are we at risk were used. And what do we do 
to protect ourselves?
    Mr. Secretary, I understand the need to spend some time 
with your staff assessing problems and reviewing options, but I 
find it increasingly frustrating that decisions are made 
without the knowledge and the input of a few of us. I think we 
can be trusted. I think you know that.
    Now, before I turn to Chairman Collins for her comments, I 
want to say a word about the employee who took the data home, 
as I now know it. While there is still an ongoing investigation 
as to the situation by the FBI, and I know that will limit some 
statements this morning, as best as I can tell from the 
information I have thus far, this person is a dedicated Federal 
employee who took work home with the hopes of improving VA's 
operations. Yes, his actions were inexcusable. He knew better 
than to take information home, or I hope he did. I hope policy 
suggested he should not or insisted he should not. He knew 
better than to take information home. And yet, a terrible lapse 
in judgment, and now he is faced with the serious consequences. 
But at least he told his supervisors and the law enforcement 
right away, which is more than we have been accorded.
    I am not going to lose sight of the actions of everyone 
else in this situation. There were many lapses in judgment from 
many people. I hope this hearing today will shed some light on 
the shortcomings in VA's data security programs and on what 
needs to happen to ensure such a major breach never occurs 
again.
    Also, I think our discussion will heighten the awareness of 
many other agencies across our Government to the vigilance 
about data protection and information security. As I said 
earlier, students, farmers, and others who seek Government 
assistance deserve our best efforts to protect their critical, 
vital, private information.
    Most importantly, I hope today's hearings will provide 
millions of veterans and their families the assurance they 
deserve to have, that you are doing everything possible, Mr. 
Secretary, and we will do the same.
    Thank you for being with us.
    Chairman Collins.

OPENING STATEMENT OF HON. SUSAN M. COLLINS, CHAIRMAN, HOMELAND 
SECURITY AND GOVERNMENTAL AFFAIRS COMMITTEE, U.S. SENATOR FROM 
                             MAINE

    Chairman Collins. Thank you, Mr. Chairman.
    First, let me begin by commending you for your leadership 
for seizing the initiative for suggesting this joint hearing. I 
and the Members of the Homeland Security Committee are very 
pleased to join you in this effort to quickly address a very 
serious matter that is of great concern to our Nation's 
veterans, including some 141,000 veterans in my home State of 
Maine.
    We are here today not merely to examine one incident, one 
moment of carelessness--make that recklessness--by one Federal 
employee. The specific incident compels us to confront the 
persistent and pervasive laxity with which the VA safeguards 
the personal information of the veterans it serves.
    For 5 straight years, the VA's Inspector General has 
criticized the Department for inadequate information security. 
On the annual Federal Computer Security Report Card issued by 
the House Government Reform Committee, the VA has received a 
grade of F for 4 of the last 5 years, including each of the 
last 2 years.
    This ongoing failure during a time when identity theft has 
been such a high-profile problem is simply appalling. The 
immediate result of this failure is what appears to be the 
largest theft of Social Security numbers ever. The fact that 
the information also included veterans' names and dates of 
birth means that the stolen data can easily be used to commit 
identity theft and financial fraud.
    The lingering result will be increased doubts among the 
American people about the Federal Government's commitment to 
safeguarding their personal, sensitive information.
    When we think of cyber security, we focus on protecting 
vital information systems against intrusion by criminals or 
terrorists. We now see that all the high-tech fixes in the 
world cannot protect these systems against one employee who 
disregards an established policy, and one agency that does not 
take sufficient measures to ensure compliance with the policy.
    I am also troubled by the VA's response. The burglary that 
led to this potentially massive intrusion occurred on May 3. 
Yet, as the Chairman indicated, it apparently was not reported 
to the FBI for 2 weeks. The American people, and most important 
our veterans, were not informed for nearly 3 weeks.
    Now, some delay prior to disclosure could well be 
reasonable, to allow law enforcement time to hunt for the 
stolen information or to put in place a system to respond to 
the many inquiries from our veterans. However, much of the 
delay in this case appears to be because the VA did not 
promptly investigate the nature and the scope of the data 
breach. It simply appears that the VA did not handle this 
matter with the clear sense of urgency that it required.
    I am also concerned about the initiatives the VA has taken 
to address the immediate crisis. Is it sufficient simply to 
establish a toll-free number for veterans to call? We have 
already heard, in my office and others, that veterans have 
called this number, but have been unable to learn much of 
anything.
    Is it sufficient to just accelerate a schedule of computer 
security training for VA employees? Or should more be done? We 
must ensure that the remedies the VA puts in place, both short-
term and long-term, are real, will make a difference and are 
not merely cosmetic.
    We must also view this incident as a wake-up call to the 
rest of the Federal Government. It is likely that the VA is not 
alone in the potential to suffer a data breach of this 
magnitude. Federal managers must recognize that they are 
stewards of a large amount of personal data on law abiding 
citizens, and they must guard this information wisely or lose 
the people's trust.
    It is tragically ironic that this profound betrayal of 
trust occurs just as the American people are preparing to honor 
our veterans. On this Memorial Day, the pride our veterans 
should feel in their service to our Nation will be dampened by 
anxiety and justifiable anger.
    These are the people who have served our Nation yesterday 
and who serve today. They are brave, patriotic, and devoted to 
duty. They deserve our gratitude and much more. They certainly 
deserve better than this. We owe them our best efforts so that 
the deep problems that this incident has exposed are fixed and 
so that the trust they should be able to have, not only in the 
VA but across our Government can be restored.
    Thank you, Mr. Chairman.
    Chairman Craig. Thank you, Madame Chairman.
    We do have a vote on and it started at 10:16. I suspect we 
can go. So Senator Akaka, if you would wish to go ahead with 
your opening statement, we will get a few more. I would ask 
that we keep these as limited as possible so we can get to the 
Secretary. But please proceed.

      STATEMENT OF HON. DANIEL K. AKAKA, RANKING MEMBER, 
                    U.S. SENATOR FROM HAWAII

    Senator Akaka. Thank you very much, Mr. Chairman, and 
Chairman Collins, for working together for calling this very 
important and timely joint hearing.
    As the Ranking Member on the Veterans' Affairs Committee 
and a senior Member on the Homeland Security and Governmental 
Affairs Committee, I am privileged to sit on two committees 
that have oversight on this issue. Having both Committees 
investigating this matter will allow us to address the 
specifics of the incident involving VA data and work to craft 
safeguards for the entire Government.
    I would like to say, Mr. Chairman, that I want to associate 
myself with the eloquent statement that you made.
    Let me be clear, the specific incident that brings us here 
today happens to involve VA and VA data. It could just as 
easily have involved other departments and agencies. It may be 
wise to have other departments and agencies examine their 
policies on classified and confidential data and the proper use 
and security for such data.
    Shortly after the news that the incident broke, I spoke 
with VA Inspector General George Opfer. He told me his office 
launched a full investigation into the matter which would 
examine all of the facts. I eagerly await his findings as the 
investigation will provide independent information for Congress 
to assess the situation.
    I also wrote to Secretary Nicholson with a number of 
questions and I look forward to his responses today.
    I have a longer statement, Mr. Chairman, but I will not 
read it so we have more time to hear from and question the 
witnesses. I ask that my full statement appear in the record as 
if read. Thank you very much, Mr. Chairman.
    [The prepared statement of Senator Akaka follows:]

      Prepared Statement of Hon. Daniel K. Akaka, Ranking Member, 
                        U.S. Senator from Hawaii

    Thank you Chairman Craig and Chairman Collins for working together 
to call this very important and timely joint hearing. As the Ranking 
Member on the Veterans' Affairs Committee and a senior member on the 
Homeland Security and Governmental Affairs Committee, I am privileged 
to sit on the two committees that have oversight on this issue. Having 
both Committees investigating this matter will allow us to address the 
specifics of the incident involving VA data and work to craft 
safeguards for the entire government.
    Let me be clear--the specific incident that brings us here today 
happens to involve VA and VA data. It could just as easily have 
involved other departments and agencies. Shortly after the news of this 
incident broke, I spoke with VA Inspector General George Opfer. He told 
me his office launched a full investigation into the matter that will 
examine all the facts. I eagerly await his findings as the 
investigation will provide independent information for Congress to 
assess this situation. I also wrote to Secretary Nicholson with a 
number of questions that need to be answered. I look forward to his 
response today.
    I am especially concerned with the manner in which VA handled this 
investigation. Although the breach occurred more than 3 weeks ago, 
Congress and the public were only notified of the incident this week.
    Regardless of whether identity theft actually occurs as a result of 
this incident, anytime the government loses a database of personal 
information, privacy is compromised. We must do all we can do to 
prevent this from ever happening again. The security mechanisms at VA 
are not working if a mid-level VA employee was able to walk out of the 
building with a massive amount of personal information. It seems to me 
that data of this magnitude and importance should be in the hands of 
very few VA employees and should be guarded with the utmost security. 
Thus far, VA has said the employee was not authorized to take the 
information home.
    I am troubled as to how an employee who is not authorized to take 
home the private information of more than twenty-six million veterans 
was still able to do just that. The VA failed to take several steps to 
safeguard this information. For example, VA could have scrambled Social 
Security numbers based upon an encryption formula, whereby access to 
files that translate scrambled Social Security numbers is only possible 
with special authorization. This procedure was not followed in this 
instance, and we need to know why. It is important to note how we came 
to learn about the loss of the data. The VA employee whose computer 
equipment was stolen disclosed this to VA. If the employee had chosen 
not to report the theft immediately, VA and the public could possibly 
still be in the dark about the incident.
    As I said earlier, while today's hearing is focusing on the 
information security practices at VA, I believe the data breach is 
indicative of broader information security and privacy problems 
throughout the government. I understand the problems that agencies 
face, as I have been working on Federal data collection and privacy for 
a number of years. At my request, the Government Accountability Office 
(GAO) conducted several investigations on Federal data mining 
activities and found that Federal agencies are not following all key 
privacy and information security practices. Last week, I introduced 
legislation to strengthen the investigative authority and independence 
of the Chief Privacy Officer at the Department of Homeland Security.
    I believe we need to make sure that all agencies have a strong 
privacy official to ensure that what happened at VA will not happen 
again. Last year, the Office of Management and Budget directed each 
agency to designate a senior privacy official. However, issues remain 
as to whether these individuals are focused on matters other than 
privacy, which may cause a conflict of interest; the training received 
by and the expertise of these individuals; and the enforcement 
authority of the privacy officers in each agency. Having policies and 
safeguards in place will not work if agencies are not following the 
law.
    The incident at VA demonstrates the need to review the Privacy Act. 
I believe it is appropriate at this time, Chairman Collins, for your 
Committee to undertake this review as soon as possible. The 
applicability of the Act in this increasingly electronic age, combined 
with limited remedial action, necessitates that we take a closer look, 
and make sure that the personal information that the government 
collects is properly maintained.
    It is unfortunate that, as the Nation prepares to celebrate those 
that paid the ultimate sacrifice in defense of our freedom, our 
government has breached the trust of its heroes. Our veterans deserve 
much better. I intend to work with all appropriate parties to provide 
real solutions to these glaring problems, not just in VA but across all 
government agencies and departments. Thank you.

            STATEMENT OF HON. JOSEPH I. LIEBERMAN, 
                  U.S SENATOR FROM CONNECTICUT

    Senator Lieberman. Thanks, Senator Akaka. We are going to 
continue going around and hope that Chairman Craig and Chairman 
Collins come back in time.
    I want to thank them and Senator Akaka for holding this 
hearing as quickly as they have, so that we can get some 
answers about this enormous security breach, how it occurred in 
the first place and how we can quickly assist those veterans to 
whom we all owe so much and who have been put at risk by the 
loss of their confidential information.
    The security of Government computer systems and the vast 
databases contained within them is a subject we on the Homeland 
Security and Governmental Affairs Committee have been working 
on for some time.
    As information technology continues to advance by leaps and 
bounds, we must take equivalent leaps and bounds to protect 
against the theft, misuse and abuse of information brought 
together as never before by that technology.
    At various times in our lives we, the American people, are 
required to provide the Government with all sorts of personal 
information. We do so out of necessity and sometimes out of 
choice. But we also, of course, provide it on the basis of 
trust. We, the American people, will not feel comfortable 
sharing that information that the Federal Government needs if 
the Federal Government cannot guarantee that it is kept private 
and secure.
    This latest incident at the VA is just the most recent 
reminder that the Federal Government generally, I have 
concluded, is not doing enough to guarantee that security. 
Three years ago, I asked the Government Accountability Office 
to assess and evaluate Federal privacy protections. GAO looked 
into the privacy practices of 25 Federal agencies and reported 
back that compliance was very uneven and that in nearly one-
third of cases when agencies disclosed personal information to 
non-Federal organizations, the agencies did not have procedures 
in place to ensure that the personal information disclosed was 
complete, accurate, relevant, and timely as required by the 
Privacy Act.
    Last year, Senator Collins and I took the Transportation 
Security Administration to task for violating the privacy of 
thousands of commercial airline passengers when it collected 
and stored personal information about those passengers. Not 
only did TSA violate its own privacy policy, it also failed to 
meet the basic requirements of the Privacy Act, which is law.
    The VA security lapse is particularly troubling to all of 
us. Infuriating, in fact, because of the population of veterans 
that may have been placed at risk. So we are here today to get 
answers to questions and they have really been framed by my 
colleagues who have spoken before.
    So, I will simply conclude by saying, Secretary Nicholson, 
I have great respect for you. I think you know that it is now 
up to you and your Department to restore the American public's 
trust in the VA, which is a good and efficient Department, and 
in the ability of Government as a whole to carry out its duties 
without jeopardizing personal and sensitive information the 
people of this country have and give to their Government.
    As part of that, I hope you will not hesitate to hold 
accountable anyone who was responsible for this failure to 
protect the confidential information of millions of American 
veterans.
    Thank you very much.
    Senator Warner.

               STATEMENT OF HON. JOHN W. WARNER, 
                   U.S. SENATOR FROM VIRGINIA

    Senator Warner. Thank you, Mr. Chairman.
    I want to first say a few words about the Secretary of 
Veterans Affairs. I have known him for a very long time. In 
times like this, when we have literally a very serious problem 
at hand, it is fortunate Jim Nicholson has stepped up for 
continued public service. He has about as distinguished a 
career in the United States military as one can have in 
contemporary times.
    I thank you, my good friend, for calling me very promptly 
on the early morning when this news first became public and 
reassuring me, as I am sure you are going to reassure veterans 
all over America, that you are going to have a total hand on 
the situation to hold accountable those who have perpetrated 
any wrongs or breach of law, and to reassure veterans that we 
are going to protect them to the extent we can.
    If I may say with some modesty, I am a veteran myself of 
World War II and Korea, and I have had a lifetime association, 
as you have Mr. Secretary, with the men and women of the Armed 
Forces who have served. And we must recognize, as my colleagues 
alluded, that technology has gone forward so rapidly. Ten years 
ago, if you were trying to plan a theft like this, you would 
have to have a six-wheeler van to haul the information out. Now 
a simple disk can slide into the pocket. Consequently, we have 
to take measures which keep apace with technology to give the 
security that is required in this situation.
    But I would like to once again say, as this hearing is 
commencing and as people are following it all across the United 
States, you will do a good job, Mr. Secretary. You will get to 
the bottom of this and solve it, because of your deep love, 
respect and affection for America's veterans.
    Thank you.
    I think we should stand in recess until the return of the 
Chair. Do you wish to--good, thank you very much.

             STATEMENT OF HON. JAMES M. JEFFORDS, 
                      U.S. SENATOR VERMONT

    Senator Jeffords. Mr. Chairman, I appreciate your holding 
this hearing on such short notice to examine the frightful 
breach of security at the VA that has led to the loss of 
significant data of millions of veterans. I understand that the 
Government, and in particular agencies such as the VA, who deal 
in direct health of individuals need to have sensitive personal 
information. But the Government therefore has a sacred 
obligation to make sure that this information is secure. This 
is an inexcusable breach of the basic compact of trust between 
the veteran and the VA. I am a veteran myself.
    The FBI must get to the bottom of how this happened and 
take immediate measure to ensure that it never happens again. 
We owe our veterans nothing less.
    I look forward to your testimony, Mr. Secretary, and hope 
you will give us reason to be reassured that the VA is taking 
immediate action to address this horrendous problem.
    Thank you, Mr. Chairman.
    The Committee will now stand in recess until the Chairman 
returns.
    [Recess.]
    Chairman Craig. The Committee will be back in order.
    Mr. Secretary, thank you for standing down for a few 
moments while we went to vote.
    Now let me turn to Senator Murray.

                STATEMENT OF HON. PATTY MURRAY, 
                  U.S. SENATOR FROM WASHINGTON

    Senator Murray. Let me thank Chairman Craig and Collins, as 
well as our Ranking Members Akaka and Lieberman, for calling 
this very important hearing today.
    Simply put, this is really a disaster. Our phones are 
ringing off the hook with veterans from all across the country 
who feel that their privacy has been violated and they are 
really losing faith in the VA. We have 85-year-old veterans who 
do not know the first thing about credit checks, and they are 
being told that their identity has been compromised and they 
really do not know what to do. We need to find a way to provide 
assistance for all of our veterans and give them the peace of 
mind that they deserve.
    Now, I know that some say that this is just an isolated 
incident, that this is an accident caused by one employee at 
the Department of Veterans Affairs, but Mr. Secretary, I have 
to tell you, from where I sit, this seems like just another 
demonstration of the agency's incompetence.
    As Chairman Collins said, the VA was told time and again by 
the IG that it had weaknesses in its information security 
systems. The VA was warned about the lack of protection for 
veterans' sensitive health care and benefits information, and 
these warnings seem to have gone unnoticed by leadership within 
the VA.
    I hope we hear this morning from you, Mr. Secretary, about 
how this happened, why it took so long to tell our veterans 
that their information was compromised, what we are going to do 
to rectify this situation and what steps you are taking to 
ensure that it never happens again.
    Again, as we have discussed before, these Committees and 
this Congress have instilled in you the responsibility to fight 
and defend our veterans. I know that all of our veterans need 
you to be their greatest advocate.
    I am very disappointed by what has transpired and I hope 
that this agency really now rises to the occasion under your 
leadership and show all of us here and the millions of veterans 
that are at risk that you are here to protect them even from 
your own agency's mistakes.
    Thank you, Mr. Chairman.
    Chairman Craig. Thank you, Senator.
    I note that statement was made in under 3 minutes. I 
appreciate that very much and would hope that our colleagues 
would attempt to adhere to that so that we can get to the 
Secretary.
    Let me turn to Senator Isakson.
    Johnny.

               STATEMENT OF HON. JOHNNY ISAKSON, 
                   U.S. SENATOR FROM GEORGIA

    Senator Isakson. Thank you, Mr. Chairman, and I will be 
brief.
    I thank you and Chairman Collins for calling this hearing.
    Mr. Secretary, I can empathically identify with the 760,000 
veterans in Georgia who are probably on this list, because a 
year ago I was notified that my information had been lost or 
stolen by an American corporation and I know how I felt. I also 
know how they responded. And I hope we will and the 
Administration will respond swiftly to ensure the veterans are 
protected and they get the information they need.
    To that end, Mr. Chairman, I would like to ask unanimous 
consent to submit a letter for the record.
    Chairman Craig. Without objection.
    [The letter referred to follows:]

                                              Equifax Inc.,
                           Peachtree Street, Georgia, May 24, 2006.
Hon. Johnny Isakson,
U.S. Senate,
Washington, DC.
    Dear Senator Isakson: At Equifax, we honor the enormity of our 
veteran's contribution to the success and security of our great 
country, and are pleased to assist them in any way possible. Upon 
learning of the data breach at the Veterans Administration Office, 
Equifax immediately developed a special assistance page on our 
Equifax.com website. This page is designed to educate and assist our 
veterans on identity theft, and the ways in which they can safeguard 
their personal, information. This special assistance page includes the 
following:
    1. How to place an initial fraud alert on their credit file. This 
will alert creditors of possible fraudulent activity and request they 
contact the veteran prior to establishing credit in their name.
    2. How to request a free copy of their credit file 
atannualcreditreport.com, or by phone or mail.
    3. A special offer for Equifax's Credit Watch products available to 
veterans at a 50 percent discount until June 30, 2006. Credit Watch, 
will monitor the veteran's credit file and alert them to changes that 
could be early warning signs of identity theft.
    We look forward to continuing to work with the Veterans 
Administration Office to assist our veterans.
            Sincerely,
                                          Richard F. Smith,
                Chairman and Chief Executive Officer, Equifax, Inc.

    Senator Isakson. The Equifax Corporation out of Atlanta, on 
the day of the announcement, notified the VA and all veterans 
of a hotline, affording them immediate access to a free credit 
report, and offered them a 50 percent discount on 1 year's 
credit card service to monitor their credit. Mr. Richard Smith, 
who is the CEO of that company, was in Washington yesterday. I 
had the chance to talk to him and I thanked him personally for 
their voluntary effort. But I think it is important that the 
agency come together with a seamless policy to protect all 
veterans.
    Lastly, Mr. Chairman, I want to commend you on your 
statement with regard to this being a wake-up call. As terrible 
as this loss of information is, just think if the Social 
Security Administration or the IRS and all their computer data 
information did not have a good security system.
    So I hope as we work to raise the level of interest in this 
issue and hold the VA accountable, we will make sure we are 
checking with every agency of the Government and making sure 
they are redoubling their efforts to ensure this does not 
happen in any other agency as well.
    I yield back the balance of my time.
    Chairman Craig. Thank you, Senator.
    I am proceeding on the order with which Senators first came 
to the Committee, and I will turn to Senator Salazar.
    Excuse me, he is not here.
    In that case, it is Senator Lautenberg.

            STATEMENT OF HON. FRANK R. LAUTENBERG, 
                  U.S. SENATOR FROM NEW JERSEY

    Senator Lautenberg. Thanks, Mr. Chairman, and I will join 
the race to the 3-minute mark and see if I can rush through.
    Madame Chairman and our guest Chairman, thank you very much 
for arranging this joint hearing on such short notice. I 
appreciate the opportunity to learn about this alarming breach 
of security that has compromised the personal information of 26 
million veterans and families.
    I served at an earlier time and the records regarding my 
service and those who served at my time were destroyed in a 
fire in St. Louis in the Veterans Administration facility. So 
it does not install a lot of confidence when we see what has 
happened now.
    In the next few days, we are going home for Memorial Day, a 
day we want to honor our veterans and their service. But this 
week we learned that the Government has failed them, put them 
at risk, at significant risk. Our veterans deserve the best in 
health care and other services. But what they got in this case 
is a security breach that puts them at risk for theft of their 
identity.
    In recent years, we have all learned that identity theft 
has serious consequences for its victims. This incident, 
involving the VA, is the largest breach of Social Security 
numbers ever and it is appalling that something could happen. 
To make matters worse, the VA's response to the crisis has not 
been satisfactory. As a matter of fact, it really destroys 
confidence in the functioning of the VA.
    They have a call center in New Jersey and veterans who call 
there do not think the VA call center is very helpful. These 
veterans will probably have to take some steps themselves to 
make sure that their credit information is not compromised and 
that they are not subjected to deep losses as a result.
    We should make it simple for them as much as we can. And 
that is why I am joining Senator John Kerry in supporting his 
bill to help veterans to stay informed about their credit 
status in the aftermath of this incident.
    Again, thank you very much, Mr. Chairman and Madame 
Chairman.
    Chairman Craig. Senator, thank you very much. Now let me 
turn to Senator Thune.
    John.

                 STATEMENT OF HON. JOHN THUNE, 
                 U.S. SENATOR FROM SOUTH DAKOTA

    Senator Thune. Thank you, Mr. Chairman and Madame Chair.
    I appreciate, as well, very much your holding this 
emergency hearing to deal with the theft of personal 
information for millions of our veterans, and I want to thank 
Secretary Nicholson for appearing today.
    Mr. Chairman, I share your commitment to understand all the 
facts of this case before taking action, and I hope this 
hearing will generate light that we can use to do that.
    Having said that, this breach of information security at 
the VA is causing a lot of anxiety across the country among our 
veterans. And they are rightfully demanding that we act quickly 
on this issue. I have many veterans in my State of South Dakota 
who are justifiably concerned about identity theft, and they 
deserve to have peace of mind about their privacy.
    That is why we have to work quickly here on these 
committees to learn all the relevant facts and then take the 
appropriate action. And that, I think includes, in the short 
term, finding out the exact proportions of the problem and 
developing a proportionate remedy. Also, looking at the long 
term, at what we can do to make sure that this thing never 
happens again.
    As a number of Members of the Committee have already noted, 
the IG's most recent strategic plan indicated that one of the 
strategic goals was in the area of information management. It 
also noted many of the challenges the VA faces in the privacy 
of and the security of the information it manages. The 
strategic plan further states that information systems security 
has been identified as a material weakness as early as 1998 
within the VA.
    And then there is this key passage on page 58, which I want 
to just read for you,

          The potential vulnerability of Federal information systems 
        cannot be overestimated. Presently, VA systems are not 
        protected from authorized access, risk of potential exposure, 
        loss of sensitive data, fraudulent claims and disruption of 
        critical activities remain. Security over VA IT resources needs 
        to assure that only authorized users access VA resources and 
        only authorized use is made of VA resources. Legal requirements 
        such as the Privacy Act, the Federal Information Security 
        Management Act of 2002, and the Health Information Portability 
        and Accountability Act of 1996 impose detailed duties on the VA 
        to protect sensitive medical and personal information it 
        maintains on veterans, their families and its employees.

Clearly, what the Inspector General was concerned about in 
terms of information security has now become a reality that we 
must deal with. I believe that this event occurred at least in 
part because many of the VA's IT systems are compartmentalized 
within the VA's three administrations: health, benefits and 
cemeteries; and there is not a uniform policy in terms of 
information security across the entire VA.
    That is why, Mr. Chairman, I introduced a bill, last fall, 
to improve the management of IT within the VA. My bill would 
provide for the VA's Chief Information Officer to have 
authority over resources, budget and personnel related to the 
support function of information technology. An identical bill 
has passed the House. I hope that this will give us an 
opportunity to pass it in the Senate.
    I appreciate again, Mr. Chairman, your holding this 
hearing. We are here to understand the entire context of this 
situation and then to work on both short-term and long-term 
solutions. We must do all that we can to ensure the information 
privacy of our veterans who have sacrificed so much for all of 
us.
    So thank you again and I look forward to the testimony.
    Chairman Craig. Senator, thank you.
    Senator Burr.

              STATEMENT OF HON. RICHARD M. BURR, 
                U.S. SENATOR FROM NORTH CAROLINA

    Senator Burr. I thank both the Chairs.
    Mr. Secretary, Senator Isakson and I have something in 
common, in the fact that we both participated in this before 
from the standpoint of our records being lost. Mine happened to 
be a stolen laptop with my pertinent information from the 
accounting firm that does my taxes. I remember vividly getting 
the call and being walked through exactly what they were doing 
to make sure that they minimized what was a huge mistake.
    Fortunately, I have never had any repercussions from that 
over the several months that I have gone through. I am sure we 
can find a number of ways to tongue lash the system, and you 
and the Administration.
    Let me suggest to my colleagues, that is not what we are 
here to do. We are here to figure out--to work with you--to try 
to figure out how to remediate a problem that we do not know 
the scope of yet, to once again remind the Veterans 
Administration and every branch of Government that it is 
unacceptable to have the delay in notification to the Congress, 
to the Federal law enforcement folks, that these are policies 
that we need to look at, that this cannot be something we make 
up on the go.
    I certainly commit myself to you and to the Chairs to work 
aggressively to find how we can adopt a policy that we all feel 
confident is structured in a way that minimizes the risk of 
this in the future.
    But more importantly, a policy that we can communicate to 
all concerned of exactly what we do if it ever does. I think 
the belief that we can assure with 100 percent accuracy that we 
can eliminate this is a dream. We cannot. That is why it is 
just as important that we understand that we need a policy in 
place that everybody understands that helps us to remediate 
this.
    Once again, I do want to say publicly to you that it is 
unacceptable to have had a 60-day delay or a 15-day delay 
between the time that notification went out to the 
Administration, the Congress and the FBI.
    My hope is that through this hearing, it is the start of 
the road to a recovery from where we are.
    I thank the Chairs.
    Chairman Craig. Senator, thank you very much.
    Senator Obama.

                STATEMENT OF HON. BARACK OBAMA, 
                   U.S. SENATOR FROM ILLINOIS

    Senator Obama. Thank you very much to the Chairs for 
holding this hearing. I will try to be brief.
    This episode raises so many questions, but I think maybe 
the most poignant one was raised by Sonny McQueen, a DC area 
veteran. He said, ``How else can the country let us down?'' And 
I think that is a feeling that may be pervasive among a lot of 
veterans.
    I hope this hearing is the first step toward answering some 
of those questions. As has already been noted, why did it take 
2 weeks for the VA to notify the FBI? That was a 2-week head 
start for criminals to potentially wreck havoc. Why did the VA 
wait nearly 3 weeks to notify the veterans who were at risk? 
That is a policy issue.
    I have no doubt, Mr. Secretary, that you are as outraged as 
we are about this problem. But I am concerned about what is it 
structurally inside the VA that is preventing information from 
being dealt with properly? And what is preventing the VA from 
being forthcoming to veterans and the American people?
    We have a duty to make this right. The average identity 
theft victim spend 40 hours, apparently, to clean up his or her 
finances after something like this happens. So as a first step, 
I am hoping that the VA is going to be thinking about how it is 
going to provide credit monitoring and counseling services to 
the veterans who may be affected. This is a problem that may 
take a lot of time and money to fix, but we are going to need 
to make our veterans whole.
    Beyond that, I think it is important for us to understand 
that, although this may be a mistake of one employee, the 
reality is that this is a system that was destined to failure. 
Just a couple of quick facts. This is a system that scored an F 
in information security in 4 of the past 5 years on a House 
Committee report card. This is a system that in 2001 allowed VA 
employees in Atlanta to steal $11 million in benefits. The VA 
Inspector General, as has already been noted, has argued for 
years that the VA needed to improve its IT security. The VA 
Chief Information Officer abruptly resigned a month ago because 
the agency was not moving fast enough on its IT reorganization.
    So, we cannot pin this on one individual. This is a 
systemic breakdown. The system is so poorly designed that one 
employee could compromise the entire thing. That raises the 
question how could managers not realize that so many files were 
downloaded and brought offsite? And what steps is the VA going 
to take to secure veterans' data used in other programs?
    I hope that through this hearing we can get to the bottom 
of this fiasco. I think we need to hold VA officials 
accountable. We also need to look forward and try to prevent 
identity theft across the private and public sector. It is 
estimated that 10 million consumers are affected annually.
    I understand that Senators Specter and Leahy are going to 
be looking at ways in that Committee to deal with issues of 
identity theft. I hope that all of us work on this. In the 
meantime, we are going to have to figure out how to clean up 
this mess.
    Thank you very much Mr. Chairman, Madame Chair. I look 
forward to the hearing.
    Chairman Craig. Thank you very much, Senator.
    Again on the order with which Senators came to the 
beginning of the hearing, let me turn to Senator Salazar and 
then to Senator Chafee. Thank you.
    Ken.

                   STATEMENT OF KEN SALAZAR, 
                   U.S. SENATOR FROM COLORADO

    Senator Salazar. Thank you very much, Chairman Craig and 
Ranking Member Akaka and Chairman Susan Collins and Ranking 
Member Lieberman, for holding this hearing.
    Let me just say I think my colleagues have stated the 
concerns that we all share. And I know that Secretary Nicholson 
has also stated his concerns and how appalled he is about what 
has happened here with the records of 26.5 million veterans. It 
is a huge issue that we need to address and we need to address 
effectively to make sure that we prevent this kind of thing 
from ever happening again.
    Secondly, we need to make sure that we are taking every 
step in the world possible to safeguard the getting out of this 
information, from where ever this information happens to be 
today.
    But I also think it calls into question, even beyond the 
VA, what is happening with respect to all other Government 
agencies that have huge amount of information and the 
safeguarding of that information in the new kind of technology.
    I was thinking about 26.5 million names and records related 
to 26.5 million names. You know, 20 or 30 years ago you would 
never be able to put that into any kind of a file on a laptop. 
Well, that has all changed. And I think part of what we are 
seeing here is somehow the policies and oversight of 
information within our Government has not kept pace with the 
new technological capacities that have been developed with the 
computer capacities that we currently have.
    So I look forward to working with you, Secretary Nicholson, 
to get us to a solution that will address the issue within the 
VA, but also I think for all of us in Government, we need to 
understand that this is an issue that also goes beyond the VA.
    Thank you and I have a more formal statement for the 
record, Mr. Chairman.
    Chairman Craig. Without objection, it will be a part of the 
record.
    [The prepared statement of Senator Salazar follows:]

   Prepared Statement of Hon. Ken Salazar, U.S. Senator from Colorado

    I want to start by thanking Chairman Craig, Chairman Collins, 
Senator Akaka, and Senator Lieberman for bringing together this 
critical hearing on such short notice. As we all know, one of the 
central questions in this troubling incident relates to whether or not 
the VA could have responded more quickly to the news that the personal 
information of 26.5 million veterans had been compromised. In light of 
those concerns, I believe it is imperative for Congress to act as 
quickly as possible to address this situation, and I hope today's 
hearing will set an example.
    I also want to thank today's panelists for agreeing to come before 
our committees today to discuss this important matter. I realize that 
many of you had to change your plans to be able to be here. But our 
veterans weren't planning on having their information put at risk, 
either, and it's important we do everything within our power to protect 
them during what must be a worrisome time. So, thank you.
    I am extremely troubled by what we learned earlier this week from 
the Department of Veterans' Affairs. First and foremost, I share the 
concern of our Nation's veterans about the potential for misuse of 
their names, birthdates, and Social Security numbers, and the 
consequences--both personal and financial--that could result.
    What is most troubling to me is the nature of the information that 
has been compromised. This is not like losing your keys or your credit 
card, where you can change your locks or your account information. 
These are the fundamental keys to a person's identity, and they could 
be used to open a bank account, take out a loan, obtain lines of 
credit, buy property--and the list goes on. The lives of millions of 
our Nation's veterans could be turned upside down as a result of this 
security lapse.
    Second, this incident raises serious questions about the gaping 
holes in security that exist at VA, and about why more hasn't been done 
about them in recent years. We have known that VA's security safeguards 
are insufficient for years, and yet very little has been done to 
prevent the kind of theft we saw earlier this month. We need to know 
why, and we need to know what the VA plans to do now to ensure this 
kind of nightmare never happens again.
    Finally, as I have mentioned, we need to know more about how this 
event and VA's response to this event unfolded, and why the department 
did not act more quickly to notify law enforcement, Congress, and most 
importantly, our veterans.
    I look forward to working with my colleagues to address this issue. 
I have written to VA urging the department to do everything it can to 
protect our veterans and make sure it doesn't happen again. I am also a 
cosponsor of legislation introduced by Senator Kerry that would require 
VA to provide 1 year of free credit monitoring to affected individuals, 
and one free credit report each year for 2 years thereafter.
    Our Nation owes a debt to our veterans that can never be fully 
repaid. It is deeply concerning to me that the very agency responsible 
for providing these veterans with the care and services they have 
earned failed to protect their most basic personal information. For 
that reason, I am hopeful that we can get to the bottom of some of 
these issues today.
    Thank you.

    Chairman Craig. Senator Chafee.

             STATEMENT OF HON. LINCOLN D. CHAFEE, 
                 U.S. SENATOR FROM RHODE ISLAND

    Senator Chafee. Thank you, very much, Mr. Chairman. 
Welcome, Secretary.
    I share my colleagues great, great concern about what 
occurred and want to work with you, after appropriate 
investigations and reviews are done, to any legislative fixes 
or funding concerns you might have to rectify the situation.
    I noticed in your opening statement, no specific requests 
at this point. But maybe after further reviews and 
investigations, there will be some concrete requests. I look 
forward to working with you on that, and also with Inspector 
General Opfer.
    Thank you, Mr. Secretary. Thank you, Mr. Chairman.
    Chairman Craig. Senator, thank you.
    Senator Pryor.

                 STATEMENT OF HON. MARK PRYOR, 
                   U.S. SENATOR FROM ARKANSAS

    Senator Pryor. Thank you, Mr. Chairman.
    I think most of our colleagues here have covered my 
concerns with the VA and the bad news that we received in the 
last few days regarding the VA. But I do think that this is a 
reminder again, for Members of the Senate and Members of the 
House, that we need to act. And we need to spend time working 
through solutions for this so that the American public can 
protect itself.
    One thing we passed last year, I guess or in the last 
several months, in the Commerce Committee is a security freeze 
bill. Basically what that would allow Americans to do is work 
through a credit bureau and freeze their financial information 
so that someone could not tap into that, get credit cards, 
loans, et cetera, in their name without their permission.
    So, here you have a breach of 26-whatever million veterans 
and the security freeze would allow every person, if they chose 
to, to protect themselves in that way. So I think it is a good 
common-sense solution. It is something that has been through 
the Committee. Hopefully, Senator Frist and Senator Reid will 
work out some time on the floor. I would love to have you all 
look at it when it gets to the floor. I think it is something 
that once you understand what it does and once you see it, you 
will realize the American public would really like to have this 
option to protect themselves against things like this.
    Thank you, Mr. Chairman.
    Chairman Craig. Thank you.
    Mr. Secretary, again welcome to the Committee. Please tell 
us you are mad as hell.

       STATEMENT OF HON. R. JAMES NICHOLSON, SECRETARY, 
DEPARTMENT OF VETERANS AFFAIRS; ACCOMPANIED BY TIM S. McCLAIN, 
        GENERAL COUNSEL, DEPARTMENT OF VETERANS AFFAIRS

    Secretary Nicholson. You can count on that, Mr. Chairman.
    Chairman Craig. Thank you.
    Secretary Nicholson. Mr. Chairman, Members of the 
Committee, I appreciate having this opportunity to appear 
before you to talk about this devastating occurrence that has 
happened in my agency and come to my attention only recently 
and was announced to the veterans and to the public and to the 
Congress this past Monday.
    I am the person ultimately responsible to our veterans. And 
therefore, I am the person responsible for this situation. This 
responsibility rests on me.
    A VA employee, a data analyst, took home electronic data 
files from the VA. He was not authorized to do so. His house 
was burglarized and the data were stolen. This happened on May 
3rd.
    If this were not bad enough, I was not notified about this 
event until May 16th. So I can tell you, as a 34-year veteran 
myself, I am mad as hell. I am outraged by all of this. I am 
outraged that this employee would do this so recklessly. And I 
am outraged that I was not notified of it sooner.
    But I still must carry on and lead the efforts needed to 
get to the bottom of this and take the corrective actions to 
see that this does not happen again. My compass for this is the 
veterans. I feel so badly for them and what they are going 
through potentially and the anxiety that this is causing and 
what it could cause.
    As has been said, these stolen data contained the 
information, including the names and date of birth, for 26.5 
million veterans and some spouses. In addition, that 
information, plus Social Security numbers, were available for 
some 19.6 million of those veterans, of those 26.5 million. 
Also included possibly were some numerical disability ratings 
and the diagnostic codes that identify their disability.
    It is good to note that the data did not include any VA 
electronic health records. Neither did it contain explicit 
financial information, although knowing a disability rating 
code could lead one to compute at least what that compensation 
payment was.
    On May 3rd this employee's home was broken into and local 
law enforcement was notified immediately. They report that they 
think this was a routine breaking and entering. That is, it was 
not a targeted burglary. It was a random burglary.
    The employee has been placed on administrative leave 
pending the outcome of this investigation, with which he is 
cooperating.
    As I have said, I am a veteran and this is just 
incredulous. I am so damned mad at the loss of our veterans 
data and the fact that one person could put all of us at risk, 
one person in violation of VA policies.
    I am just as mad and disappointed that I was not made aware 
of this before I was.
    So, I am upset about the timing of our response. I will not 
tolerate inaction and poor judgment when it comes to protecting 
our veterans.
    Appropriate law enforcement agencies, including local 
police, the FBI, and the Inspector General, have now launched 
full-scale investigations. Authorities believe it is unlikely 
the perpetrators targeted the items stolen because of any 
knowledge of the data contents. It is possible that the thieves 
remain unaware of the information they possess and how to make 
use of it.
    Because of that, we attempted to not be too specific about 
the description of the equipment stolen, the location from 
which it came and other information in general. We do not want 
to provide information to the thieves that might be more 
helpful to the nature of what they have and we still hope this 
was a common theft and that no use will be made in this VA 
data.
    From the moment I was informed, the VA began taking all 
possible steps to protect and inform our veterans. However, 
there were those in the law-enforcement community who wanted me 
to wait longer before announcing this theft, so as to pursue 
leads and to keep the burglars in the dark. I chose to inform 
our veterans nevertheless, but limiting the details of where 
and when initially so as not to tip our hand to the robbers.
    Whether it is one veteran or the numbers we are talking 
about here today, the VA needed to act in a manner that 
maintained a balance between protecting them and informing the 
perpetrators. I chose to get the information out at that point 
to the veterans, in spite of the continuing investigations.
    Another very disturbing aspect of this is that although it 
happened on May 3rd, and this employee informed his boss of 
this fact on that day, as I said, I was not made aware until 
May 16th. Equally disturbing is that Federal law enforcement 
head and investigating agencies were not informed immediately 
either. Local were, but not Federal. It was not until May 10th 
that the VA IG became aware of it.
    I cannot explain these lapses in judgment on the part of my 
people. Most of them are really great, hard-working people. It 
makes me so angry and disappointed. And after the IG finishes 
his investigation as to exactly what happened, I plan to take 
decisive actions. I have to.
    The VA now has also begun a relentless examination of our 
policies and procedures to find out how we can prevent 
something like this from happening again. We will stay focused 
on the problems until we get them fixed. I have formed a 
special task force to examine comprehensively all of our 
information programs and policies to bring about a ringing 
change in the way we do business.
    I have begun recruiting to see if I can find the right 
individual to come into our agency to be the personal 
information security czar, if you will, who has nothing else in 
his or her portfolio, to focus on that and report directly to 
me.
    As has been stated here, ever since 1999 the VA has gotten 
low marks from the IG on its information and cyber security 
programs. Last year the GAO flunked the VA on its cyber 
security system. This has got to change.
    This situation is exacerbated by the fact that the 
Assistant Secretary for IT, who had been at the VA for about 
2\1/2\ years, has just recently resigned. He had come to the VA 
from the private sector, from Dell. He has returned to the 
private sector. He did a very good job and I will say that I 
think we are off to a real solid start in the IT transformation 
that we are doing.
    And this is beyond the scope here, but VA has gotten 
decentralized down literally to almost clinics, of which there 
are 900. We are pulling this back into a centralized format in 
this major IT transformation that we are in. And that is 
launched. But as is painfully evident, we have a great deal to 
do.
    I was also pleased that just yesterday, President Bush 
announced his intention to nominate a brilliant, recently 
retired Navy Admiral that we have recruited to come into our 
agency to head up our Office of Policy and Planning, which is 
the office in which this transgression occurred. We hope to 
have him on board very soon.
    Additionally, we are taking direct and immediate action to 
address and alleviate veterans' concerns and to regain their 
confidence. Those actions include that we have directed all VA 
employees to complete the VA Cyber Security Awareness Training 
Course and a separate General Employee Privacy Awareness course 
and to do so by June 30th of this year.
    I have also directed that a memo be issued requiring all VA 
employees to sign annually an employee statement of awareness, 
including their awareness of the Privacy Act, their awareness 
as to unauthorized disclosing or using directly or indirectly 
information obtained as a result of their employment in the VA, 
which is of a confidential nature or represents a matter of 
trust, or other information so obtained of such a character 
that its disclosure or use would be contrary to the best 
interest of the veterans and of their awareness of the loss or 
damage or unauthorized use of Government property or its 
carelessness or negligence in its use therein.
    Additionally, the Department will immediately be conducting 
an inventory and review of all current positions requiring 
access to VA data.
    This, I think, is a very important point because, as it 
turns out, we do not know anything about these people. The 
person who took this data home, the last that I can tell, had a 
background check, just a National Agency and Inquiries Check, 
32 years ago. Yet, we entrust this kind of data to people.
    And I might say, by the way, and this is not said in anyway 
as some kind of an excuse, but this man or others, they do not 
have to carry this data out. They can send it out. If they have 
Internet Explorer on their computer, they can send it to their 
account and then get on their own computer and receive it.
    I also would tell you, and please, this is not said in any 
way to excuse or mitigate what happened thus, but I am holding 
in my hand a hard drive. This is unrelated to the equipment in 
this incident. But that data that we are talking about for 
these 26.5 million veterans is 5 gigabytes. This little thing 
right here, that slips so easily into my vest pocket, holds 60 
gigabytes. We could have 12 times the data that is the subject 
of this pain that we are in on this thing, this little hard 
drive.
    This, as you probably all know, which most people that use 
these use them as a key chain, and call them most commonly a 
thumb drive, this would hold about three-quarters of the data 
that we are talking about, this size. Most people that use 
these in my agency have them hanging around their neck with 
their ID card and walk in and out.
    There are lots of things that we are going to have to do as 
an agency, and I think as a Government. But the key, it seems 
like to me, is going to be the law. And by the way, this person 
did not violate any law, because there is no law. We have 
internal policies against what he did. But he did not violate 
the law, as near as I can tell.
    And we are going to have to--for people that have access to 
this kind of data, we are going to have to know something about 
them. If they were in the military and they were privy to 
confidential information, they would have a background 
investigation. And a lot of that, you read in the paper what we 
are giving them access to.
    So, I am proposing that we are going to do an updated 
National Agency Check on those. And for those that have special 
access, request a minimum background investigation.
    I have directed the Office of Information and Technology to 
publish by June 30th a VA directive and revisions to security 
guidelines for single user remote access developed by the 
Office of Cyber and Information Security. This document will 
set the standards for access, for use and information security, 
including physical security and reporting.
    We are working with Members of the Congress, the VSOs and 
the news media and other agencies to ensure that other veterans 
and their families are aware of this situation and the steps 
that they may take to protect themselves for the misuse of 
their personal information.
    We are coordinating with other agencies to send individual 
notifications to all 19.6 million individuals whose Social 
Security numbers were stolen. That is, we are going to send a 
letter to each of these people, instructing them and asking 
them to be both vigilant in order to detect any signs of 
possible identity theft and how to protect themselves.
    As you know, in the meantime, they can go to the Internet 
portal we have established, which is www.FirstGov.gov, for 
information on this matter. And this is a Federal site that is 
capable of handling a great amount of traffic.
    Additionally, we have set up a manned call center that 
veterans can use to get information and learn more about 
consumer identity protections. You can reach that with a toll-
free number of 1-800-333-4636. It operates 14 hours a day and 
will as long as it is needed. It can handle 20,000 calls per 
hour. By the end of the day yesterday, concerned veterans had 
made a total of 105,753 calls to this number.
    I do want to acknowledge the significant efforts of 
numerous Government agencies in assisting the VA to prepare for 
the announcement last Monday. Agencies at all levels pitched in 
to ensure that our veterans had information on actions that 
they could take with respect to their credit. Hundreds of 
people worked around the clock, that is they worked through the 
night, in helping to set up these call centers and get the 
messages composed and out and did a yeoman's job. I want to 
thank each of them and these agencies for their efforts on 
behalf of our veterans.
    The three national credit card bureaus have established 
special procedures to handle inquiries and requests for fraud 
alerts from veterans. Experian and TransUnion have placed a 
front-end message on their existing toll-free fraud lines, 
bypassing the usual phone tree with instructions for placing a 
fraud alert. Equifax has set up a new toll-free number for 
veterans to place fraud alerts.
    The new procedures became operational on Tuesday. The 
bureaus report a spike in phone calls, 171 percent of normal, 
and in requests for free credit report through the annual free 
credit report web site.
    The Federal Trade Commission also experienced high call 
volumes about the incident earlier this week.
    On Monday, the Office of Comptroller of the Currency 
notified its examiners of this theft. On Tuesday, the Office of 
Comptroller posted an advisory on an Internet network available 
to its banks and instructed the examiners to direct their banks 
to the advisory. It explains what happened and asks the banks 
to exercise extra diligence in processing veterans' payments. 
The advisory also reminds banks of their legal obligations to 
verify the identities of persons seeking to open new accounts 
and to safeguard customer information against unauthorized 
access or use and attaches a summary of relevant regulations.
    I briefed the Attorney General and the Chairman of the 
Federal Trade Commission, the co-chairs of the President's 
Identity Theft Task Force, shortly after I became aware of this 
occurrence. They have been very cooperative. Task Force members 
have already taken actions to protect the affected workers, 
including--excuse me, to protect the affected veterans, 
including working with the credit bureaus to help ensure that 
veterans receive free credit reports that they are entitled to.
    Additionally, the Task Force met on Monday to coordinate 
the comprehensive Federal response to recommend further ways to 
protect affected veterans and increase safeguards to prevent 
the recurrence of such incidents. On Monday following the 
announcement of this incident, I also issued a memorandum to 
all VA employees. The purpose was to remind them of the public 
trust that we hold and to set forth the requirements that all 
employees complete their annual general privacy training and 
cyber security for this current year by the end of next month.
    Following that, all will be required to sign a statement of 
commitment and understanding which will acknowledge the 
consequences for noncompliance.
    Information security is challenging business and ultimately 
it depends on the integrity and the ethics of the workforce. As 
has been said here, as technology has advanced, it has become 
possible to store vast quantities of data on devices no larger 
than one's thumbnail.
    All of us carry a cell phone, a BlackBerry or a personal 
digital assistant, and each of these contains vast quantities 
of data. Someone intent on taking this data and using it 
inappropriately has many opportunities to do that.
    It is also the fact that great numbers of people in this 
agency and in this Government telecommute. For example, 
yesterday I was talking to an employee of ours who is an 
information technology specialist. And he told me of needing 
some medical records. He asked for them to be burned onto a CD, 
and that was done and it was delivered to him very promptly and 
neatly.
    And so he wrote the person an e-mail back saying thank you 
for this prompt, efficient work. He said, ``By the way, where 
do you work here in the central office? Maybe we could have a 
cup of coffee some time.'' And the person responded by saying, 
``I do not work in the central office. I work in South 
Dakota.''
    It illustrates how far-flung and distended some of this has 
gotten. We need obviously to know who they are, know what kind 
of people they are out there with this data, and absolutely get 
better control over it.
    And I promise you that we are going to do everything in our 
power to structure a regime at the VA that makes clear what is 
proper in the use of data by our employees and train our 
employees in those policies and enforce them.
    We have already begun discussions regarding the immediate 
automatic encryption of all sensitive information. We will also 
work with the President's Task Force on Identity Theft. I am a 
member of the Task Force. And it will help to structure 
policies that will be put in place throughout the Government to 
help ensure that situations such as this do not occur at other 
agencies.
    In summary, Mr. Chairman and Members of the Committees, I 
want to say that the VA's mission is to serve and honor our 
Nation's veterans, and we take it very seriously. I am also 
proud to say that most of the 235,000 people that work there 
are terrific and take it seriously and are dedicated to our 
veterans. So, I am so saddened by what has happened here, in 
this case by one person, and the anxiety and concern that this 
is causing to our veterans and our families because they have 
enough to deal with.
    We honor the service of our veterans and we consider it a 
privilege to work for them at our agency. I want you and them 
to know that we are and are going to work hard to keep this 
most awful thing from happening again.
    Thank you.
    [The prepared statement of R. James Nicholson follows:]

       Prepared Statement of Hon. R. James Nicholson, Secretary, 
                     Department of Veterans Affairs

    Mr. Chairman and Members of the Committee:
    Thank you for the opportunity to appear before you today to explain 
a devastating situation.
    A VA employee, a data analyst, took home electronic data files from 
VA. He was not authorized to do so.
    These data contained identifying information including names and 
dates of birth for up to 26.5 million veterans and some of their 
spouses. In addition, that information, plus social security numbers, 
was available for some 19.6 million of those veterans. Also possibly 
included were some numerical disability ratings and the diagnostic 
codes which identify the disabilities being compensated.
    It is important to note that the data did not include any of VA's 
electronic health records. Neither did it contain explicit financial 
information, although knowing of a disability rating could enable one 
to compute what that implied in terms of compensation payments.
    On May 3, the employee's home was broken into in what appears to 
local law enforcement to have been a routine breaking and entering, and 
the VA data were stolen. The employee has been placed on administrative 
leave pending the outcome of an investigation with which I understand 
he is cooperating.
    I am outraged at the loss of this veterans' data and the fact an 
employee would put it at risk by taking it home in violation of VA 
policies. However, the employee promptly reported the theft to the 
local police and to the Department of Veterans Affairs. But it was not 
until May 16th that I was notified. I am gravely concerned about the 
timing of the Department's response once the burglary became known. I 
will not tolerate inaction and poor judgment when it comes to 
protecting our veterans.
    Appropriate law enforcement agencies, including local police, the 
FBI and the VA Inspector General's office, have launched full-scale 
investigations into this matter. Authorities believe it is unlikely the 
perpetrators targeted the items stolen because of any knowledge of the 
data contents. It is possible that the thieves remain unaware of the 
information they possess or of how to make use of it. Because of that, 
we have attempted to describe the equipment stolen, the location from 
which it was stolen and other information in very general terms. We do 
not want to provide information to the thieves that might be 
informative as to the nature of what they have stolen. We still hope 
that this was a common theft, and that no use will be made of the VA 
data.
    From the moment I was informed, VA began taking all possible steps 
to protect and inform our veterans.
    In our post-disclosure assessment, we have seen the gaps between 
what we said and the way we are seen.
    VA has begun a top to bottom examination of our business, policies, 
and procedures to find out how we can prevent something like this from 
happening again. We will stay focused on the problems until they are 
fixed. In addition, we will take direct and immediate action to address 
and alleviate veterans' concerns and to regain their confidence.
    I have taken the following actions so far:
     I have directed all VA employees to complete the annual 
``VA Cyber Security Awareness Training Course'' and complete the 
separate ``General Employee Privacy Awareness Course'' by June 30, 
2006.
    This includes:
     The Privacy Act;
     Unauthorized disclosing or using, directly or indirectly, 
information obtained as a result of employment in VA, which is of a 
confidential nature or which represents a matter of trust, or other 
information so obtained of such a character that its disclosure or use 
would be contrary to the best interests of the VA or veterans being 
served by it; and,
     Loss of, damage to, or unauthorized use of Government 
property, through carelessness or negligence, or through maliciousness 
or intent.
     I have also directed that all VA employees sign annually 
an Employee Statement of Commitment and Understanding which will also 
acknowledge consequences for non compliance.
    In addition the Department will immediately begin to conduct an 
inventory and review of all current positions requiring access to 
sensitive VA data. The inventory will determine whether positions in 
fact require such access. We will then require all employees who need 
access to sensitive VA data to do their jobs to undergo an updated 
National Agency Check and Inquiries (NACI) and/or a Minimum Background 
Investigation (MBI) depending on the level of access required and the 
responsibilities associated with their position.
    And I have directed the Office of Information & Technology to 
publish, as a VA Directive, the revisions to the Security Guidelines 
for Single-User Remote Access developed by the Office of Cyber and 
Information Security. I have asked that this be done by June 30, 2006. 
This document will set the standards for access, use, and information 
security, including physical security, incident reporting and 
responsibilities.
    VA is working with Members of Congress, the news media, veterans' 
service organizations, and numerous government agencies to help ensure 
that those veterans and their families are aware of the situation and 
of the steps they may take to protect themselves from misuse of 
personal information.
    VA is coordinating with other agencies to send individual 
notifications to those individuals whose social security numbers were 
stolen, instructing them to be vigilant in order to detect any signs of 
possible identity theft and telling them how to protect themselves. In 
the meantime, veterans can also go to www.firstgov.gov for more 
information in this matter. This is a Federal Government Web site 
capable of handling large amounts of web traffic.
    Additionally, working with other government agencies, VA has set up 
a manned call center that veterans may use to get information about 
this situation and learn more about consumer-identity protections. That 
toll free number is 1-800-FED INFO (333-4636). The call center is 
operating from 8 am to 9 pm (EDT), Monday-Saturday as long as it is 
needed. The call center is able to handle up to 20,000 calls per hour 
(260,000 calls per day). Through the end of the day on Tuesday, 
concerned veterans had made a total of 105,753 calls to this number.
    I want to acknowledge the significant efforts of numerous 
government agencies in assisting VA to prepare for our announcement on 
May 22nd. Agencies at all levels of the Federal Government pitched in 
to ensure that our veterans had information on actions they could take 
to protect their credit. Hundreds of people worked around the clock 
writing materials to inform the veterans and setting up call centers 
and a website to ensure maximum dissemination of the information. I 
want to personally thank each of those agencies and those individuals 
for their selfless efforts on behalf of our veterans.
    The three nationwide credit bureaus have established special 
procedures to handle inquiries and requests for fraud alerts from 
veterans.
    Experian and TransUnion have placed a front-end message on their 
existing toll-free fraud lines, bypassing the usual phone tree, with 
instructions for placing a fraud alert. Equifax has set up a new toll-
free number for veterans to place fraud alerts. The new Equifax number 
is 1-877-576-5734. The new procedures became operational on Tuesday. 
The bureaus report a spike in phone calls (171 percent of normal) and 
in requests for free credit reports through the annual free credit 
report web site (annualcreditreport.com). The Federal Trade Commission 
also experienced high call volumes about the incident earlier this 
week.
    On Monday, the Office of Comptroller of the Currency notified its 
examiners of the theft. On Tuesday, OCC posted an advisory on an 
internal network available to its banks and instructed the examiners to 
direct their banks to the advisory. It explains what happened and asks 
the banks to exercise extra diligence in processing veterans' payments. 
The advisory also reminds the banks of their legal obligations to 
verify the identities of persons seeking to open new accounts and to 
safeguard customer information against unauthorized access or use. It 
also includes a summary of relevant laws and regulations.
    I briefed the Attorney General and the Chairman of the Federal 
Trade Commission, co-chairs of the President's Identity Theft Task 
Force, shortly after I became aware of this occurrence.
    Task Force members have already taken actions to protect the 
affected veterans, including working with the credit bureaus to help 
ensure that veterans receive the free credit report they are entitled 
to under the law. Additionally, the Task Force met on Monday to 
coordinate the comprehensive Federal response, recommend further ways 
to protect affected veterans, and increase safeguards to prevent the 
recurrence of such incidents.
    On Monday, following the announcement of this incident, I also 
issued a memorandum to all VA employees. The purpose was to remind them 
of the public trust we hold and to set forth the requirement that all 
employees complete their annual General Privacy Training and VA Cyber 
Security Awareness training for the current year by June 30.
    As technology has advanced, it has become possible to store vast 
quantities of data on devices no larger than one's thumb. All of us 
carry a cell phone, a BlackBerry or a Personal Digital Assistant, and 
each of these contains vast quantities of data. Someone intent on 
taking such data and using it inappropriately would have many 
opportunities to do that.
    I can promise you that we will do everything in our power to make 
clear what is appropriate and inappropriate use of data by our 
employees. We will train employees in those policies, and we will 
enforce them. We have already begun discussions regarding the immediate 
automatic encryption of all sensitive information.
    We will also work with the President's Task Force on Identity 
Theft, of which I am a member, to help structure policies that will be 
put in place throughout the government to ensure that situations such 
as this do not occur at other agencies.
    VA's mission to serve and honor our Nation's veterans is one we 
take very seriously and the 235,000 VA employees are deeply saddened by 
any concern or anxiety this incident may cause to those veterans and 
their families. We honor the service our veterans have given their 
country and we are working diligently to protect them from any harm as 
a result of this incident.
                                 ______
                                 
    Response to Written Questions Submitted by Hon. Daniel K. Akaka 
                       to Hon. R. James Nicholson

    On February 11, 2005, Office of Management and Budget (OMB) Deputy 
Director for Management Clay Johnson issued a memorandum directing each 
agency to designate a senior official who would have agency-wide 
responsibility for privacy issues relative to information management.
    Question 1a. Who is VA's senior privacy official? When was this 
position established at VA?
    Question 1b. What training does VA's designated privacy official 
receive? Is this training then passed on to all agency personnel? 
Please provide a copy of the training documents VA provides its 
employees.
    Question 1c. I understand that OMB meets with all the agencies' 
senior privacy officials and their teams to review the status of the 
agencies' privacy programs. Has OMB met with VA's privacy official, and 
if so, do you know what OMB found with respect to VA's privacy program? 
If problems were found, how has VA addressed the problems identified? 
Are the problems identified by OMB still remain at VA?
    Question 1d. If the privacy official has a concern about an agency 
practice or program, what enforcement authority does he or she have? To 
whom does the senior privacy official report?
    Question 1e. What is the working relationship between the VA 
privacy official and Privacy and Civil Liberties Oversight Board?
    Question 2. Recently VA announced the naming of Special Advisor for 
Information Security. What will be the role and responsibilities of the 
Special Advisor? How will the responsibilities and duties of this 
official differ from those assigned to the senior privacy official? How 
will this individual work with the senior official designated for 
privacy issues and the Chief Information Officer at VA?
    Question 3. The Privacy Act does not require the VA to provide 
notice of a data breach. What Federal or state law required the VA to 
notify the public of the data breach?
    Response. VA did not respond to the questions.
                                 ______
                                 
          Written Questions Submitted by Hon. Norm Coleman to 
                        Hon. R. James Nicholson

    The senior VA employee who took the sensitive information home was 
working on a project which involved improving telephone interactions 
between the Department and Veterans. While the employee was authorized 
to have access to this data in connection with the project, the 
employee was not authorized to take the data home to work on it. 
Although the employee received the required training on protecting the 
privacy and security of this kind of information and knew it was 
against VA policy, the employee still chose to take it home.
    Question 1a. How confident are you that other VA employees do not 
similarly have confidential data in their homes? Can we be 100 percent 
confident?
    Question 1b. Would you say it is routine for employees who have 
access to sensitive information to remove it from the VA to work on at 
home? Is it easy to remove this information?
    Question 1c. Is there any way for you to know how many employees 
remove sensitive information from the VA?
    Question 1d. Are employees aware of the penalties for removing 
sensitive information from the VA? Can you tell us what the penalties 
are?
    Mr. Secretary, you found out about the security breech on May 16th, 
yet veterans were not informed until May 22nd. On May 19th, the 
Inspector General and your staff decided not to go public because the 
hotline being established by the FTC to handle veterans' calls had not 
been fully set up. However, when this type of security breech has 
happened in the private sector, consumers have been alerted very 
quickly, often in less than 24 hours.
    Question 2a. Do you still think it was the right decision to wait 
to inform veterans that their information may have been compromised?
    Question 2b. What would have been the downside to making an 
announcement so veterans could begin reviewing their financial 
information while putting information on your website and saying a call 
center would be up and running in a few days?
    Question 2c. Are you getting any feedback on whether the call 
centers are helpful? Is the VA partnering with the Veterans Service 
Organizations to provide information to their members about what 
happened and what they can do to protect this information?
    On May 3rd, the same day as the discovery of the burglary and 
theft, the VA employee called and reported to a supervisor and VA 
security officials the loss of sensitive privacy data. However, Mr. 
Secretary, you did not find out until almost 2 weeks later on May 16th.
    Question 3a. Do you recall your reaction when you found out about 
this?
    Question 3b. Did you inquire why something of this magnitude took 
almost 2 weeks to reach your desk?
    Question 3c. When did you become aware that your Chief of Staff 
knew this information a week earlier?
    Question 3d. Do you know why you were not told at that time of what 
had happened?
    Question 3e. Is it customary for important matters such as this to 
be caught up in bureaucracy for 2 weeks or is there a system in place 
to get things to you quicker? If so, do you know why this information 
did not get to you sooner?
    Since 2001, the VA Inspector General has warned that access 
controls were a ``material weakness'' in the department's security of 
information. Vulnerabilities cited included operating systems, 
passwords, and a lack of strong detection alerts. While this case 
involved a VA employee with authorized access to sensitive information, 
I am concerned the VA is also vulnerable to a cyber-attacker without 
authorized access that breaks into the system and removes sensitive 
information.
    Question 4a. Mr. Secretary, how vulnerable is the VA to a cyber-
attack from someone outside of the VA who has no authorization to any 
VA information?
    Question 4b. Were you aware of the VA Inspector General's reports 
that were critical of the department's information protection systems?
    Question 4c. What actions has the department taken to improve 
information security since you became Secretary in February, 2005?
    Response. VA did not respond to the questions.
                                 ______
                                 
        Written Questions Submitted by Hon. Pete V. Domenici to 
                        Hon. R. James Nicholson

    Question 1. In recent years identity theft has become a major issue 
in this country. Given that the theft of personal information is 
nothing new, what policies and procedures did the Department of 
Veterans Affairs have in place prior to this incident to insure the 
personal data of our Nation's veterans was protected?
    Question 2. It is my understanding that to date there is no 
evidence anyone has illegally used the missing data belonging to 26.5 
million of our Nation's veterans including names, social security 
numbers, and dates of birth. However, I am particularly concerned for 
those veterans who are retired or nearing retirement and who may be on 
a fixed income and therefore less able to respond to the consequences 
of identity theft. How is the VA preparing to minimize the disturbance 
to their lives in the event this stolen information is improperly used? 
Furthermore, what steps has the VA taken to notify the 26.5 million 
veteran's involved in this incident?
    Question 3. In light of this loss of information, I think it is 
clear the Department of Veterans Affairs must take steps to better 
protect sensitive personal data in the future. At this time, what 
changes has the VA implemented or plans to implement to insure veterans 
do not have to face the fear of their personal information being 
misused in the future?
    Response. VA did not respond to the questions.
                                 ______
                                 
       Written Questions Submitted by Hon. Lincoln D. Chafee to 
                        Hon. R. James Nicholson

    Question 1. Members of our military have risked their lives in 
service of our country. Our grateful Nation fully supports veterans 
programs, including medical, educational, employment, and other 
assistance. I too support these important programs. In all times, and 
especially in a time of war, ensuring our veterans receive the best 
medical care is our Nation's duty. Earlier this year, in his budget 
request, the President proposed higher fees and co-pays for certain 
veterans receiving VA assistance. In my view, a policy that leads to 
increased denial of service to veterans is simply unacceptable, which 
is why I cosponsored an amendment to the Budget allocating money for 
the government to cover these costs. Secretary Nicholson, what are you 
doing to make sure quality VA care remains accessible to all veterans 
who need it?
    Question 2. Battlefield medicine has made huge strides in the last 
few decades. The result has been a much higher percentage of wounded 
soldiers living through their initial injuries, able to return home to 
their families. These wonderful advances in medicine deserve our 
praise, but they mean that the VA will be caring for more and more 
injured soldiers as they return home. Many of these injuries, such as 
burns, amputations, blindness, and PTSD, are of the type that will 
require care for a lifetime. How is the VA preparing for an increase in 
the number of veterans who will require long term medical assistance? 
Furthermore, how is the VA making sure it immediately cares for 
returning Iraq War veterans, but does not forget about those older 
veterans who continue to require medical assistance?
    Response. VA did not respond to the questions.

    Chairman Craig. Mr. Secretary, thank you very much.
    As you have noted, the Secretary is accompanied by Tim 
McClain, who is General Counsel for the Department of Veterans 
Affairs.
    You will notice there are two empty chairs. George Opfer, 
Inspector General for the Department of Veterans Affairs, I do 
not know if he was held hostage. At least he was detained in 
the U.S. House of Representatives. And I understand he is en 
route or nearly here. So the moment he arrives, we will allow 
him to make his statement before we go to questions. In the 
meantime, I will ask the Secretary a question.
    Mr. Secretary, you have mentioned, as many of our 
colleagues here have mentioned, that there has been a long 
history of Inspector General review and litany recommending 
greatly improved informational technology security at VA. In 
fact, a grade of ``F'' and the word flunk have been used.
    I do not know if this is the ultimate wake-up call, but it 
most assuredly appears to be.
    Does VA have some legitimate reason why it ignored IT 
security recommendations from the IG for 4 years running?
    Now I know your watch has not been during all of those 
periods of time. But I am greatly concerned that it took 
something like this to begin to unravel the rigidity of a 
bureaucracy that would deny the legitimate approach of an 
overall encompassing IT system that now we must get at the 
business of doing.
    Your reaction.
    Secretary Nicholson. My reaction, Mr. Chairman, is that 
there is no excuse for this. I have been there 15 months and I 
am aware of those previous years' reports and the assessment 
that we got. We did launch this significant change in the way 
that we are going to do IT business by pulling it back and 
centralizing it, which would give us considerably more control 
and accountability. But that is just in the launch phase.
    I also have discovered that there have been directives that 
have been issued by my predecessor to which there has been no 
attention given. There are directives that have come out which 
are called guidelines, which some employees do not interpret as 
being mandatory or operative to them, because they are a 
guideline. I have had that discussion just yesterday with some 
employees in that respect.
    So the whole thing needs to really be tightened up. We are 
on that path, I will say, and give the recently departed CIO 
credit for getting us there. But it is nascent, just starting.
    Chairman Craig. Mr. Opfer, we appreciate your being able to 
make it.
    We will allow you to sit down and take a deep breath, and 
we would ask that you--the Secretary has just completed his 
statement and we were just starting into a round of questions. 
But we want you to make your statements so that the questions 
of my colleagues can be directed to either of you.
    You are accompanied by Jon Wooditch is that correct?
    Mr. Opfer. Yes, sir.
    Chairman Craig. Deputy Inspector General, Department of 
Veterans Affairs.
    So Mr. Inspector General, please proceed with your 
statement, if you would, please.

     STATEMENT OF HON. GEORGE J. OPFER, INSPECTOR GENERAL, 
DEPARTMENT OF VETERANS AFFAIRS; ACCOMPANIED BY JON A. WOODITCH, 
                   DEPUTY INSPECTOR GENERAL, 
                 DEPARTMENT OF VETERANS AFFAIRS

    Mr. Opfer. Thank you, Mr. Chairman and Members of the 
Committee. Thank you for the opportunity to testify today on 
the loss of VA sensitive data.
    I am prepared to give a short statement and request that my 
full statement be submitted for the record.
    Chairman Craig. Without objection, it will.
    Mr. Opfer. I am accompanied, as you said, Mr. Chairman, by 
Jon Wooditch, the Deputy Inspector General, and Mike Stanley, 
the Assistant Inspector General for Audits.
    My statement will focus on the incident involving a VA 
employee who took home sensitive data and confidential 
information which was stolen from the employee's home when it 
was burglarized.
    Our involvement in this matter from the IG perspective is 
threefold. One, an ongoing criminal investigation into the 
theft of the data. Two, an administrative investigation. And 
three, a review of the VA policies and procedures for using and 
protecting privacy data.
    In addition to discussing each of these reviews, my 
statement will also provide an overview of the OIG reports that 
have shown the need for continued improvements in addressing 
information security weaknesses in VA and the status of those 
OIG recommendations for corrective action.
    On May 3rd, the home of a VA employee was burglarized. 
According to the employee, information stolen included the 
names, birth dates and Social Security numbers of approximately 
26.5 million veterans that was stored on his personally owned 
computer hardware. The employee said that he routinely took 
sensitive data home to work on and has been doing so since 
2003.
    On Wednesday, May 10th, an Information Security Officer of 
the OIG, while attending a routine meeting at VA, heard that a 
VA employee's home had been burglarized and that VA electronic 
records may have been stolen. Following the meeting, the OIG 
employee gathered additional facts about the incident. On the 
following day, he submitted a written report to alert the 
Office of Investigations of the Office of Inspector General.
    On May 12th, the OIG opened a criminal investigation and 
initiated efforts to locate and interview the employee and 
those others that had information regarding the theft of the 
sensitive data.
    On May 15th, we interviewed the employee. The employee 
advised us that he believed several electronic files containing 
veteran information stored on his personally owned computer 
hardware had been stolen during a burglary. He thought that 
stolen information included the names, birth dates and Social 
Security numbers of approximately 26.5 million veterans.
    On May 16th, we met with the Montgomery County Police 
Department, who had initiated an investigation of the burglary. 
We informed the Montgomery County Police Department of the 
suspected loss of millions of veterans' personal identifiers. 
We learned that the detectives were actively pursuing leads 
developed in a number of recent burglaries in the employee's 
neighborhood.
    On May 17th, we advised the FBI and the Assistant United 
States Attorney of the details of the burglary and the possible 
loss of the data. On the next day, we also faxed a letter 
listing these details to the FBI.
    Since then we have been conducting a joint investigation 
focused on the recovery of the stolen data. To date, we have 
received no indication or information that the data has been 
further compromised.
    In the administrative investigation, our investigation will 
determine if notifications of the incident were made, and if 
those notifications were pursued in an appropriate and timely 
manner. We are developing a chronology of when key staff and 
managers were informed of the incident, what information was 
conveyed to these individuals, and what actions they took.
    As part of the investigation, we will determine if the work 
the employee was performing at home was related to his official 
duties and if he had appropriate authorization to take 
individually identifiable data to his residence. We will also 
determine if the employee complied with relevant policies and 
procedures.
    The recent incident also raises concerns about whether VA 
has adequate policies and procedures in place to protect 
confidential and privileged information maintained in VA 
electronic databases. To address this issue, we have initiated 
a review to determine whether VA has effective policies to 
ensure compliance, whether VA employees are aware of these 
policies, and whether there is an effective mechanism for 
reporting violations and taking appropriate actions.
    The review will identify strengths and weaknesses in VA 
policies. We will make recommendations for improvement to 
ensure the data maintained by VA is protected from unwanted 
intrusion and disclosure.
    In closing, I would like to assure the Committee that this 
matter will remain the highest priority in the OIG until it is 
resolved. I will assure you that all of the resources that we 
have that are needed to complete our reviews in a thorough and 
timely matter will be dedicated to the goal of recovering the 
stolen data and protecting the Nation's veterans.
    Mr. Chairman and Members of the Committee, thank you again 
for the opportunity to appear and to answer any questions.

    Prepared Statement of Hon. George J. Opfer, Inspector General, 
                     Department of Veterans Affairs

                              INTRODUCTION

    Mr. Chairman, Madam Chairman, and Members of the Committees, thank 
you for the opportunity to testify today on the loss of Department of 
Veterans Affairs (VA) sensitive data. I am accompanied by Jon Wooditch, 
Deputy Inspector General, and Mike Staley, Assistant Inspector General 
for Auditing. My statement will focus on the incident involving a VA 
employee who took home sensitive and confidential information, which 
was stolen when the employee's home was burglarized. The Office of 
Inspector General's (OIG) involvement in this matter involves a three-
pronged approach including (1) a criminal investigation, (2) an 
administrative investigation of the handling of this matter once 
reported to the Department, and (3) a review of VA policies and 
procedures for using and protecting privacy data. In addition to 
discussing each of these reviews, I will also provide an overview of 
the OIG reports that have shown the need for continued improvements in 
addressing information security weaknesses in VA, and the status of OIG 
recommendations for corrective action.
    On May 3, 2006, the home of a VA employee was burglarized. 
According to the employee, the information stolen included the names, 
birthdates, and social security numbers of approximately 26.5 million 
veterans that was stored on personally owned computer hardware. The 
employee, a data analyst, was authorized access to sensitive VA 
information in the performance of his duties and responsibilities. He 
said that he routinely took such data home to work on it, and had been 
doing so since 2003.

                         CRIMINAL INVESTIGATION

    On Wednesday, May 10, 2006, our Information Security Officer (ISO), 
while attending a routine meeting at VA Central Office, heard another 
ISO mention that a VA employee's home had been burglarized and that VA 
electronic records may have been stolen. Following the meeting, our ISO 
gathered additional facts about this incident. On the following day, he 
submitted a written report to his supervisor for the purpose of 
alerting our Office of Investigations. On May 12, 2006, a criminal 
investigation was initiated and efforts commenced to identify and 
interview the employee.
    On Monday, May 15, 2006, we interviewed the employee. The employee 
advised us that he believed that several electronic files containing 
veteran information stored on personally owned computer hardware had 
been stolen during the burglary at his home on May 3, 2006. He thought 
the stolen information included the names, birthdates, and social 
security numbers of approximately 26.5 million veterans.
    On May 16, 2006, we met with the Montgomery County Police 
Department who had initiated an investigation of the burglary when 
notified on May 3, 2006. We informed them of the suspected loss of 
millions of veterans' personal identifiers. We learned that detectives 
were actively pursuing leads developed in a number of recent 
residential burglaries in the employee's neighborhood.
    On May 17, 2006, we apprised the Federal Bureau of Investigation 
(FBI) and an Assistant United States Attorney of the details of this 
burglary and possible loss of data. The next day, we also faxed a 
letter listing these details to the FBI. Since then, we have been 
conducting a joint investigation with the FBI and the Montgomery County 
Police Department focused on the recovery of the stolen data. To date, 
there has been no indication that this data has been further 
compromised.

                      ADMINISTRATIVE INVESTIGATION

    We have also initiated an administrative investigation to determine 
if notifications of the incident were made, and if those notifications 
were pursued in an appropriate and timely manner. We are developing a 
chronology of when key staff and managers were informed of the 
incident, what information was conveyed to these individuals, and what 
actions they took. We are also identifying what VA electronic data the 
employee stored at his home, whether the employee had an official need 
for the data, why he took it to his home, and who in his supervisory 
chain approved or had knowledge that he had done so.
    We have interviewed the employee, his supervisors, project 
managers, and co-workers; privacy, information security, and VA law 
enforcement officials; Office of General Counsel attorneys, including 
the General Counsel; and the VA Chief of Staff. We are also reviewing 
electronic mail messages pertinent to the incident; notes and memoranda 
prepared by the employee, General Counsel, and other staff; 
documentation of the employee's access to VA databases; and other 
pertinent documentation.
    According to the employee, he likely had VA electronic data stolen 
during the burglary of his residence, but he was not certain of the 
type and extent of the specific information taken. He said he believed 
it contained approximately 26.5 million veterans' names, social 
security numbers, and dates of birth, extracted from a VA database, and 
possibly other smaller files containing information about individual 
veterans was also taken. We are currently reviewing the computer discs 
he used to take data home to determine what other information may have 
been stolen.
    The employee, a data analyst, had an official need to access the 
records believed to have been stolen. The nature of his work was 
project-focused and involved manipulating large quantities of data to 
address certain policy issues. The employee told us he took the data 
home for work-related purposes. However, none of his supervisors we 
talked to said they were aware that the employee had taken the file 
containing approximately 26.5 million veterans' records to his 
residence.
    As part of our investigation, we will determine if the work the 
employee was performing at home was related to his official duties, and 
if he had appropriate authorization to take individually identifiable 
data to his residence. We will also determine if the employee complied 
with relevant policies and procedures in taking this information home 
and properly protecting it. Our report will identify what breakdowns 
occurred that may have hindered timely notification and follow-up of 
this incident. Based on our investigation, we will make recommendations 
for appropriate action, if warranted.

      REVIEW OF LAWS, REGULATIONS, AND VA POLICIES AND PROCEDURES 
                ON SAFEGUARDING CONFIDENTIAL INFORMATION

    The recent incident raised concerns about whether the VA has 
adequate policies and procedures in place to protect confidential and 
privileged information maintained in VA's electronic databases. Our 
concerns are whether VA policies are adequate to ensure compliance with 
information security laws, the Privacy Act and other confidentiality 
laws and regulations, and to identify and take action when there is a 
violation of law or policy. There are two sets of laws and implementing 
regulations to protect the integrity of confidential data--computer 
security laws and confidentiality statutes. While the intent of both 
sets of laws is the same--the protection of information--the approach 
is different. Computer security laws ensure that the system 
infrastructure on which the data is maintained electronically is 
protected against unauthorized intrusions such as viruses and 
unapproved access. The Privacy Act and other confidentiality laws and 
regulations protect information by limiting access, use, and disclosure 
of records without authorization from the individual about whom the 
record is maintained.
    To address the issues, we initiated a review to determine whether 
VA has effective policies in place to ensure compliance with computer 
security laws, the Privacy Act and other confidentiality laws and 
regulations, whether VA employees are aware of the policies; whether VA 
has adequate procedures in place to monitor compliance with the 
policies; and, whether the policies include an effective mechanism for 
reporting violations and taking appropriate action. Two areas that we 
are addressing in our review are policies relating to the transfer of 
electronic information from an employee's VA computer to his home or 
alternative work site and the impact centralization versus 
decentralization of VA policy has on ensuring that the integrity of VA 
computer systems and the information stored on those systems is 
maintained.
    The review includes identifying and reviewing applicable laws, 
regulations and policies, including Department-wide policies; policies 
issues by the Veterans Health Administration (VHA), the Veterans 
Benefits Administration (VBA), and other VA entities, policies issued 
by local VA facilities; and mandatory training modules. We are also 
reviewing how policies are disseminated to VA employees; whether VA 
employees are aware of the policies, and whether VA procedures for 
identifying, reporting and taking action when data has been improperly 
accessed or improperly used are adequate.
    This review will identify strengths and weaknesses in VA's policies 
implementing the provisions of computer security laws and the Privacy 
Act, and other confidentiality laws. We will also identify strengths 
and weaknesses in ensuring that VA employees are knowledgeable 
regarding their obligation to protect VA computer systems and 
information and that they will be held accountable for violations. We 
will make recommendations for improvement to ensure that data 
maintained by VA is protected from unwarranted intrusion and 
disclosure.

   SUMMARY OF OIG REPORTS ADDRESSING INFORMATION SECURITY WEAKNESSES

    We have conducted a number of audits and evaluations on information 
management security and information technology (IT) systems that have 
shown the need for continued improvements in addressing security 
weaknesses. My office has reported VA information security controls as 
a material weakness in its annual Consolidated Financial Statement 
(CFS) audits since before fiscal year (FY) 2001. Our Federal 
Information Security Management Act (FISMA) reviews have identified 
significant information security vulnerabilities since fiscal year 2001 
that place VA at risk of denial of service attacks, disruption of 
mission-critical systems, and unauthorized access to sensitive data. We 
continue to report security weaknesses and vulnerabilities at VA health 
care facilities and VA regional offices where security issues were 
evaluated during our Combined Assessment Program (CAP) reviews.

Consolidated Financial Statement Audits Continue to Report Information 
        Security as a Material Weakness
    Pursuant to the Chief Financial Officers Act of 1990, the VA 
consolidated financial statements are audited annually. We contract 
with an independent public accounting firm to perform this audit. As 
part of the audit, the contractor follows Government Accountability 
Office methodology to assess the effectiveness of computer controls. 
The contractor conducts audits at VA's three information technology 
centers and selected regional offices and medical centers.
    As part of the CFS audit, IT security controls have been reported 
as a material weakness for many years. A material weakness is defined 
as a weakness in internal control of VA systems that could have a 
material effect on the financial statements and not be detected by 
employees in the normal course of their business. We have reported that 
VA's program and financial data are at risk due to serious problems 
related to VA's control and oversight of access to its information 
systems. By not controlling and monitoring employee access, not 
restricting users to only need-to-know data, and not timely terminating 
accounts upon employee departure, VA has not prevented potential risk. 
These weaknesses placed sensitive information, including financial data 
and sensitive veteran medical and benefit information, at risk, 
possibly without detection of inadvertent or deliberate misuse, 
fraudulent use, improper disclosure, or destruction.
    As a result of these weaknesses, we made recommendations that VA 
pursue a more centralized approach, apply appropriate resources, and 
establish a clear chain of command and accountability structure to 
implement and enforce IT internal controls. We also recommended that VA 
improve access control policies and procedures for configuring security 
settings on operating systems, improve administration of user access, 
and detect and resolve potential access violations. Finally, we 
recommended that VA conform access privileges to the user's level of 
responsibility and position.
    VA has implemented some recommendations for specific locations 
identified but has not proactively made corrections VA-wide. For 
example, we found violations of password policies which management 
immediately corrected, but in following years, we found similar 
violations at other facilities. We also found instances of terminated 
or separated employees with access to critical systems identified at 
various locations which management corrected, only to discover similar 
instances elsewhere.

Evaluations of VA's Information Security Program Have Identified 
        Serious Vulnerabilities for Several Years That Remain 
        Uncorrected
    FISMA requires us to annually review the progress of the 
information technology and security program of the Department and 
report the results to the Office of Management and Budget. As part of 
the FISMA review, we conduct scanning and penetration tests of selected 
VA systems to assess controls for monitoring and accessing systems, and 
reviews of physical, personnel, and electronic security. We visit all 
three major IT centers and selected VHA and VBA sites.
    In all four audits of the VA Security Program issued since 2001, we 
reported serious vulnerabilities that remain uncorrected. These reports 
highlight specific vulnerabilities that can be exploited, but the 
recurring themes in these reports are the need for centralization, 
remediation, and accountability in VA information security. Since the 
fiscal year 2001 report, we reported weaknesses in physical security, 
electronic security, wireless security, personnel security, and FISMA 
reporting. Additionally, we have reported significant issues with 
implementation of security initiatives VA-wide. The status of 
unimplemented recommendations was discussed in subsequent audits.
    The fiscal year 2004 audit once again emphasized the need to 
centralize the IT security program, implement security initiatives, and 
close security vulnerabilities. We recognized that the CIO's office 
needed to be fully staffed, and that funding delays and resistance by 
offices to relinquish their own security functions and activities 
delayed implementation of the fully centralized CIO contemplated by our 
prior recommendations. The CIO's comments to the report referenced an 
April 2004 VA General Counsel opinion that held the CIO lacked the 
authority to enforce compliance with the VA information security 
program as one reason he could not address vulnerabilities. We again 
recommended that VA fully implement and fund a centralized VA-wide IT 
security program.
    In total, the fiscal year 2004 report included 16 recommendations: 
(1) centralize IT security programs; (2) implement an effective patch 
management program; (3) address security vulnerabilities of 
unauthorized access and misuse of sensitive information and data 
throughout VA demonstrated during OIG field testing; (4) ensure 
position descriptions contain proper data access classification; (5) 
obtain timely, complete background investigations; and complete the 
following security initiatives on (6) intrusion detection systems, (7) 
infrastructure protection actions, (8) data center contingency 
planning, (9) certification and accreditation of systems, (10) 
upgrading/terminating external connections, (11) improvement of 
configuration management, (12) moving VACO data center, (13) 
improvement of application program/operating system change controls, 
(14) limiting physical access to computer rooms, (15) wireless devices, 
and (16) electronic transmission of sensitive veteran data. As of May 
23, 2006, all recommendations from this report remain open.
    Finally, in fiscal year 2006, after Congress mandated full 
centralization of IT security under the CIO, as we advocated in our 
reports since 2001, VA is now moving out on a truly empowered 
centralized CIO. We have provided our draft fiscal year 2005 audit 
report to the Department and are working with the Department to resolve 
all outstanding recommendations. We have grouped our recommendations 
into two categories--the CIO's authority under centralization and 
longstanding vulnerabilities. With a centralized CIO with direct line 
authority to implement the needed fixes, we believe VA has a unique 
opportunity to successfully address all the vulnerabilities and 
weaknesses discussed in our reports since 2001.
    We believe centralization is essential because standardization is 
the key to fixing VA information security weaknesses. As long as three 
stove-piped administrations and other smaller component organizations 
are free to operate in the IT environment on their own within VA--
accountable not to the CIO but to other line managers who themselves 
are not accountable to the VA CIO--the vulnerabilities cannot be 
effectively resolved.

CAP Reviews Continue To Show Information System Security 
        Vulnerabilities Continue To Exist
    We continue to identify instances where out-based employees send 
veteran medical information to the VA regional office via unencrypted 
e-mail; system access for separated employees is not terminated; 
monitoring remote network access and usage does not routinely occur; 
and off duty users' access to VA computer systems and sensitive 
information is not restricted. We continue to make recommendations to 
improve security and contingency plans, control access to information 
systems, complete background investigations and annual security 
awareness training, and improve physical security controls.
    While individual and regional managers have concurred with these 
CAP recommendations, and our follow-up process confirms actions to 
resolve the specific conditions identified at these sites, we continue 
to find that corrective actions are not applied to all facilities to 
correct conditions nationwide. Consequently, we continue to find these 
systemic conditions at other sites we visit. For example, between FYs 
2000 to 2005 the CAP program identified IT and security deficiencies in 
141 of 181 VHA facilities. We identified IT and security deficiencies 
at 37 of 55 VBA facilities.

                                CLOSING

    In closing, I would like to assure the Committee that this matter 
will remain a very high priority for the OIG until it is resolved. I 
will ensure that all the resources that are needed to complete our 
reviews in a thorough and timely manner will remain dedicated to the 
goal of recovering the stolen data and protecting our Nation's 
veterans.
    Mr. Chairman, Madam Chairman, and Members of the Committees, thank 
you again for this opportunity and I would be pleased to answer any 
questions that you may have.

    Chairman Craig. Mr. Opfer, thank you for being here and 
thank you for that testimony.
    Let me turn to Chairman Collins.
    Susan.
    Chairman Collins. Thank you, Mr. Chairman.
    Mr. Secretary, first let me say to you that I do not doubt 
in any way your personal pain and your sense of outrage over 
what has happened. I know you are sincerely upset and that you 
are dedicated to remedying the problems.
    The chronology that you gave us in your testimony is 
absolutely baffling. This was not a minor security breach. It 
involved personal information about 26 million veterans. And it 
is just inconceivable to me that there were such long delays in 
informing you personally and in informing the veterans who were 
affected.
    The concern I have, however, with your testimony, is that 
you seem to be saying that it was just one employee. It was one 
employee who breached the trust of our Nation's veterans. But 
in fact, it is not just one employee. You have a high risk 
vulnerable system that has been identified time and again as 
vulnerable.
    I have a stack of just some of the reports from OMB, from 
the House, from the GAO, from the Inspector General's office. 
Over and over again, it is the same warning, the same 
conclusions, the same recommendations.
    For example, in this 2003 annual audit by the IG, it 
states, ``The security vulnerabilities identified represent an 
unacceptable level of risk.'' And then the IG goes on to make 
many recommendations.
    But here is what is most startling to me. For almost every 
recommendation, there is a notation that says the following: 
``This is a repeat recommendation from the fiscal year 2001 and 
2002 information security audit.''
    Similarly, a report by the IG just last year states,

          Our last four annual audits, as well as this year's, continue 
        to show significant security vulnerabilities. We continue to 
        find that the VA systems remain vulnerable to unauthorized 
        access and misuse of sensitive information and data.

It seems to me that you and the leaders in your Department were 
on notice. Were you aware of these repeated audits and reports 
that identified such serious vulnerabilities?
    Secretary Nicholson. Yes, I was, Senator Collins.
    And as I said earlier, that is one of the compelling 
reasons that we have really taken the steps we did to 
centralize our systems, our information system, so that we have 
tighter central control over these. Because it has gotten very 
decentralized, very loose and undisciplined. We have really 
taken some very significant steps, and there is just a change. 
I mean, the reassignment of thousands of people, the 
rebudgeting, the creation of a career field for IT personnel at 
the VA, which had not existed.
    But it is just underway. But it has taken, in response to 
this situation that was very evident, and other deficiencies 
that have existed there which are not germane things like 
business accounting, inventory control reports and so forth, 
that you get out of a centralized IT system that the VA has 
just gotten away from over the last couple of decades.
    Chairman Collins. Mr. Opfer, are you satisfied with the 
response to your office's recommendations?
    Mr. Opfer. Senator Collins, I have recently been appointed 
to the Inspector General since November. Jon Wooditch is the 
Deputy Inspector General, who also served as Acting IG, and has 
much more familiarity with the series of reports over the 
years. I am going to refer to Jon to respond to this.
    Chairman Collins. Mr. Wooditch.
    Mr. Wooditch. Thank you.
    No, we have not been satisfied with the response in the 
past. As you mentioned, we have repeated these recommendations 
year in and year out. The IT system has been considered a 
material weakness in the Department for 5 straight years.se on.
    In the last report that we put out, which was March 2005 of 
fiscal year 2004 activities, we listed 16 recommendations and 
many of those are repeat recommendations.
    I would like to add that in Mr. Opfer's statement for the 
record, we do recognize that Congress took efforts this year to 
centralize IT in the VA. We think that presents a very unique 
opportunity now for VA to address these recommendation.
    Chairman Collins. Thank you, Mr. Chairman.
    Chairman Craig. Thank you, Madame Chair.
    Senator Akaka.
    Senator Akaka. Thank you very much, Mr. Chairman, Madame 
Chair.
    Mr. Secretary, VA seems to believe that it is unlikely that 
the lost data will be used by the thief, and you mentioned that 
in your statement. Is that the judgment of law enforcement 
officials?
    Secretary Nicholson. Senator Akaka, if I gave you that 
impression, I did not mean to, that we think it is unlikely. 
What I was trying to say was that we think it was unlikely that 
the burglary was committed to get after that data.
    Senator Akaka. Mr. Secretary, it is my understanding that 
typically VA will scramble Social Security numbers based upon 
an encryption formula. Access to files that translate scrambled 
Social Security numbers is only possible with special 
authorization. Realizing the sensitivity of this data that was 
burglarized, was this data not scrambled?
    Secretary Nicholson. That is correct, Senator Akaka, it was 
not scrambled. There is a requirement for those who are 
authorized to take data home or to work with data at home that 
it should be encrypted, and this was not.
    Senator Akaka. Can you tell me, Mr. Secretary, what years 
of veterans this data covered? Does it date back to 1970 or 
1960?
    Secretary Nicholson. My understanding of it is that it is 
all veterans that were discharged from the services since 1975, 
plus veterans receiving disability compensation from our 
Department. The reason that we have that data is that there is 
a form that--I do not know if you remember--but when you are 
discharged the Department of Defense issues a form called a DD-
214. And that is the record of your service, time, awards, so 
on.
    And we, the VA, are an addressee on a copy of that for 
everybody that gets discharged. All of these veterans in this 
file are not receiving benefits from the VA, but we have them 
in our data file.
    Senator Akaka. I am asking that just so that veterans out 
there realize if they were discharged before that date, that 
their records were not in this 26.5 million data. Thank you.
    Mr. Opfer, can you reveal anything more about the criminal 
investigation that would comfort the Nation's veterans that the 
employee and the data were not targeted?
    Mr. Opfer. Yes, Senator Akaka, without compromising the 
investigation, I can say that the evidence to date indicates 
that the perpetrators of the burglary were specifically 
targeting computer hardware. There were a number of similar 
burglaries in the area where storage devices and computers, 
hardware, CDs, et cetera, were stolen. And it matches the 
similarity of a number of burglaries, including petty change, 
but very valuable items were left in the house. This fits the 
same pattern that Montgomery County Police have been seeing in 
a number of burglaries in the area.
    Also, our investigators have interviewed the employee a 
number of times and have gone to his house. We recovered a 
number of CDs and other equipment that contained VA sensitive 
data that was left in the house.
    So appearing from the similarity of the burglaries, with 
other regular house burglaries, and the fact that VA data that 
we are able to secure was still there, we do not believe there 
was any information that has been developed by the Montgomery 
County Police, the Office of the Inspector General 
Investigators, or the Federal Bureau of Investigation that 
would indicate that that employee himself was targeted for the 
fact that he was in possession of that VA data.
    Senator Akaka. The Secretary did mention that it appeared 
this burglary was at random. What is your reading on that?
    Mr. Opfer. From our conversations with the police and from 
my own experience, I have been in law enforcement since 1969, 
this fits the pattern that would be, that they would do some 
surveillance of residences to see when people come in and out, 
and if you work a routine. And this employee and his spouse 
were on a very regular routine. It fits the pattern of the 
burglaries in that area.
    So, I would say they kind of identified residents who would 
be vulnerable during certain periods of time and then committed 
those crimes.
    Senator Akaka. Thank you very much, Mr. Chairman.
    Chairman Craig. Danny, thank you very much.
    Senator Murray.
    Senator Murray. Mr. Secretary, I am trying to reconcile the 
numbers here. You are talking about 26.5 million records 
compromised. We have about 25 million veterans who are alive in 
the U.S. today. Six million of them are enrolled in the VA. So 
I want to get something straight. Does the lost data include 
spouses of veterans that would account for those number 
misconceptions?
    Secretary Nicholson. Senator Murray, some of the veterans 
on this list would be deceased, but would not have been 
expunged from the rolls, and that explains most of that.
    There were, however, some spouses.
    Senator Murray. Whose spouse has passed away and they are 
in the database?
    Secretary Nicholson. Yes, I am told.
    Senator Murray. That raises two questions. First of all, 
how are you doing outreach to all of these 26.5 million names, 
particularly--I mean, we have had a lot of press about veterans 
themselves. But I am certain that there are spouses out there 
who have no idea that their name is part of this.
    I would like to know if we are getting outreach to them to 
notify them.
    Secretary Nicholson. Well, we are doing all we can to get 
the message out the way we have, through the use of the media. 
And we are preparing a mailing that will go to everyone.
    Senator Murray. To all 26.5 million names?
    Secretary Nicholson. Yes, because we do not know those that 
have died.
    Senator Murray. And the cost of that?
    Secretary Nicholson. We are working on that. We are trying 
to buy envelopes right now, for example. There is not 
immediately available 26 million envelopes.
    Senator Murray. What account are you taking that from?
    Secretary Nicholson. We have been in and asked for 
reprogramming of some administrative money, and that was $25 
million, which was to cover the mailing plus, the cost of the 
phone centers. The mailing itself, we think, will be in the 
range of $10 million to $11 million.
    Senator Murray. That is significant in a very tight budget, 
so I am certain we will be hearing from you on the need for 
additional funds for the VA?
    Secretary Nicholson. You will be hearing from us, I think 
on different levels, because I think we also have things we 
have to do for our veterans with respect to trying to find a 
monitoring system that is practical for watching over this for 
our veterans to try to alleviate the anxiety that they have 
about it, we have something in place to watch, working with the 
three major credit bureaus.
    Senator Murray. I expect this will cost a great deal. I 
want to make sure that our veterans do not get a double whammy 
of not only losing their records, but then being denied 
services because costs are not covered. I want to make sure we 
are providing the additional dollars to cover this. So I hope 
we can hear from you soon.
    Let me ask you, as well, are you reaching out to VSOs to 
help our veterans?
    Secretary Nicholson. Yes, we are.
    Senator Murray. And give them the training that they need 
to deal with this?
    Secretary Nicholson. We have certainly been in 
communication with them. We have not initiated any training 
with them so far. We are trying to use them and they are 
cooperating to be a communicator.
    Senator Murray. I would suggest we look at some kind of 
training for the VSOs. That is usually who the veterans call 
first. And they, I am positive, do not have some of the 
training they need to do that.
    I would also like to ask how you are dealing with veterans 
who do not have access to the Internet, who do not know how to 
use the technology. Many of our older vets who struggle with 
this kind of information, how are we dealing with them?
    Secretary Nicholson. I think that is a very important 
question. I have been talking about that myself. My father was 
a veteran. He did not know how to boot up a computer.
    So we obviously have the phone banks in the mailing that we 
will be sending out. There will be other information that they 
can use and ways to communicate outside of the computer.
    Senator Murray. Have you ever gotten your credit checked, 
as you suggest, on the VA Web site?
    Secretary Nicholson. I have not, no.
    Senator Murray. It is not easy to do. So I am hoping that 
you are looking at additional staff to be able to answer the 
questions and work their way through that. It is not the 
easiest system, particularly for anybody, but for our vets who 
are personally worried right now, as well.
    Mr. Chairman, I also think we need to be very conscious 
that we are reaching out now to 26.5 million veterans. We have 
about 5 million who are using VA services now. We are 
essentially notifying 20-some million veterans that they are 
eligible for services. There will be the impact. We have a 
responsibility to make sure they get the services they need.
    And I hope we are looking critically at the impact on our 
budget, not only for the outreach, the additional training, 
making sure everybody gets the information they need, but also 
on the impact to our VA budget as more veterans are notified 
that they do have access to services.
    Chairman Craig. Senator, thank you for that concern. It is 
our concern. It is the Committee's concern. Obviously, by 
actions taken, it is the Secretary's concern.
    We will monitor it closely as this progresses to make sure 
that the resources are available to outreach in the appropriate 
fashion.
    You mentioned widows and it is obvious to me, I think and 
others, that there are widows on this list. This morning I was 
doing C-SPAN on this issue and the call-in and I got a call 
from a widow who was obviously very concerned that in some way 
her financial statements and records might have been 
compromised. So that certainly is a legitimacy to this kind of 
list and the size of the list involved.
    Thank you.
    Secretary Nicholson. Could I comment on that, Mr. Chairman?
    Chairman Craig. Please.
    Secretary Nicholson. My technical people just handed me a 
note that says that the only spouses on that file, we think 
right now, were the spouses in a file of people involved with 
mustard gas. And that involves a number of less than 100.
    Senator Murray. Then the discrepancy between the 25 million 
veterans who are alive today and the 26.5 million records that 
you are talking about, that is 1.5 million people and only 100 
are spouses. Who are these people?
    Secretary Nicholson. They are probably deceased, Senator 
Murray, 1800 veterans die every day in our country.
    Senator Murray. OK, and so does somebody else--I mean, I am 
assuming that their records can be used and compromised, as 
well. Are we notifying relatives or anybody else to be aware of 
that? I am not sure how this technically works, but it does 
raise concerns.
    Secretary Nicholson. What we plan to do is to mail that 
entire list in the hopes that if there is an address and a 
survivor at that address, they will get that notice.
    Senator Murray. If it goes to the person, it will be 
returned, I am assuming, so how would their families know?
    Secretary Nicholson. That is a good question. We will have 
to look at that. Your concern being the use of the identity of 
a deceased veteran.
    Senator Murray. Right.
    Secretary Nicholson. That is a good question, and I cannot 
answer it right now. We will have to look at that.
    Chairman Craig. Those are very legitimate questions.
    I think as you are able to unravel this, Mr. Secretary, it 
becomes very important for all of us, and especially for you, 
to understand those kinds of nuances and details, and that that 
information flow go public. I have to think that is very 
important.
    Thank you, Senator.
    Senator Isakson.
    Senator Isakson. Inspector Opfer, do the Inspectors General 
of the various agencies of the Federal Government ever meet 
together?
    Mr. Opfer. Yes, all the Inspectors General of the agencies 
are members of what is called the President's Council on 
Integrity and Efficiency. We meet formally once a month. And 
the chairman of that is the Deputy Director for Management for 
OMB. And one of the Inspectors General is selected as the vice-
chair. Then there are various committees of the PCIE, the 
Investigations Committee, Audit Committee, and Inspections, 
Evaluations, and Legislative.
    Senator Isakson. I have two suggestions. One is it would 
seem to me the Secretary has outlined his disappointment at 
being notified 13 days after the fact, that we should 
immediately install in the various agencies of the Government a 
rule that any breach of secure information and data is to be 
immediately reported to the person in charge. And I am talking 
about the secretary of the agency. I am not talking about the 
Department.
    Something like this should never go unknown by the boss. 
The Secretary, to his credit, accepted the blame, the buck 
stops here, and I appreciate his doing that. But I also 
acknowledge how tough it is to find out 13 days after the fact 
what you are going to have to take the blame for.
    So I would suggest that you all talk about what ought to be 
a Governmentwide policy, if there is any other breach. All that 
takes is a policy change.
    The second thing is that if, in fact, other agencies have 
information as accessible as the Secretary has described the 
information at the VA is, then I think the inspectors general 
need to make recommendations to the appropriate agency or 
authority, which is probably the Appropriations Committee of 
the U.S. House and Senate, as to what should immediately be 
done to put blocks and security on that information, so it 
cannot be accessed from the outside nor be portable enough to 
be taken out.
    So I would just recommend you do that. That is important. 
We have inspectors general to hold us accountable, to find 
discrepancies, to point things out that we need to do. We have 
a situation here that clearly demonstrates that a couple of 
changes need to be made.
    Any comments you have?
    Mr. Opfer. Yes, Senator. Just on this issue alone, I have 
been contacted by a number of inspectors general of these 
various agencies themselves, and including some deputy 
secretaries of departments. So when we conclude our review, I 
would be willing to discuss that with them and the individual 
things.
    In the normal process, I am a member of the Investigations 
Committee of the President's Council on Integrity and 
Efficiency and also the Inspection and Evaluation. We would 
make this available and make a presentation on to all of the 
inspectors general, including the officials of OMB at the PCIE 
meeting, as well as giving them the reports and briefing the 
appropriate members of the Appropriation Committee on both 
sides of the Hill and the Oversight Committees.
    Senator Isakson. Mr. Secretary, this is really a comment. 
Having had my identification taken, and having been notified by 
the company that lost it or allowed it to get out, I am aware 
of what happens in the private sector. What happens is they 
provide a means of protection for a period of time in the event 
the theft of the information actually gets in the wrong hands 
and is accessed.
    As you are investigating your cost to deal with the mailing 
and with the czar, or whatever else you do in the Department, I 
would suggest that you consider in the hopefully unlikely 
circumstance that if we find this information is accessed, we 
need to know how to deploy immediate security measures for 
these 26.5 million people and what that cost would be.
    From talking with the Chairman yesterday, that type of 
product is available. And its cost, in the volume like this, is 
not as insurmountable as one might initially think.
    So, I think as we are planning for how to prevent this from 
happening in the future, and we are budgeting for notification, 
there should be some investigation by the VA as to what we are 
going to do if the unlikely event happens and the information 
actually gets used inappropriately.
    So, I would appreciate your thinking about that.
    That is all I have, Mr. Chairman. Thank you, Mr. Chairman.
    Chairman Craig. Johnny, thank you very much.
    Senator Thune.
    Senator Thune. Thank you, Mr. Chairman. I appreciate that 
suggestion, as well as some of the others.
    I think a lot of the questions that have been raised today 
are very good questions, particularly with respect to the short 
term, notifying veterans how the agency, the Department intends 
to do that, as well as it just seems like this was a tremendous 
breakdown in the chain of command when it came to reporting the 
incident, considering the magnitude of this breach. So, I think 
the suggestion that my colleague from Georgia made regarding 
the IG and how that is reported is a good one. And it seems to 
me, at least, there has got to be some change in that area, as 
well.
    I am also concerned, obviously there are a lot of short-
term implications to this and many of those have been raised 
and touched upon. I also am concerned about, as well, the long 
term. As has been noted already, many of the reports that have 
been done in the past by the IGs and other agencies of 
Government, watchdog and audit agencies, have suggested 
weaknesses and flaws in the IT system at the VA.
    What I would like, Mr. Secretary, just to get you to 
comment on, is because one of the things that we have been 
talking about a lot up here is centralization of that function 
at the Department, rather than having these compartmentalized 
different databases out there that contain information on our 
veterans.
    I know that recently here the VA CIO, Mr. McFarland, 
resigned because the VA was not moving fast enough on the IT 
organization. My understanding is, as well, that he was brought 
on board specifically because of his expertise as a former 
executive at Dell Computer, and was supposed to be an agent for 
change for the VA when it comes to reform of the IT programs.
    At least the reports I have read suggest that he became 
frustrated beating his head against the wall of the bureaucracy 
at the VA and that, as a consequence, decided to leave. But I 
think it points to this broader question of IT management 
centralization and the privacy of the 26 million records that 
we are talking about today.
    But could you just talk a little bit about the context of 
his departure and your view about whether or not the VA is 
moving quickly enough when it comes to adopting the federated 
model of IT management centralization?
    Secretary Nicholson. I can, Senator.
    It is hard to say what Bob McFarland is feeling when he is 
not here. I had lunch with him shortly before he left, and I 
think that he feels quite satisfied about what he achieved at 
the VA. The statement about his getting tired of bumping his 
head against the wall, I think he got tired of doing what he 
had to do to break through to get done what we were doing.
    It did not become a totally adopted model that Mr. 
McFarland wanted because there is one exception in there, which 
is the developers of IT. These are the people that work to 
customize the applications of software for research going on at 
different hospitals and so on.
    But short of that, he achieved everything he set out to do. 
So, I think he made a monumental contribution to the VA.
    He wanted to get back and spend more time fishing. He 
thought he probably bumped enough heads and wrangled enough 
people doing what he got done, that maybe it was time for him 
to leave. I tried to talk him out of it.
    The important thing though is what he is leaving behind, 
with respect to what is going on now. It gives us a chance to 
be very hopeful.
    Now you ask me are we moving fast enough? I would say to 
that, no. I do not think anything, frankly, moves in the 
Government fast enough. Because there are both the embedded 
cultural resistances to this in the bureaucracy and there are a 
lot of regulations and laws that inhibit speed.
    But having said that, I will say that something very 
important has happened, and that is that the institutional 
resistance that was there to this big change has gone away. 
Those leaders are now very supportive of this and are working 
honestly and harmoniously in getting this done.
    But it involves the reclassification of thousands of people 
and the upheaval and anxiety that goes with that. As I said, I 
think I said, that it also will result in a new career field in 
the VA for information technology, which would give those 
people a chance to go up in their own field without having been 
piggybacked into IT from some other field that they came from. 
So it is a real advantage to them for that, as well.
    We have a team of really young, bright IT people who have 
the responsibility for this implementation. And they are 
underway.
    Senator Thune. I appreciate that, and Mr. Chairman we have 
had this discussion. I hope that you can continue to push the 
pace. I know there is resistance to change in every agency of 
Government and bureaucracy. It is just human nature as much as 
anything else. But the stakes in this debate are so high and 
the relative speed with which this transition has occurred 
seems to me to suggest that we are not doing enough.
    I am glad to hear you say that the culture is changing, 
because I think that is important, too, to recognize that this 
is where we are going. And once you get over that hurdle, then 
how do we get there in the quickest, most efficient way 
possible.
    But this incident obviously focuses a lot of light on the 
importance of that transition happening, particularly in light 
of many of the reports and suggestions and recommendation that 
have come previously that appear not to have been adhered to.
    So, we are obviously all looking for not only trying to 
determine exactly what caused this breach, but also, more 
importantly now, what we must do to fix it. So I thank you, and 
Mr. Chairman I have another question, but I am out of time and 
I think we have a vote on. So I yield back the balance of my 
time.
    Chairman Craig. We do have a vote underway.
    Gentlemen, I do have a couple more questions. I think 
Senator Collins does. We will ask you, if you would please, we 
will be brief. We should be able to get you out of here within 
the next 15 or 20 minutes. I will run and vote and come back.
    So we will ask the Committee to stand in recess until 
Senator Collins returns and then she can bring it to order.
    Thank you.
    [Recess.]
    Chairman Collins [presiding]. The Committee will come back 
to order.
    Mr. Secretary, I do expect some of our colleagues to 
return, in particular the Chairman. While we are waiting for 
that, I am going to proceed to a couple of additional questions 
that I have for you.
    For the past 7 years, it is my understanding that the VA 
and the Department of Defense have been working to achieve the 
exchange of patient health information electronically. The goal 
is to have an interoperable electronic health record.
    In addition, the Department of Veterans Affairs is working 
with the IRS and with the Social Security Administration on 
compiling and comparing some means test income data to ensure 
that non-service connected veterans receiving VA health care 
have the correct eligibility.
    I bring these two projects up because both involve a 
massive exchange of data, personal data, sensitive data in the 
case of the health care and income data. How much confidence do 
you have that there are appropriate safeguards, encryption, 
limits to access the information that is being compiled through 
these two projects?
    Secretary Nicholson. Senator, I would like to tell you that 
I have a lot of confidence, but I am not going to because I do 
not. I think that we have 7.5 million enrolled patients for 
health care at the VA. Every one of them has an electronic 
health record, which is exemplary, and it is one of the main 
reasons, I think, that we are such a very good integrated 
health care provider. It gives portability and safety.
    But I have worries about the fact that people can access 
this from remote stations and whether or not we have the 
controls in place to limit that access, and what are the 
possibilities for the downloading of it?
    Now I know that we have controls and we have codes and we 
have things that protect that. But I am not going to tell you 
that I think that it is what it should be.
    Chairman Collins. That is something that I hope the 
Department will act very quickly to take a look at.
    As I understand it, so far there has been no indication 
that the stolen data has been used for identity theft or 
financial fraud. And of course, all of us are hoping that that 
pattern will hold. There is a concern, however, that con 
artists could take advantage of this situation without having 
access to this data. I would like to give you a scenario that 
my staff had mentioned to me.
    It would be very easy for a scam artist to call up a 
veteran, refer to this loss of data, pretend to be a VA 
representative and ask for the veteran to verify his or her 
Social Security number and date of birth.
    Are you doing anything through your Web site or the 
Veterans Service Organizations to try to educate veterans on 
identity theft, in general, and that they should be very 
careful about giving out information, and perhaps to inform 
them that the VA is not calling to ascertain this information?
    I just worry that even if this information miraculously is 
not misused by anyone, that there are clever con artists who 
could use the fact of this information's exposure to take 
advantage of our veterans.
    Secretary Nicholson. I think it is a good point and we are 
not doing that, to my knowledge. It sounds like something we 
should be and can and will, yes.
    Chairman Collins. I think that would be very helpful and 
maybe it is something--Mr. Opfer?
    Mr. Opfer. Senator, actually you are right on target. We 
have been made aware of something like that yesterday and have 
reported it to the Department senior management. I think that 
needs to be very aggressively put out to the public. But 
something similar like that was reported and I had us bring it 
to the senior level of management. The Chief of Staff is aware 
of it and the other senior officials in the Department.
    Chairman Collins. So your concern is that may already be 
happening?
    Mr. Opfer. Yes, it would be a usual thing to happen in an 
event like this.
    Chairman Collins. It would. I have done work in this area 
on identity theft and the financial fraud and people will take 
advantage and exploit every vulnerability. It would be ironic 
if the stolen information were never used for this purpose, but 
then con artists use the fact of this incident to compromise 
our veterans.
    Mr. Opfer. A recent example of that was the tragedy in 
Fairfax, Virginia a few weeks ago, with the two police officers 
killed. Right before they were even buried, they were calling 
saying that they were calling on behalf of the police 
associations, generating funds. So as you have a tragedy, 
people are ready to come in.
    In my previous experience, I was the Inspector General at 
the Federal Emergency Management Agency. And every time you had 
a disaster, you had the people, as I referred to them the 
vultures, ready to come down.
    Chairman Collins. There are always the fraudulent charities 
that pop up, people who are willing to exploit any tragedy. I 
think the fact that you already have reports of that suggests 
the VA needs to be proactive.
    It seems to me one thing you might want to do with the 
notification letters is to include a flyer on protecting 
yourself from identity theft. The FTC, for example, has 
developed some very good materials on financial fraud in that 
area. So that is something that I would recommend.
    Mr. Secretary, you mentioned that you are working 
cooperatively with the credit bureaus, which I commend you for. 
In addition to educating veterans that they can receive a free 
copy of their credit report, is the VA looking into other ways 
to connect veterans with their credit reports?
    Secretary Nicholson. We are, Senator Collins. We also have 
been looking at some proposals from private sector, proprietary 
companies that are in this business. And our goal would be to 
see if we could create some kind of an overlay over the veteran 
community that could allay some of their fear and anxiety about 
this, knowing that there is somebody watching it and there is 
sort of a continual alert about them.
    It would work with these three major reporting bureaus. 
There are people in that business and we are looking at it. The 
cost of it is something we are not yet sure of, but I am pretty 
confident that given the volume that we have, that we are 
dealing with here, that we could get a pretty good deal, which 
would still be a substantial amount of money. But I think it is 
something that our veterans deserve.
    Chairman Collins. I agree and I am pleased you are pursuing 
that.
    Mr. Secretary, I want to go back to my initial statement to 
you when I said that I found the chronology that you gave in 
your testimony to be baffling. I think you find it to be 
baffling also. And I understand how frustrated and angry you 
must be that it took some 13 days before you were notified of 
such a serious breach.
    What is your theory on that? How do you think it was 
possible for there to be such long delays in bringing this 
incident to your attention? As I said, it was not minor. It did 
not involve just a few records. It is just so obviously urgent 
and serious that it is so hard for me to understand the failure 
of those in the Department to inform you.
    Secretary Nicholson. It is an appropriate question. It is 
difficult for me to answer because some of the people along the 
line are some of the most competent, dedicated people I have 
ever worked with anywhere. It is hard to answer, frankly.
    So I am only speculating. We have discussed it. They feel 
terrible. They have offered resignations. They were trying to 
deal with it themselves and get their arms around it and handle 
it. It is not clear.
    Chairman Collins. Thank you.
    Mr. Chairman.
    Chairman Craig [presiding]. I have one last question and 
before I do that, if you are leaving us.
    Chairman Collins. I do not have anything else. Thank you.
    Chairman Craig. Again, thank you for working with us for 
this joint hearing. I think it is obvious the problem that are 
now appearing in VA, and as we started this hearing, the 
question remains are these same problems system wide? The work 
you are doing in your Committee is critical and important. And 
we will monitor this and work with you to make sure that--you 
never say never, but we ought to have systems in place where 
that argument can at least be placed.
    Thank you very much, Susan.
    Chairman Collins. Thank you, Mr. Chairman. And again, thank 
you for taking the initiative on this very serious problem. I 
have enjoyed working with you on this hearing.
    Chairman Craig. Thank you very much, Madame Chair.
    Mr. Opfer, the Inspector General Act requires you to keep 
the Secretary and Congress fully and currently informed about 
any serious problem regarding VA's operation. In this case, it 
appears that the Secretary was not notified of the massive data 
security breach until 6 days after the IG Office was alerted to 
the incident, and Members of the Congress were not notified for 
several days after that.
    Again, this question has been asked, but for the record, 
given the magnitude of the data security breach, do you believe 
the IG's Office acted with sufficient haste in reporting the 
incident to the Secretary and ultimately to the Congress?
    Mr. Opfer. Yes, I do. Mr. Chairman, let me go through the 
chronology again.
    The IG Office was never notified of the security breach. It 
was a normal monthly meeting when an Information Security 
Officer from the IG was attending. It was not talked about. It 
was mentioned that an employee had some data stolen from a 
burglary at his residence. No information was given to that 
employee of the significance of it.
    He followed up on his own to try to find out what 
information he could. That was on the information of May 10th. 
There was no information given to the IG.
    He wrote it up and gave it to our Office of Investigations 
that went to the Department on Friday, May 12th to try to 
locate this Information Security Officer. The officer was not 
at work. The agents did not just wait. They tried to contact 
him at home. He was on leave. They were not able to contact 
that Information Security Officer that had the information 
until Monday the 15th. That is when they interviewed him, gave 
the preliminary information. We had no knowledge of anything 
other than an employee had some data stolen from the home, the 
residence.
    It was not until we interviewed the employee on the 15th 
that we realized that we had a significant problem developing 
there. That interview went for hours upon hours of interviewing 
the employee. That is where the information came to the IG.
    With the story what he was saying he had access to this 
type of information, that first thing you need to do is ask, is 
it credible? Would an employee have that much access to that 
type of sensitive information? And would he be able to take it 
to his residence?
    The second part was then to look if there were other issues 
with that employee? The investigators went through the 
background, doing name checks, record checks, reviewing his 
official personnel folder, looking at any issues that we may 
have had in the IG's Office, trying to determine, contacting 
their local police. Was there a burglary? Was it reported? Was 
it similar to others? Or was this a staged burglary? Were there 
issues with the employee? His family, with the police?
    It was not until the morning of the 16th of May that they 
spoke to the police. But they had to get to the detective that 
was doing this to see what we had. It was then immediately that 
the agents told the detective of the seriousness of what we 
were looking at, of the possible breach of millions of personal 
identification information.
    On the 16th, they came to me in the morning to brief me. I 
immediately, before he even finished the briefing, got on the 
phone to the Chief of Staff who was with Tim McClain, the 
Counsel, and explained to him what we had. We had a serious 
problem. The information only was coming to us from the 
interview of the agents with the employee.
    On the 16th, in the morning, this was about 9:30, when I 
spoke to the Chief of Staff, he told me that he was aware of an 
incident but did not realize the magnitude of the incident. It 
was after they had the 11 o'clock meeting, that I again spoke 
to the Chief of Staff and told him that I requested that he 
brief the Secretary on the severity of this.
    The Secretary was out of town attending the funeral service 
of former Congressman Sonny Montgomery. The Chief of Staff told 
me the Secretary would be back at 7 o'clock that night and he 
would brief him on it. The next morning, every day from then 
on, I had constant contact.
    So when it came to my attention, the Secretary was notified 
immediately from the Chief of Staff on the 16th.
    On the 17th, we again were confirming and working with the 
Montgomery County Police through the 15th, 16th and 17th. On 
the 17th, this is one day now from when we are verifying that 
we had a serious problem which was verified to us on the 16th, 
not only from the employee's interview, but verified that he 
did have access to this material, we notified the Federal 
Bureau of Investigation both from field office to field office, 
as well as the Acting Assistant Director for Criminal Division. 
So notifications were made in a very serious and coordinated 
effort.
    I had to balance a decision of whether or not to release 
that information. During all of these periods of conversations 
that I was having with senior level officials within the 
Department, I was advising them of my statutory responsibility 
both to Congress and both to notify the appropriate Federal law 
enforcement agencies, which we did within a day.
    The decision not to go public was one, and I kept using the 
phrase we are on borrowed time. As the IG's Office was 
ratcheting this up, as we were going out doing interviews, more 
people were going to become aware of what we are looking at. 
And I was concerned it was going to be released.
    Right from the beginning, on the 17th, I had conversations 
with the Chief of Staff that somehow along the line I was going 
to start these notifications. But the Chief of Staff agreed 
that we needed to be proactive and the Department was being 
proactive to reach out to try to look at what lessons they 
could get from the Federal Trade Commission, the Commerce 
Department, to establish the 800 number, the Web site and all 
these initiatives that went in.
    I had to balance where along the line does that come to 
with what we had as investigative leads which were quickly 
evaporating. We were very aggressively investigating every 
investigative lead that we had. And during that whole period of 
time, I was saying I am coming to the point I cannot justify 
legally or morally not making those notifications relative to 
investigative leads because they just were not there as we were 
knocking them off.
    On Thursday evening, I had a conference call with the 
Secretary, the Chief of Staff and the Counsel, and I do not 
know if anyone else was present. We talked about this. I talked 
about my position that we came to the point now, from the 
Inspector General's position, we should go public. It was time 
to make the notifications.
    We talked about do we balance that with the panic that we 
could cause for the veterans?
    I still said this did not outweigh my obligation and I 
would not delay that notification any longer. I felt from an 
investigative standpoint we have gotten to the point we were 
exhausting all of the leads that were available.
    It was agreed that the next morning I would receive a copy 
of a draft statement making the announcement. My staff 
contacted the appropriate Members of the Committee staff. I was 
prepared to make that notification on Friday.
    And I would like to ask Jon Wooditch then to talk about 
what happened Friday afternoon to try to convince us then to 
hold off.
    Mr. Wooditch. I was contacted by the VA General Counsel, 
who asked us to talk to the Director at the Federal Trade 
Commission because they were not quite ready with the Web sites 
and the hot lines and all of the other tools that they were 
going to use to satisfy the veterans calling in. It seemed to 
be a legitimate request. If we went out prematurely and we were 
not ready to deal with all of the calls that we were going to 
get, it could cause panic.
    So, I agreed to talk to the FTC Director and she convinced 
me that they would work feverishly over the weekend and have it 
done by Monday. Monday it was completed and the Secretary did, 
in fact, make the announcement on Monday.
    Mr. Opfer. I would also add on Sunday, that Sunday, I had 
two telephone conversations with the Associate Attorney General 
asking me if my position was still that. And I said I was 
concerned that we could not wait any longer. And I needed to 
verify, he was going to a meeting at the White House to verify 
that the FTC and all of these operations were going to be in 
place for Monday. He called me back later. He wanted to know, 
from my perspective as lead investigator for the OIG, and we 
discussed that he would reach out to the FBI to see if they had 
any additional leads. I said I was not aware of any, but I 
would reach out again to my supervisor and the agents working 
to see if there were any leads left that would justify 
withholding going public at that point.
    So, I do believe it was done in a timely manner.
    Chairman Craig. I mean, I find that fascinating. I am not 
here to challenge your judgment. I think I have, we probably 
have a better picture of what did and did not happen.
    I would hope that you all collectively look at what you did 
and how you did it with the hindsight you now have. It appears 
to me to be a fascinating case study. I do not know whether I 
am overreacting or under reacting. I do not know whether you 
overreacted or under reacted as it relates to the knowledge you 
had and how you handled the knowledge.
    I know one thing, that it was not until May 22 that I found 
out about it. And I do not believe I or this Chairman can be 
called public. We are not the public.
    Mr. Opfer. I was not talking about that. I was also talking 
about notifying Congress. It was whether or not, even again on 
Sunday I was requested by the Justice Department if I would 
reconsider my position.
    Chairman Craig. And yet, at the same time, I appreciate 
having the tools in place to handle response to an announcement 
of this magnitude. I can hardly question that because obviously 
you were getting a great concern and there is a lot of--as the 
information flows out, there is a growing concern amongst 
veterans as to whether they, in fact, have been compromised or 
not.
    That is part of why we are here today. But it is also why 
we are here to review, and in some instances to criticize.
    I hope that both of you recognize the importance of a 
constructive dialogue that gets us, as I said, not ever having 
this happen again. I do not believe in nevers. They just do not 
exist. But certainly we have had a record of problems here, not 
of this magnitude, and clearly one now that I trust will move 
forward on.
    Certainly this Committee, and I know that Susan's Committee 
will do the same thing. And as we look beyond VA to other 
agencies of Government to make sure that similar protocol and 
certainly similar policy is put in place. And my guess is with 
the legislation that is out there, legislation that will become 
law passed by Congress in relatively short order as it relates 
to these kinds of things.
    Susan, do you have any additional things you want to say?
    Chairman Collins. No, thank you.
    Chairman Craig. Again, gentlemen, thank you very, very much 
for being here this morning and being as cooperative as you now 
are. We appreciate that a great deal as we work our way through 
this. It is a joint effort.
    And Mr. Secretary, I appreciate your responses and 
obviously taking the responsibility that a person in your 
position must take to deal with these kinds of issues.
    But again, you have a cooperating Committee here that wants 
to make sure we deal with this in the appropriate fashion and, 
where necessary, to provide the resources, if necessary, to 
make sure that this goes away as quickly as possible and that 
no veteran is injured.
    Gentlemen, thank you both. Thank you all very much.
    The Committee record will remain open. Several of my 
colleagues have asked to submit questions in writing and, of 
course, we will allow that to happen. We will keep the record 
open for at least 2 weeks.
    Thank you.
    Voice: Will you take a statement from an affected veteran?
    Chairman Craig. I will be happy to visit with you 
afterwards and anything you want to submit to us, we will be 
happy to put in the record.
    Thank you very much.
    The Committee will stand adjourned.
    [Whereupon, at 12:41 p.m., the Committee was adjourned.]


                            A P P E N D I X

                              ----------                              


  Prepared Statement of Hon. Norm Coleman, U.S. Senator from Minnesota

    We are witnessing a disturbing trend in the Federal 
Government recently in which problems have been identified, 
warnings and recommendations have been issued and then no 
action takes place. The news delivered Tuesday that up to 26.5 
million veterans, the very people we have asked to sacrifice so 
much for this Nation, were now vulnerable to identity theft 
because a VA employee was able to just walk out of the building 
with highly sensitive information is appalling.
    Equally outrageous is that after a third-rate burglary took 
place and put veterans at risk on May 3rd , we learned 
yesterday that Secretary Nicholson was not notified of the 
breach for 13 days, and the FBI was not notified for 14 days. 
And if that weren't enough, since 2001 the VA Inspector General 
has reported security vulnerabilities relating to the operating 
system, passwords, a lack of strong detection alerts, and the 
need for better access controls.
    Mr. Secretary, while it was unfortunate you were not 
informed earlier of the burglary, identity theft is not a new 
problem and the blunt assessment the VA was given from its 
Inspector General should have immediately been addressed. It is 
also unfortunate and troubling that while the VA employee who 
was robbed informed the VA of what happened that same day, it 
took the VA 19 days, almost 3 weeks, to inform Veterans that 
they may be at-risk to identity theft.
    Additionally, identity theft and fraud is a national 
problem that has affected more than 10 million Americans and 
this case raises the question of what the Federal Government is 
doing to protect all sensitive information so it does not fall 
into the wrong hands. The Federal Government is responsible for 
maintaining and protecting sensitive information that Americans 
are required to provide for a wide array of reasons, including 
paying taxes, receiving medical and disability benefits, and 
obtaining retirement compensation.
    In order to determine the extent of the vulnerabilities in 
information security across the Federal Government, yesterday I 
sent a letter to the Government Accountability Office 
requesting a governmentwide review of the current policies and 
practices in place meant to protect the sensitive identity 
information of Americans, and whether these policies may allow 
for a similar type of security breach at other Federal 
agencies.
    The bottom line is that American citizens deserve to know 
if their sensitive information is safe.
                              ----------                              


     Prepared Statement of the Center for Democracy and Technology

    The Center for Democracy and Technology is deeply troubled 
by the revelation that the Department of Veterans Affairs 
carelessly allowed the personal data of millions of men and 
women who've served this country to fall into the hands of a 
simple burglar. Yet, it is our view that this breach is not the 
failure of one employee or even one agency. It is symptomatic 
of a larger failure of data management across the Federal 
Government.
    Until we bring the aging laws and policies that protect our 
personal information up to date with modern technology, these 
catastrophic data ``spills'' will only get worse.
    Attorney General Alberto Gonzalez responded to the breach--
the latest in a series of private and public sector privacy 
gaffes--by vowing to closely monitor for any signs of identity 
theft and to aggressively pursue offenders. This is an 
appropriate and necessary response, now that the data has been 
compromised, but it doesn't come close to providing the 
comprehensive protection for personal information expected when 
the Privacy Act was passed in 1974.
    A growing body of research, supported by years of 
Government Accountability Office reports, makes clear that it 
is time to bolster the protections in that law and dramatically 
improve enforcement.
    In 2003, GAO made clear that ``the government cannot 
adequately assure the public that all legislated individual 
privacy rights are being protected.'' This report and others 
made clear that the problem is not with an individual agency 
but rather an endemic lack of leadership from the White House 
and its Office of Management and Budget over Privacy Act 
enforcement. In the absence of strong Administration leadership 
individual agencies have been left to fend for themselves in 
bringing their information practices in line with the Privacy 
Act.
    CDT's discussions with agency privacy officers support the 
GAO findings. One chief privacy officer for a key agency told 
us that half of the agency's Privacy Act systems of records--
the databases most likely to have sensitive information on 
Americans--were simply missing.
    To address these serious concerns, GAO correctly recommends 
that agencies be given better guidance and follow best 
practices. The Office of Management and Budget's Privacy Act 
guidance was written in 1975 and has never been comprehensively 
updated. Technology has evolved enough in the past 3 years, let 
alone the past 30, to warrant a thorough rewrite of that 
guidance. Such a rewrite alone would send a clear message to 
agency heads and privacy officers that they will be held 
responsible for the sensitive data in their care.
    Although renewed leadership on Privacy Act compliance would 
be an important first step, it's also the case that the law 
itself is in need of renovation, given the technological 
revolution that has taken place in the decades since its 
passage. Congress must patch the holes in the aging laws 
intended to protect the personal information that Americans 
entrust to the government before more massive data breaches 
occur.
    Because of the rash of high-profile data breaches in the 
private sector, Congress has focused its legislative efforts on 
establishing data breach rules for the private sector and has 
not given the same attention to the serious privacy and 
security problems in government agencies that collect and 
maintain databases of personal data on Americans. Indeed, only 
one of the data-breach bills under consideration even begins to 
address the Federal Government's use of personal information. 
The measure, S. 1789, The Personal Data Privacy and Security 
Act'' sponsored by Senators Arlen Specter (R-Pa.) and Patrick 
Leahy (D-Vt.) would, among other things, require greater 
oversight over the government's use of personal data and would 
limit the government's ability to augment its data with 
additional information purchased from private-sector companies 
like ChoicePoint. Today, many government agencies are using 
this commercial data in ways that violate the spirit of the 
Privacy Act, but not the letter of the law. These practices 
have encouraged an atmosphere that suggests that the law is not 
as relevant as it was at the time that it was passed.
    Enacting those provisions would be a valuable step toward 
safeguarding our personal data, but Congress should go further 
and enact comprehensive legislation to bring Privacy Act into 
the 21st century. The law, written during the age of the 
mainframe computer, must be updated to respond to new 
technologies. Today, a smart phone can hold as much data as 
computers that occupied an entire room in 1974. Congress can 
start by updating the basic definitions of the Act and limiting 
the routine exemptions on the data.
    As early as 1977, a Congressional commission found that the 
Act's central definition--``systems of records''--was already 
outdated. Particularly on the Internet, where multiple 
databases can be linked, searched, copied and reconfigured, the 
concept simply does not work. Moreover, privacy advocates and 
policymakers have long complained that the ``routine use'' 
exemption is being used in ways going far beyond its original 
intent. That definition also needs to be reconsidered.
    Congress may also want to review the effectiveness and 
applicability of sections of the Taxpayer Browsing Protection 
Act of 1997, which was passed after abuses by IRS employees, 
including improper removal of taxpayer records from the agency, 
were revealed.
    Americans entrust the Federal Government with significant 
amounts of our personal information in order to deliver 
benefits and services. Updating privacy oversight, policy and 
law in this area is the first necessary step to ensuring that 
this information is not simply left vulnerable to common 
thieves.

        Prepared Statement of the Department of Veterans Affairs

    The Department of Veterans Affairs (VA) has recently 
learned that an employee, a data analyst, took home electronic 
data from VA, which he was not authorized to do. This behavior 
was in violation of our policies. This data contained 
identifying information including names, social security 
numbers, and dates of birth for up to 26.5 million veterans and 
some spouses, as well as some disability ratings. Importantly, 
the affected data did not include any of VA's electronic health 
records nor any financial information. The employee's home was 
burglarized and this data was stolen. The employee has been 
placed on administrative leave pending the outcome of an 
investigation.
    Appropriate law enforcement agencies, including the FBI and 
the VA Inspector General's office, have launched full-scale 
investigations into this matter. Authorities believe it is 
unlikely the perpetrators targeted the items because of any 
knowledge of the data contents. It is possible that they remain 
unaware of the information which they possess or of how to make 
use of it. However, out of an abundance of caution, VA is 
taking all possible steps to protect and inform our veterans.
    VA is working with Members of Congress, the news media, 
veterans service organizations, and other government agencies 
to help ensure that those veterans and their families are aware 
of the situation and of the steps they may take to protect 
themselves from misuse of their personal information. VA will 
send out individual notification letters to veterans to every 
extent possible. Veterans can also go to www.firstgov.gov to 
get more information on this matter. This website is being set 
to handle increased web traffic. Additionally, working with 
other government agencies, VA has set up a manned call center 
that veterans may call to get information about this situation 
and learn more about consumer identity protections. That toll 
free number is 1-800-FED INFO (333-4636). The call center will 
be open beginning today, and will operate from 8 a.m. to 9 p.m. 
(EDT), Monday-Saturday as long as it is needed. The call center 
will be able to handle up to 20,000 calls per hour (260,000 
calls per day).
    Secretary of Veterans Affairs R. James Nicholson has 
briefed the Attorney General and the Chairman of the Federal 
Trade Commission, co-chairs of the President's Identity Theft 
Task Force. Task Force members have already taken actions to 
protect the affected veterans, including working with the 
credit bureaus to help ensure that veterans receive the free 
credit report they are entitled to under the law. Additionally, 
the Task Force will meet today to coordinate the comprehensive 
Federal response, recommend further ways to protect affected 
veterans, and increase safeguards to prevent the reoccurrence 
of such incidents. VA's mission to serve and honor our Nation's 
veterans is one we take very seriously and the 235,000 VA 
employees are deeply saddened by any concern or anxiety this 
incident may cause our veterans and their families. We 
appreciate the service our veterans have given their country 
and we are working diligently to protect them from any harm as 
a result of this incident.
                                ------                                

                     VA's Notification to Veterans

    Dear Veteran: The Department of Veterans Affairs (VA) has recently 
learned that an employee took home electronic data from VA, which he 
was not authorized to do and was in violation of established policies. 
The employee's home was burglarized and this data was stolen. The data 
contained identifying information including names, social security 
numbers, and dates of birth for up to 26.5 million veterans and some 
spouses, as well as some disability ratings. As a result of this 
incident, information identifiable with you was potentially exposed to 
others. It is important to note that the affected data did not include 
any of VA's electronic health records or any financial information.
    Appropriate law enforcement agencies, including the FBI and the VA 
Inspector General's office, have launched full-scale investigations 
into this matter. Authorities believe it is unlikely the perpetrators 
targeted the items because of any knowledge of the data contents. It is 
possible that they remain unaware of the information which they possess 
or of how to make use of it.
    Out of an abundance of caution, however, VA is taking all possible 
steps to protect and inform our veterans. While you do not need to take 
any action unless you are aware of suspicious activity regarding your 
personal information, there are many steps you may take to protect 
against possible identity theft and we wanted you to be aware of these. 
Specific information is included in the attached question and answer 
sheet. For additional information, VA has teamed up the Federal Trade 
Commission and has a website (www.firstgov.gov) with information on 
this matter or you may call 1-800-FED-INFO (1-800-333-4636). The call 
center will operate from 8 a.m. to 9 p.m. (EDT), Monday-Saturday, as 
long as it is needed.
    We apologize for any inconvenience or concern this situation may 
cause, but we at VA believe it is important for you to be fully 
informed of any potential risk resulting from this incident. Again, we 
want to reassure you we have no evidence that your protected data has 
been misused. We will keep you apprised of any further developments. 
The men and women of VA take our obligation to honor and serve 
America's veterans very seriously and we are committed to seeing this 
never happens again. Sincerely, R. James Nicholson Secretary of 
Veterans Affairs.
            Sincerely,
                                        R. James Nicholson,
                                     Secretary of Veterans Affairs.
                               __________

                         For Immediate Release

                              May 22, 2006

         FREQUENTLY ASKED QUESTIONS ON VA'S LETTER TO VETERANS

    Question 1. I'm a veteran, how can I tell if my information was 
compromised?
    Response. At this point there is no evidence that any missing data 
has been used illegally. However, the Department of Veterans Affairs is 
asking all veterans to be extra vigilant and to carefully monitor bank 
statements, credit card statements and any statements relating to 
recent financial transactions. If you notice unusual or suspicious 
activity, you should report it immediately to the financial institution 
involved and contact the Federal Trade Commission for further guidance.
    Question 2. What is the earliest date at which suspicious activity 
might have occurred due to this data breach?
    Response. The information was stolen from an employee of the 
Department of Veterans Affairs during the month of May, 2006. If the 
data has been misused or otherwise used to commit fraud or identity 
theft crimes, it is likely that veterans may notice suspicious activity 
during the month of May.
    Question 3. I haven't noticed any suspicious activity in my 
financial statements, but what can I do to protect myself and prevent 
being victimized by credit card fraud or identity theft?
    Response. The Department of Veterans Affairs strongly recommends 
that veterans closely monitor their financial statements and visit the 
Department of Veterans Affairs special website on this, 
www.firstgov.gov or call 1-800-FED-INFO (1-800-333-4636).
    Question 4. Should I reach out to my financial institutions or will 
the Department of Veterans Affairs do this for me?
    Response. The Department of Veterans Affairs does not believe that 
it is necessary to contact financial institutions or cancel credit 
cards and bank accounts, unless you detect suspicious activity.
    Question 5. Where should I report suspicious or unusual activity?
    Response. The Federal Trade Commission recommends the following 
four steps if you detect suspicious activity:
    Step 1.--Contact the fraud department of one of the three major 
credit bureaus: Equifax: 1-800-525-6285, www.equifax.com, P.O. Box 
740241, Atlanta, GA 30374-0241; Experian: 1-888-EXPERIAN (397-3742) 
www.experian.com, P.O. Box 9532, Allen, Texas 75013; TransUnion: 1-800-
680-7289, www.transunion.com, Fraud Victim Assistance Division, P.O. 
Box 6790, Fullerton, CA 92834-6790.
    Step 2.--Close any accounts that have been tampered with or opened 
fraudulently.
    Step 3.--File a police report with your local police or the police 
in the community where the identity theft took place.
    Step 4.--File a complaint with the Federal Trade Commission by 
using the FTC's Identity Theft Hotline by telephone: 1-877-438-4338, 
online at www.consumer.gov/idtheft, or by mail at Identity Theft 
Clearinghouse, Federal Trade Commission, 600 Pennsylvania Avenue, NW., 
Washington DC 20580.
    Question 6. I know the Department of Veterans Affairs maintains my 
health records electronically; was this information also compromised?
    Response. No electronic medical records were compromised. The data 
lost is primarily limited to an individual's name, date of birth, 
social security number, in some cases their spouse's information, as 
well as some disability ratings. However, this information could still 
be of potential use to identity thieves and we recommend that all 
veterans be extra vigilant in monitoring for signs of potential 
identity theft or misuse of this information.
    Question 7. What is the Department of Veterans Affairs doing to 
insure that this does not happen again?
    Response. The Department of Veterans Affairs is working with the 
President's Identity Theft Task Force, the Department of Justice and 
the Federal Trade Commission to investigate this data breach and to 
develop safeguards against similar incidents. The Department of 
Veterans Affairs has directed all VA employees complete the ``VA Cyber 
Security Awareness Training Course'' and complete the separate 
``General Employee Privacy Awareness Course'' by June 30, 2006. In 
addition, the Department of Veterans Affairs will immediately be 
conducting an inventory and review of all current positions requiring 
access to sensitive VA data and require all employees requiring access 
to sensitive VA data to undergo an updated National Agency Check and 
Inquiries (NACI) and/or a Minimum Background Investigation (MBI) 
depending on the level of access required by the responsibilities 
associated with their position. Appropriate law enforcement agencies, 
including the Federal Bureau of Investigation and the Inspector General 
of the Department of Veterans Affairs, have launched full-scale 
investigations into this matter.
    Question 8. Where can I get further, up-to-date information?
    Response. The Department of Veterans Affairs has set up a special 
website and a toll-free telephone number for veterans which features 
up-to-date news and information. Please visit www.firstgov.gov or call 
1-800-FED-INFO (333-4636).
    (a) CDT is a non-profit, public interest organization dedicated to 
preserving and promoting privacy, civil liberties and other democratic 
values on the Internet and new communications technology. Since its 
founding in 1994, CDT has tracked government information technology 
privacy and security policy to ensure that it has been kept up to date. 
This has included reports and testimony on the Privacy Act, the privacy 
provisions of the E-Government Act and the Federal Information Security 
Management Act.
    (b) GAO, Privacy Act: OMB Leadership Needed to Improve Agency 
Compliance, GAO-03-304 (Washington, DC; June 30, 2003).
    (c) CDT has championed the return of the Chief Privacy Counselor, 
or similar position, to OMB. At the end of the Clinton Administration, 
Chief Privacy Counselor Peter Swire produced regular guidance to 
agencies that, while not comprehensive, at least moved many agencies 
toward positive progress on important privacy matters.
    (d) OMB, ``Privacy Act Implementation: Guidelines and 
Responsibilities,'' Federal Register, Volume 40, Number 132, Part III, 
pp. 28948-28978 (Washington, DC.: July 9, 1975). There has been 
irregular guidance such as that issued on May 22, 2006 (the day of the 
public announcement of the breach).
    (e) Privacy Protection Study Commission, Personal Privacy in an 
Information Society, July 1977. An electronic version is available at 
http://www.epic.org/privacy/ppsc1977report/fPL 105-35.