Running Head: OPM INCIDENT
The unethical hacking of the United States Office of Personnel Management took place
in April 2015, and it involved personnel files for the government's civilian workforce. The
hacking activity involved access to sensitive data such as SF-86 forms that contain personal
information for government security clearance seeking individuals. The hacking also led to the
entrance of millions of people's fingerprints. The unauthorized access to the OPM led to a
congressional investigation and executives' resignation. The congressional OPM data breach
report reveals that X1 and X2 dubbed groups perpetrated the OPM incident hackers. However,
US law enforcement claim that the two perpetrators were a foreign entity. Therefore, this paper
analyses the psychological aspects of X1 and X2 dubbed groups suspects to OPM incident cyber
intrusion (Fruhlinger, 2020).
Psychological aspects of X1 and X2
According to congressional OPM data breach report, cyber intrusion, especially to
sensitive information such as that of the Office of Personnel Management, is not perpetrated just
for fun. Still, the intruders most have psychological aspects towards the motive. Most research
reveals that hackers, most so cyber intruders, have a motivating background concerning their
data breach targets. In this investigative analysis, psychological aspects such as motives,
opportunity, and means of the cyber intruders will be the central point.
In the opportunity psychological aspect of the perpetrators, the concentration point will
be how and when the cyber intruders perpetrated the crime. In addition to ways of crime
perpetration, importance is put on vulnerabilities focus caused by the users.
The cyber intrusion started in November 2013, when the OPM network was first
breached. In the first attack, the X1 perpetrator was not able to succeed in personal records
access. However, the perpetrator managed in Information Technology system architecture and
15 Million Students Helped!
Sign up to view the full answer