Settlement from DOJ’s Civil Cyber-Fraud Initiative Highlights Rising Risks Under the False Claims Act

Published:

DOJ and Georgia Tech Research Corporation Settle Cyber Fraud Allegations

DOJ’s Commitment to Cybersecurity Enforcement

The recent settlement between the United States Department of Justice (DOJ) and the Georgia Tech Research Corporation (GTRC) highlights a growing emphasis on enforcing cybersecurity compliance under federal contracts. Established as a research affiliate of the Georgia Institute of Technology, GTRC faced scrutiny for allegedly not adhering to mandated cybersecurity measures when handling sensitive governmental data. This significant settlement serves as a cautionary tale for organizations working with federal contracts, reinforcing the necessity of compliance with cybersecurity requirements to avoid serious legal consequences.

Settlement Details: A Major Financial Penalty

On September 30, 2025, the DOJ announced that GTRC would pay $875,000 to settle allegations of violating the False Claims Act (FCA). The allegations centered on GTRC’s inadequate protection of sensitive data in connection with government contracts involving the Air Force and the Defense Advanced Research Projects Agency (DARPA). The FCA conversation is especially relevant in recent years as it provides a legal avenue for the government to recover funds from entities that fail to meet compliance standards, demonstrating that negligence in cybersecurity could lead to significant financial repercussions.

The Rise of the Civil Cyber-Fraud Initiative

Launched in October 2021, the DOJ’s Civil Cyber-Fraud Initiative aims to tackle non-compliance with federal cybersecurity requirements effectively. Under this initiative, organizations that contract with the federal government must certify that they meet specific cybersecurity standards, including compliance with the National Institute of Standards and Technology’s Special Publication 800-171 (NIST SP 800-171). These requirements necessitate that contractors implement a suite of cybersecurity measures designed to protect sensitive information. Failure to comply—and subsequently certifying compliance—could amount to submitting false claims, triggering serious legal action under the FCA.

Mechanism of the Civil Cyber-Fraud Initiative

Through this initiative, the DOJ holds entities accountable for compromising government data through negligence or misrepresentation in cybersecurity practices. Organizations can face scrutiny for multiple violations, including delivering deficient cybersecurity solutions, misrepresenting their capabilities, or breaking existing obligations to monitor and report cybersecurity incidents. The FCA allows private whistleblowers, known as “relators,” to file lawsuits against these entities, facilitating the government’s ability to identify fraudulent behaviors and potentially allowing relators to receive a portion of any recoveries.

Unpacking the GTRC Settlement

The GTRC settlement arose from a qui tam lawsuit filed in 2022 by former members of Georgia Tech’s Cybersecurity Team, highlighting internal concerns about GTRC’s cybersecurity practices. The DOJ stepped in on behalf of the Department of Defense (DOD) in 2024, claiming GTRC had failed to:

  1. Implement essential antivirus tools at the Astrolavos Lab, a location crucial for DARPA-linked cyber defense research.
  2. Follow cybersecurity plans mandated by its government contracts.
  3. Submit accurate cybersecurity assessment scores to the DOD.

The government alleged these failures could amount to damages of up to $28 million, representing payments made under the relevant contracts. Central to the allegations was the Defense Federal Acquisition Regulation Supplement (DFARS) and its requirement that contractors meet specific cybersecurity standards, thus framing these lapses as significant violations of the FCA.

Implications of the Settlement

The DOJ classified the federal cybersecurity regulations as material terms within GTRC’s contracts. As invoices had been submitted to the government without compliance with these requirements, GTRC potentially violated the FCA under the theory of implied certification. The settlement stipulates that of the $875,000 total payment, $437,500 would be designated as restitution to the DOJ, while whistleblowers stand to receive $201,250.

The Broader Impact on Compliance

This settlement acts as a clear reminder of the legal risks associated with inadequate cybersecurity measures. It emphasizes the DOJ’s determination to enforce compliance consistently, especially for entities interacting with federal contracts. Representatives from the DOJ, DOD, and Air Force Office of Special Investigations have signaled a commitment to holding contractors accountable, making it clear that compliance with cybersecurity standards is non-negotiable. For companies involved in government contracts, it is increasingly crucial to view cybersecurity not merely as an administrative obligation but as a critical risk management priority.

Best Practices for Contract Holders

Organizations are encouraged to invest in robust cybersecurity systems and protocols to secure sensitive data effectively. Compliance professionals must prioritize federal funding requirements, understanding that even seemingly minor regulatory challenges can have significant implications. Non-compliance is not just an operational risk; it can also lead to serious legal exposure.

The evolving landscape of cybersecurity regulations means that companies engaged with federal contracts must stay ahead of compliance requirements. Legal resources are available, and organizations can seek guidance from experts in compliance, investigations, and cybersecurity practices to navigate the intricacies of federal regulations and ensure alignment with the law.

Navigating the Future

As the Civil Cyber-Fraud Initiative remains a priority for the DOJ, organizations must recognize the importance of maintaining a strong cybersecurity posture. With the potential for litigation on the rise, aligning with cybersecurity requirements becomes critical for safeguarding not only sensitive data but also the reputations and financial stability of organizations involved in federal contracts.

Related articles

Recent articles

New Products