

US Sues Georgia Tech Over Alleged Cybersecurity Failings As a Pentagon Contractor (theregister.com) 37
The Register's Connor Jones reports: The U.S. is suing one of its leading research universities over a litany of alleged failures to meet cybersecurity standards set by the Department of Defense (DoD) for contract awardees. Georgia Institute of Technology (GIT), commonly referred to as Georgia Tech, and its contracting entity, Georgia Tech Research Corporation (GTRC), are being investigated following whistleblower reports from insiders Christopher Craig and Kyle Koza about alleged (PDF) failures to protect controlled unclassified information (CUI). The series of allegations date back to 2019 and continued for years after, although Koza was said to have identified the issues as early as 2018.
Among the allegations is the suggestion that between May 2019 and February 2020, Georgia Tech's Astrolavos Lab -- ironically a group that focuses on cybersecurity issues affecting national security -- failed to develop and implement a cybersecurity plan that complied with DoD standards (NIST 800-171). When the plan was implemented in February 2020, the lawsuit alleges that it wasn't properly scoped -- not all the necessary endpoints were included -- and that for years afterward, Georgia Tech failed to maintain that plan in line with regulations. Additionally, the Astrolavos Lab was accused of failing to implement anti-malware solutions across devices and the lab's network. The lawsuit alleges that the university approved the lab's refusal to deploy the anti-malware software "to satisfy the demands of the professor that headed the lab," the DoJ said. This is claimed to have occurred between May 2019 and December 2021. Refusing to install anti-malware solutions at a contractor like this is not allowed. In fact, it violates federal requirements and Georgia Tech's own policies, but allegedly happened anyway.
The university and the GTRC also, it is claimed, submitted a false cybersecurity assessment score in December 2020 -- a requirement for all DoD contractors to demonstrate they're meeting compliance standards. The two organizations are accused of issuing themselves a score of 98, which was later deemed to be fraudulent based on various factors. To summarize, the issue centers around the claim that the assessment was carried out on a "fictitious" environment, so on that basis the score wasn't given to a system related to the DoD contract, the US alleges. The claims are being made under the False Claims Act (FCA), which is being utilized by the Civil Cyber-Fraud Initiative (CCFI), which was introduced in 2021 to punish entities that knowingly risk the safety of United States IT systems. It's a first-of-its-kind case being pursued as part of the CCFI. All previous cases brought under the CCFI were settled before they reached the litigation stage.
Among the allegations is the suggestion that between May 2019 and February 2020, Georgia Tech's Astrolavos Lab -- ironically a group that focuses on cybersecurity issues affecting national security -- failed to develop and implement a cybersecurity plan that complied with DoD standards (NIST 800-171). When the plan was implemented in February 2020, the lawsuit alleges that it wasn't properly scoped -- not all the necessary endpoints were included -- and that for years afterward, Georgia Tech failed to maintain that plan in line with regulations. Additionally, the Astrolavos Lab was accused of failing to implement anti-malware solutions across devices and the lab's network. The lawsuit alleges that the university approved the lab's refusal to deploy the anti-malware software "to satisfy the demands of the professor that headed the lab," the DoJ said. This is claimed to have occurred between May 2019 and December 2021. Refusing to install anti-malware solutions at a contractor like this is not allowed. In fact, it violates federal requirements and Georgia Tech's own policies, but allegedly happened anyway.
The university and the GTRC also, it is claimed, submitted a false cybersecurity assessment score in December 2020 -- a requirement for all DoD contractors to demonstrate they're meeting compliance standards. The two organizations are accused of issuing themselves a score of 98, which was later deemed to be fraudulent based on various factors. To summarize, the issue centers around the claim that the assessment was carried out on a "fictitious" environment, so on that basis the score wasn't given to a system related to the DoD contract, the US alleges. The claims are being made under the False Claims Act (FCA), which is being utilized by the Civil Cyber-Fraud Initiative (CCFI), which was introduced in 2021 to punish entities that knowingly risk the safety of United States IT systems. It's a first-of-its-kind case being pursued as part of the CCFI. All previous cases brought under the CCFI were settled before they reached the litigation stage.
When asked to comment... (Score:3)
...a DoD spokesman said, "It was a rambling wreck."
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Sounds like what they really cared about in this case was detailed security auditing and not just antivirus software
Re: (Score:2)
That goes for all NIST guidelines, few of them have definitive specifications on what is required when it comes to Cyber Security and there is a valid reason for it. It's also why you simply go for industry best practices, and it covers your ass in 99% of cases.
But in this case, the simple fundamental requirement of having basic malware detection/protections on endpoints wasn't even done... this is the simplest and easiest one to have. And they failed to do it... then they performed an audit and lied abou
Re: (Score:1)
Re: (Score:2)
This wasn't a technical issue (be it AV/EDR/XDR/XXXXXX) , where they weren't able to put in, and instead put in mitigating solutions/processes- the professor didn't want it installed. And the university said "sure, you're special and can dictate counter to the contractual obligations". The university decided to over ride the contractual obligations they signed with the DoD. (This was hubris.)
Even if it was a technical issue, where a singular solution doesn't work on ALL environments, you get one that wo
Re: (Score:1)
I likened the concept of installing antivirus on machines in a lab environment, as sanitizing samples in a petri dish before putting them under a microscope. Wha
Re: (Score:2)
The technical challenge is the easiest to overcome in this story.
You listed off a crap load and that's barely scratching the surface.
The funny one is that a system with AV on it, can still be used for security research - just takes a bunch of effort to whitelist or exempt files/processes/locations accordingly - so that's a terrible reason for the professor to say no.
These guys were either incompetent, lazy, or cheap. What ever the reason, glad they're being taken to court and held to account for their acti
Re: (Score:1)
This is of course assuming that the cybersecurity research being conducted is on how malware embeds itself into the system, and thus the malware itself needs to be whitelisted. Efforts would need to be taken to avoid a "lab leak" situation,
Re: (Score:3)
They aren't weasel words, they're there because they are allowing you to be flexible for your specific circumstances. And if you honestly think "it says stuff about encryption but then doesn't state any minimum requirements", you should read the discussion sections of each control. Quote 800-171r2 "[SP 800-111] provides guidance on storage encryption technologies for end user devices." And SP800-111 goes deep into details. And as a Federal Contractor the short answer [nist.gov] is "Thou shalt use FIPS 140-3 validated
Re: (Score:1)
This, to an extreme. Having "served" at GT during the period in question, I agree. It's not /too/ feasible in an academic research environment. You can establish some perimeter, but it's extremely leaky even in corporate or lab life.
One reason why DoD, etc. come to academia is because of their increased flexibility. Why something that isn't "fundamental research" (DARPA terminology widely used) went to GTRC and not GTRI with subcontracts for narrow, "safe" areas is confusing. CIPHER at GTRI often was the po
Re: (Score:1)
The U.S. Government's goal at this time may be to merge GTRC and GTRI. GTRI labs could potentially operate under CMMC Level 3 controls if not just CMMC Level 2, while GTRC labs could operate under CMMC Level 1.
However, the question is how well you can secure the perimeter between
Re: (Score:1)
"Merging" isn't sensible. GTRI is the contracting arm. This never should have gone through GTRC (main academic campus) unless pieces are missing from this story. Something else is at play here.
Re: (Score:1)
Second possibility is that the government's new cybersecurity models are supposed to allow contracts to go to GTRC, IF they can achieve CMMC Level 1. Presumably, CMMC Level 1 would be managed by GTRI, for GTRC to meet the contract requirements. This might create a division in internal politics if GTRI is concerned about losing funding but still having to provide the same infrastructu
Re: (Score:1)
Oh, you're not wrong, but the same can be said for SEI, Lincoln Labs, and other academically related FFRDCs.
Something still smells funny here.
Re: (Score:1)
This is why the new Cybersecurity Maturity Model Certifications seem to be developed and starting to slowly roll out, to start putting some teeth behind this stuff and prevent the self-certification issues that have plagued a couple of schools now (Penn State is the other I think).
Of course, the new CMMC appears to be a boondoggle by the people who set it up, but why let a good crisis go to waste...I guess?
Re: (Score:1)
I was briefly brought on-board a non-profit DoD contractor, in Georgia, no less. They had anxiety that their organization wouldn't fall under CMMC Level 1, and would need CMMC Level 2 certification. I was instructed to update internal I.T. Department policy to bring it up to CMMC 2.0 standards. I had the then existing CMMC standard 1.x, which was a bunch of line items that said refer to the NIST 800-171. May as well have been a copy and pa
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Was Defender Off? (Score:2)
Did they have that off? Wondering if GIT was really that nonstandard or if someone just has it out for them.
Re: (Score:2)
Yes, actually. They just want you to use SOMETHING and keep it up to date. 800-171 is really easy to comply with. You have to really put some effort into fucking up that bad to actually get sued over non-compliance.
Re: (Score:1)
A "cybersecurity lab" may be a low priority for limited free Defender licenses, if the lab is researching viruses.
One of my first r
Re: (Score:1)
Re: (Score:1)
Admittedly, there is a lot of reading to be done. You have to at least read the article first. ArsTechnica's reporting on the matter may be somewhat better than The Register's, I haven't decided yet. Then there are the other prerequisites of th
Re: (Score:1)
Re: (Score:1)
I'm not a specialist in viruses and worms, which tend to be less visible than the type of malware that MalwareBytes typically remediates. I don't know what tools would need to be used. In the past, a Virtua
Sadly Predictable (Score:3)
Re: (Score:2)
AV requirements are just a dumb pointless attack vector. Actually secure systems wouldn't let anything untrusted execute in the first place.
auditd does a good job of verifying that and every auditor I've interacted with was happy with it.
Re: (Score:1)
Georgia Tech's shortcomings do not immediately indicate an issue with "classification", but rather an inability to control access to information.
Professor (Score:2)
Re: (Score:2)