Contracting

CSC, Netcracker fined for using uncleared coders in classified DISA work

programmer

Two companies accused of using employees without security clearances to work on sensitive Defense Information Systems Agency software projects agreed to pay over $12 million to resolve claims they violated the False Claims Act.

Waltham, Mass.-based telecom software and services firm NetCracker Technology Corp. agreed to pay $11.4 million and Falls Church, Va.-based information technology firm Computer Sciences Corp. agreed to pay $1.35 million to settle the case, according to the Justice Department. 

According to a Nov. 2 Justice Department statement, NetCracker and CSC implemented software that used to help manage the telecommunications network used by the Department of Defense, under a contract with DISA, in which CSC was the prime contractor and NetCracker was a CSC subcontractor. 

Between 2008 and 2013, NetCracker allegedly used employees who lacked security clearances to perform work when it knew the contract required those individuals to have clearance, resulting in CSC recklessly submitting false claims for payment to DISA.

An investigation from Public Integrity, which sourced recently unsealed court documents in the case, revealed that a whistleblower discovered the companies used Russian computer programmers to write software for the sensitive U.S. military project -- potentially opening up the Pentagon’s communications systems to cyberattacks.

Army contractor John Kingsley alleged, according to 2011 court documents, that the code written by the programmers included "numerous viruses" that could have harmed DOD networks. The reason the companies used the foreign programmers, he said, was because they worked for one-third the rate of U.S. programmers.

The Justice Department said Kingsley will receive $2,358,750 as his share of the recovery in the case.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at [email protected] or follow him on Twitter at @MRockwell4.


Featured

  • Workforce
    Shutterstock image 1658927440 By Deliris masks in office coronavirus covid19

    White House orders federal contractors vaccinated by Dec. 8

    New COVID-19 guidance directs federal contractors and subcontractors to make sure their employees are vaccinated — the latest in a series of new vaccine requirements the White House has been rolling out in recent weeks.

  • FCW Perspectives
    remote workers (elenabsl/Shutterstock.com)

    Post-pandemic IT leadership

    The rush to maximum telework did more than showcase the importance of IT -- it also forced them to rethink their own operations.

Stay Connected