Cybersecurity

A year after the OPM breach, one cyber vendor is still looking for answers

Ben Cotton, CEO of CyTech. (Photo courtesy CyTech)

Ben Cotton, CEO of cybersecurity vendor CyTech, says he helped OPM clean up in the wake of a massive data breach but hasn't been paid.

On April 21, 2015, an IT contractor unexpectedly found himself at the center of what would become the biggest cybersecurity breach in U.S. government history – the massive breach of Office of Personnel Management databases.

"The whole thing was bungled from the beginning by OPM," Ben Cotton, CEO of the service-disabled veteran-owned small business CyTech Services, told FCW.

Cotton was close to the discovery of the devastating OPM breach – so close that the Wall Street Journal actually reported CyTech's tools were actually responsible for its discovery. OPM has since claimed agency personnel found the intrusion themselves, and Cotton isn't fighting for breach discovery credit.

He is, however, fighting to get paid.

Jumping right in

By OPM's accounting, the feds found the breach on April 15, 2015, and expelled the adversary by April 24.

Cotton was at OPM demonstrating CyTech's CyFIR security tool in between those dates.

"From an atmospheric environment on the 21st, it did not appear to be an organization in the middle of incident response," Cotton said.

Since there was "no real sense of urgency" as he took most of the day to rack up his CyFIR server, Cotton said his OPM escort called it a day around 4 p.m.

Cotton didn't actually scan OPM's systems until the next day, April 22.

"From a known malware perspective, they weren't doing too bad," Cotton said, but when he reported three unknown processes running in OPM's active RAM, "all of a sudden hell broke loose."

OPM's then-CIO Donna Seymour later told Congress that OPM knew the breach had happened and were testing – or "tricking," as one congressman put it – the small business.

Cotton said he leapt into action without signing official paperwork because it was the right thing to do.

"Ben was special forces for 21 years, so he kicked into, 'I see a problem, I need to help' mode," said John Irvine, CyTech's CTO.

Cotton said he stayed on to support the mitigation work for the next week and a half, imaging the RAM and hard disks of potentially affected computers. Another CyTech engineer joined him, and they were at OPM until May 1.

The contract question

They didn't have a written contract. OPM says they never had a contract of any kind.

It's Cotton's contention that OPM director of security operations Jeff Wagner issued an "emergency verbal purchase order" to him on April 22, 2015, and told him to work through prime contractor Imperatis to sort out the details.

Last summer, then-CIO Seymour testified that OPM had purchased licenses from Cytech, but an OPM official told FCW on background that the agency had no records of such a contract, and that Seymour may have spoken in error.

The Imperatis rep that Cotton said was tasked with the contract work, meanwhile, told FCW, "I'm not allowed to talk about that."

Whatever happened, oral contracts are a murky business. The contracting experts with whom FCW spoke agreed that oral orders can be legally binding, but noted they're a minefield for small businesses that don't follow up with written documentation immediately.

Cotton says his company has been stiffed roughly $800,000. OPM officials don't just deny the claims, but have also  discussed the possibility of referring CyTech's case to the Justice Department for False Claims Act charges, according to an agency source. However, proving CyTech is acting in bad faith could be just as difficult for the government as proving a contract ever existed could be for CyTech.

CyTech sent a complaint letter to OPM in January, and OPM responded on March 17 with a request for supporting documentation -- the very documentation CyTech says doesn't exist, because the whole thing was predicated on a spoken order.

Other questions – from a breach cleanup contract breaking rules to a CIO shop accused of providing the inspector general with bad info – add to the strangeness surrounding the OPM hack.

In the end, Cotton left a single CyFIR server with OPM.

In August, OPM abruptly returned the device after the House Oversight Committee started asking questions, with data deleted.

"The data they deleted was also a full record of what our participation was," Cotton said.

Rep. Jason Chaffetz (R-Utah), who chairs the House Oversight and Government Affairs Committee, asked acting OPM Director Beth Cobert for details and documentation on the CyTech appliance in a September 2015 letter. Chaffetz later filed a subpoena for the records, and the issue bubbled up to the fore in Cobert's February 2016 confirmation hearing.

Whether congressional investigators can fill in the record to match Cotton's account remains an open question. Chaffetz, through a spokesperson, declined to be interviewed for this story.

About the Author

Zach Noble is a former FCW staff writer.

Featured

  • Defense
    The U.S. Army Corps of Engineers and the National Geospatial-Intelligence Agency (NGA) reveal concept renderings for the Next NGA West (N2W) campus from the design-build team McCarthy HITT winning proposal. The entirety of the campus is anticipated to be operational in 2025.

    How NGA is tackling interoperability challenges

    Mark Munsell, the National Geospatial-Intelligence Agency’s CTO, talks about talent shortages and how the agency is working to get more unclassified data.

  • Veterans Affairs
    Veterans Affairs CIO Jim Gfrerer speaks at an Oct. 10 FCW event (Photo credit: Troy K. Schneider)

    VA's pivot to agile

    With 10 months on the job, Veterans Affairs CIO Jim Gfrerer is pushing his organization toward a culture of constant delivery.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.