Photo of Kate GrowleyPhoto of Michael G. Gruden, CIPP/GPhoto of Nkechi KanuPhoto of Brian Tully McLaughlinPhoto of Scott WisePhoto of Jacob HarrisonPhoto of Jasmine Masri

Earlier this month, the Department of Justice (DOJ) announced that Swiss Automation Inc., an Illinois-based precision machining company, agreed to pay $421,234 to resolve allegations that it violated the False Claims Act (FCA) by inadequately protecting technical drawings for parts delivered to Department of Defense (DoD) prime contractors.  This settlement reflects DOJ’s persistent emphasis on cybersecurity compliance across all levels of the defense industrial base, reaching beyond prime contractors to encompass subcontractors and smaller suppliers.  The settlement is also a reminder to all contractors not to overlook the often confusing relationship between Controlled Unclassified Information (CUI) and export-controlled information.

Background and Allegations

Swiss Automation is an Illinois-based precision machining business that manufactures alloy and metal components for commercial and government clients across multiple industries.  The enforcement action stems from a qui tam lawsuit filed on August 16, 2022, by a former quality-control manager at Swiss Automation, in the United States District Court for the Northern District of Illinois, captioned United States ex rel. Gomez v. Swiss Automation, Inc., Civil Action No. 22-C-4328.

The relator’s complaint predominately focuses on Swiss Automation’s alleged violations of the International Traffic in Arms Regulations (ITAR).  Specifically, it alleged that the company manufactures numerous defense articles subject to the ITAR for prime contractors and that the company knowingly submitted invoices containing false certifications of ITAR compliance despite awareness of compliance deficiencies.  The complaint detailed multiple alleged violations, including:

    • Failing to adequately safeguard ITAR-controlled articles and technical data, including blueprints and machining diagrams;
    • Allowing numerous “foreign persons” access to ITAR-controlled technical data without securing an applicable ITAR authorization (e.g., an applicable license, agreement, or exemption);
    • Transmitting ITAR-controlled technical data through unencrypted emails; and
    • Manufacturing defense articles subject to the ITAR without processes to handle them as ITAR-controlled.

According to the complaint, the relator first raised these compliance concerns internally in September 2021.  While the management team allegedly acknowledged the ITAR-related shortcomings, it did not address the relator’s concerns.  

Unlike the relator’s complaint, DOJ’s press release and the announced settlement agreement do not reference violations of the ITAR and focus on the cybersecurity measures mandated by Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012.  The government asserted that Swiss Automation knowingly failed to implement adequate cybersecurity pursuant to DFARS 252.204-7012 for technical drawings of specific parts the company delivered to defense contractors.  These alleged failures involved nine purchase orders spanning March 2022 through October 2023, during which the company purportedly caused false payment claims to be submitted.

The Intersection of DFARS and ITAR

This settlement illustrates the critical intersection of two regulatory frameworks that defense suppliers must navigate: DFARS cybersecurity requirements and the ITAR. 

DFARS Cybersecurity Requirements.  DFARS 252.204-7012 generally requires that contractors and subcontractors provide “adequate security” on all covered contractor information systems by implementing National Institute of Standards and Technology (NIST) Special Publication 800-171 security controls when processing, storing, or transmitting CUI.  Importantly, export-controlled information is an explicit category of CUI in the CUI Registry

ITAR and Technical Data.  As described in the CUI Registry, export-controlled information includes “[u]nclassified information concerning certain items, commodities, technology, software, or other information whose export could reasonably be expected to adversely affect the United States national security and nonproliferation objectives.”  This includes ITAR-controlled items.  The ITAR regulates defense articles enumerated on the United States Munitions List (USML) and associated “technical data”—including blueprints, drawings, and specifications needed to design, develop, produce, manufacture, assemble, operate, repair, test or modify defense articles.  Technical drawings and manufacturing specifications may constitute ITAR-controlled technical data when they relate to a USML-controlled defense article and are not otherwise excluded.  Technical data must be protected to prevent the unauthorized export or release to foreign persons, including to foreign persons located within the United States.

As a result, when a U.S. contractor processes, stores, or transmits export-controlled information under a relevant DoD contract, it is often subject to both DFARS 252.204-7012 and ITAR requirements.  While the relator’s complaint did not expressly cite DFARS 252.204-7012 or specific cybersecurity regulations, it appears DOJ linked the alleged ITAR non-compliances to DFARS 252.204-7012. 

Key Takeaways

    1. Cybersecurity and ITAR compliance are intertwined obligations for defense suppliers.  This settlement demonstrates that suppliers processing defense-related technical data face overlapping compliance requirements under both DFARS cybersecurity provisions and the ITAR.  Identical technical drawings may trigger both the duty to implement NIST SP 800-171 controls and the duty to restrict access to export-controlled data.  Companies must address both frameworks in tandem.
    2. Cybersecurity obligations cascade through the supply chain.  The duty to implement NIST SP 800-171 security controls extends beyond DoD prime contractors to encompass subcontractors and suppliers throughout the defense industrial base.  Even smaller suppliers processing technical drawings or other CUI must satisfy DFARS cybersecurity requirements under the terms of their flowdowns.
    3. Enforcement targets suppliers of all sizes, regardless of breach.  While the $421,234 settlement is more modest than recent high-profile cybersecurity FCA settlements involving larger defense contractors, it demonstrates DOJ’s determination to pursue enforcement actions against suppliers of all sizes who fail to satisfy their cybersecurity obligations.  Notably, DOJ may allege FCA liability regardless of whether any actual cybersecurity breach occurred.
    4. CMMC will perpetuate this enforcement trend.  As DOJ notes in its press release, the cybersecurity obligations at issue will persist under the Cybersecurity Maturity Model Certification (CMMC) program that DoD recently finalized.  Suppliers should prepare for heightened scrutiny and certification requirements under CMMC, while not overlooking residual obligations under DFARS 252.204-7012 such as risk-based mitigations and incident reporting.
    5. Proactive compliance is essential.  Suppliers processing DoD information should: (1) determine whether they manufacture defense articles subject to the ITAR or handle ITAR-controlled technical data; (2) identify all foreign persons requiring access to such data and secure required authorizations; (3) conduct gap analyses to evaluate their NIST SP 800-171 compliance; (4) implement necessary security controls; and (5) maintain proper documentation of their cybersecurity and export control programs to mitigate risks of FCA liability.
Print:
Email this postTweet this postLike this postShare this post on LinkedIn
Photo of Kate Growley Kate Growley

Kate M. Growley (CIPP/US, CIPP/G) is a director with Crowell & Moring International and based in Hong Kong. Drawing from over a decade of experience as a practicing attorney in the United States, Kate helps her clients understand, navigate, and shape the policy…

Kate M. Growley (CIPP/US, CIPP/G) is a director with Crowell & Moring International and based in Hong Kong. Drawing from over a decade of experience as a practicing attorney in the United States, Kate helps her clients understand, navigate, and shape the policy and regulatory environment for some of the most complex data issues facing multinational companies, including cybersecurity, privacy, and digital transformation. Kate has worked with clients across every major sector, with particular experience in technology, health care, manufacturing, and aerospace and defense. Kate is a Certified Information Privacy Professional (CIPP) in both the U.S. private and government sectors by the International Association of Privacy Professionals (IAPP). She is also a Registered Practitioner with the U.S. Cybersecurity Maturity Model Certification (CMMC) Cyber Accreditation Body (AB).

Photo of Michael G. Gruden, CIPP/G Michael G. Gruden, CIPP/G

Michael G. Gruden is a counsel in Crowell & Moring’s Washington, D.C. office, where he is a member of the firm’s Government Contracts and Privacy and Cybersecurity groups. He possesses real-world experience in the areas of federal procurement and data security, having worked…

Michael G. Gruden is a counsel in Crowell & Moring’s Washington, D.C. office, where he is a member of the firm’s Government Contracts and Privacy and Cybersecurity groups. He possesses real-world experience in the areas of federal procurement and data security, having worked as a Contracting Officer at both the U.S. Department of Defense (DoD) and the U.S. Department of Homeland Security (DHS) in the Information Technology, Research & Development, and Security sectors for nearly 15 years. Michael is a Certified Information Privacy Professional with a U.S. government concentration (CIPP/G). He is also a Registered Practitioner under the Cybersecurity Maturity Model Certification (CMMC) framework. Michael serves as vice-chair for the ABA Science & Technology Section’s Homeland Security Committee.

Michael’s legal practice covers a wide range of counseling and litigation engagements at the intersection of government contracts and cybersecurity. His government contracts endeavors include supply chain security counseling, contract disputes with federal entities, suspension and debarment proceedings, mandatory disclosures to the government, prime-subcontractor disputes, and False Claims Act investigations. His privacy and cybersecurity practice includes cybersecurity compliance reviews, risk assessments, data breaches, incident response, and regulatory investigations.

Photo of Nkechi Kanu Nkechi Kanu

Nkechi A. Kanu is a counsel in the Washington, D.C. office of Crowell & Moring, where she is a member of the firm’s Government Contracts Group.

Nkechi’s practice focuses on False Claims Act investigations and litigation. Nkechi has significant experience assisting companies with…

Nkechi A. Kanu is a counsel in the Washington, D.C. office of Crowell & Moring, where she is a member of the firm’s Government Contracts Group.

Nkechi’s practice focuses on False Claims Act investigations and litigation. Nkechi has significant experience assisting companies with complex internal investigations and represents clients in government investigations involving allegations of fraud. She also focuses on assisting clients with investigations relating to cybersecurity and information security compliance. Her complementary litigation practice involves defending companies in government-facing litigation arising under the FCA, resulting in the dismissal of qui tam complaints and successful settlements of FCA claims with DOJ.

Photo of Brian Tully McLaughlin Brian Tully McLaughlin

Brian Tully McLaughlin is a partner in the Government Contracts Group in Washington, D.C. and co-chair of the False Claims Act Practice. Tully’s practice focuses on False Claims Act investigations and litigation, particularly trial and appellate work, as well as litigation of a…

Brian Tully McLaughlin is a partner in the Government Contracts Group in Washington, D.C. and co-chair of the False Claims Act Practice. Tully’s practice focuses on False Claims Act investigations and litigation, particularly trial and appellate work, as well as litigation of a variety of complex claims, disputes, and recovery matters. Tully’s False Claims Act experience spans procurement fraud, healthcare fraud, defense industry fraud, and more. He conducts internal investigations and represents clients in government investigations who are facing fraud or False Claims Act allegations. Tully has successfully litigated False Claims Act cases through trial and appeal, both those brought by whistleblowers / qui tam relators and the Department of Justice alike. He also focuses on affirmative claims recovery matters, analyzing potential claims and changes, counseling clients, and representing government contractors, including subcontractors, in claims and disputes proceedings before administrative boards of contract appeals and the Court of Federal Claims, as well as in international arbitration. His claims recovery experience includes unprecedented damages and fee awards. Tully has appeared and tried cases before judges and juries in federal district courts, state courts, and administrative boards of contract appeals, and he has argued successful appeals before the D.C. Circuit, the Federal Circuit, and the Fourth and Seventh Circuits.

Photo of Scott Wise Scott Wise

Scott Wise is a partner in Crowell’s Denver office and a member of the firm’s International Trade Group. His practice focuses on export controls, economic sanctions, and outbound investment issues across industries, with an emphasis on emerging technologies and the technology industry.

Working

Scott Wise is a partner in Crowell’s Denver office and a member of the firm’s International Trade Group. His practice focuses on export controls, economic sanctions, and outbound investment issues across industries, with an emphasis on emerging technologies and the technology industry.

Working with established and start-up tech companies, Scott helps clients to develop unique compliance programs that are responsive to the full range of regulations governing the exports of goods and services. He also trains and counsels clients on compliance with relevant export control regulations such as the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR). In addition to technology companies, Scott advises companies in the aerospace and aviation, automotive, chemical, defense, electronics, energy, engineering, financial and insurance, manufacturing, professional services, security, and transportation industries, among others.

Prior to joining Crowell, Scott was the Assistant General Counsel for Global Trade at a multinational technology company where he led a consolidated team focusing on export controls, economic sanctions, and outbound investment. He was the lead export controls and economic sanctions attorney for key business groups ranging from emerging technologies, such as artificial intelligence and quantum computing, to aerospace and defense contracts, and to commercial software and gaming. In that role, Scott developed the company’s compliance approach to new regulations governing the export of various  new technologies, including AI, integrated circuits and chips, and quantum computing, which involved coordination between senior government officials and business leaders. Scott also has prior law firm experience in the international trade practice area.

Photo of Jacob Harrison Jacob Harrison

Jacob Harrison helps his clients navigate both domestic and international legal challenges.

Jake advises U.S. government contractors on internal investigations and state and federal regulatory compliance. His compliance practice focuses on counseling clients operating at the intersection of government contracts and cybersecurity, including

Jacob Harrison helps his clients navigate both domestic and international legal challenges.

Jake advises U.S. government contractors on internal investigations and state and federal regulatory compliance. His compliance practice focuses on counseling clients operating at the intersection of government contracts and cybersecurity, including for cybersecurity compliance reviews, risk assessments, and data breaches.

In his international practice, Jake represents foreign and domestic clients in Foreign Sovereign Immunities Act and Anti-Terrorism Act litigation. He also has experience advising clients involved in cross-border commercial arbitration proceedings.

During law school, Jake served as an associate editor of the Emory Law Journal and interned at the Supreme Court of Georgia and the Georgia House Democratic Caucus. Before attending law school, Jake worked in politics and state government.

Photo of Jasmine Masri Jasmine Masri

Jasmine Masri is an associate in Crowell & Moring’s Government Contracts and International Trade groups. Jasmine focuses her practice on global compliance issues, regulatory enforcement matters, and government investigations. Through her practice, Jasmine provides counsel on a variety of matters at the intersection…

Jasmine Masri is an associate in Crowell & Moring’s Government Contracts and International Trade groups. Jasmine focuses her practice on global compliance issues, regulatory enforcement matters, and government investigations. Through her practice, Jasmine provides counsel on a variety of matters at the intersection of government contracts and international trade, including cross-border government procurement, economic sanctions, and export controls.