The Ashley Madison Hack Is Not OPM (But the Government May Be Watching It Anyway)

AA Font size + Print

Thousands of the site’s affair-seeking users registered from .mil and .gov domains — at least ostensibly.

At some point on Monday, the hacker group Impact Team made good on a promise to release personally identifiable data of some 38 million users of, a site that bills itself as a matchmaker for the adulterous. By Wednesday, the data dump had become international news.

A California-based data researcher who goes by t0x0 on Twitter found the set online and did some basic parsing and statistical analysis. Among the more predictable revelations: most of the registered accounts — 28 million — belong to men. And thousands of the accounts appeared, at least upon initial inspection, to belong to military servicemembers.

In the database, there were 6,788 accounts connected to emails at; at, 1,665;, 809;, 657; and, 206. And there were a few other domains with national security implications:, 45;, 44; and, 5. (Here’s a list of all the individual .mil domains, and here are lists of the and domains.)

What’s the real blackmail potential here? Probably limited, since the material has already been made public. Moreover, much of the account information is obviously inaccurate — many of the email addresses use false domains, and it’s a good bet that many more are simply made up. reportedly neither required nor checked to make sure an applicant’s given email was valid.

“Clearly, there are plenty of false records, including those from the White House, or,” said CSO Online’s Steve Ragan. “However, the records with full account details, including profiles matched to personal and financial records, are going to be harder to dispute.” That is to say: credit card information is a more reliable identifier.

Does it represent a national security risk?

Patrick Skinner, a former CIA operative now with the Soufan Group, doesn’t think so. In an email, he called it “a minor issue in terms of matching names on the Madison data dump and the OPM hack. Might bring up awkward blackmail attempts perhaps. I’m sure people will try. But one can claim the emails are spoofed.”

People in the national security community are already under extra scrutiny, but that can ratchet up if you’re having an extramarital affair, or are spotted trolling for one. That makes you a blackmail risk, and therefore a potential insider threat.

At a Defense One LIVE event last month, Patricia Larsen, co-director of the National Insider Threat Task Force, said marital issues were one of many potential indicators that they would look at as part of a continuous evaluation.

“There’s a lot of information about you that’s already out there. We want to put it together in one place so we can short circuit the information gathering point,” Larsen said. “We haven’t waited three, four, or five years to see that, you’ve got some nasty credit problems, going through a nasty divorce, and are starting to get worse and worse evaluations over time.”

Someone attempting to access from an government-issued device or from a work computer on the or domains probably doesn’t pose much of a corruptable threat, at least nothing that the Defense Department isn’t already aware of.

A Defense Department official familiar with the insider threat program said, “It depends on how deeply they were getting into the sites from work. There’s a possibility we would have already found them through user activity monitoring. We monitor for certain things.”

In other words, stop screwing around and get back to work.

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.