Employee tried to mask extent of latest VA data breach

An information technology specialist at the Veterans Affairs Department misled investigators in an attempt to cover up the extent of a data breach early this year that jeopardized personal information on more than a million people, according to a recent audit report.

In an interview with auditors, the specialist gave inaccurate information about the Jan. 22 loss of an external computer hard drive from VA's Birmingham, Ala., research facility, the report from the department's inspector general stated. The information ended up in a press release about the incident, the investigators found.

The specialist also encrypted and deleted multiple files from his computer shortly after he reported the data missing, making it more difficult to determine what was stored on his desktop, the IG said. He initially denied this when confronted by investigators, the report said. But an IG computer forensic analysis prompted him to admit to taking actions to hide the extent of the missing data.

As of February, the IT specialist, who was not named in the report, had been placed on administrative leave pending the outcome of the investigation. The VA did not respond to requests for an update Monday on the specialist's employment status.

Michael Kussman, VA's undersecretary for health, concurred with the IG's recommendation that "appropriate administrative action [be] taken against the IT specialist for his inappropriate actions during the course of the investigation and for failing to properly safeguard personally identifiable information on his missing external hard drive." Kussman said the "target completion" date for this was Oct. 1, following a review of the evidence.

The specialist had used the hard drive to back up research data he kept on a desktop computer and to store other data from a shared network. The drive is thought to have contained personally identifiable information for more than 250,000 veterans and 1.3 million medical providers. The data on medical providers came from the Centers for Medicare and Medicaid Services and the Health and Human Services Department.

If the specialist had protected the information in accordance with the terms under which it was provided, the breach might have been avoided, the report said. The IG also criticized managers for failing to follow proper procedures to safeguard data stored on external hard drives.

An Aug. 7, 2006, VA policy prohibits employees from storing sensitive data on portable devices without encryption, and assigns responsibility to local supervisors for protecting sensitive information. The Birmingham facility's director did not request encryption software and depended on employees to store external hard drives in a locked office safe when not in use, the audit found.

According to the report, several employees decided not to put the hard drives in the safe, and at least one took home a hard drive that contained privacy protected information concerning VA employees. The facility did not keep records of when the safe was accessed or whether there was an inventory of its contents.

The director of the Birmingham Medical Center moved the research facility into new office space without ensuring that its information security needs were sufficiently evaluated, the IG added. The director told investigators that when he made the decision, he was not aware that employees stored large amounts of sensitive data on external hard drives.

Kussman also agreed with the IG that the center's director should have "appropriate administrative action" taken against him "for failing to take adequate security measures to protect personally identifiable information."

The FBI has joined the investigation in coordination with the Birmingham Police Department. A $25,000 reward has been posted. The VA's technology chief said last month that the data breach would cost the department $20 million.

Investigators have considered "all possible leads," the report stated. Those include a burglary of the office; the IT specialist taking the hard drive out of the office and losing it or having it stolen; a co-worker hiding the hard drive for vengeful reasons; or the accidental disposal of the hard drive during routine housekeeping.

Investigators have visited local computer repair shops, contacted eBay and questioned many individuals working or living near the office, including homeless individuals who frequent the area, the report stated. Fingerprints have been taken and two homes and five vehicles of employees were searched, according to the IG.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.