Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
CMMC and the False Claims Act
June 23, 2020 •Walt Paley
In a recent webinar promoting the development of the Cybersecurity Maturity Model Certification (CMMC), Katie Arrington made reference to the False Claims Act and encouraged attendees to look into it. Ms. Arrington is the Chief Information Security Officer, Office of the Undersecretary of Defense for Acquisition of the U.S. Department of Defense (DoD) and is leading the charge for CMMC, so when she suggested investigating it, I listened.
The False Claims Act (FCA) was first enacted in 1863 and has had a handful of amendments, including a crucial modernization in 1986 that made it the most effective antifraud law in the United States, according to the National Whistleblower Center. It was originally written to give recourse to the Union Army during the Civil War when untrustworthy defense contractors took advantage of the conditions, providing spoiled food or malfunctioning weapons, for example. Because it was passed during Lincoln’s presidency, it became known as the “Lincoln Law” in many circles and successfully gave teeth to the Army’s claims against fraud.
From the Department of Justice: The FCA provides that any person who knowingly submitted false claims to the government was liable for double the government’s damages plus a penalty of $2,000 for each false claim. The FCA has been amended several times and now provides that violators are liable for treble damages plus a penalty that is linked to inflation.
Note that there is a requirement to prove that the entity submitted the false claim (or caused the submission of the false claim) with knowledge of the fraud. Accidental duplication of invoices would not qualify. Erroneous charges or typos would not qualify. How about purposeful overbilling or entirely fabricated bills? These practices would absolutely qualify, and have been successfully pursued, resulting in some of the largest settlements in recent history. In fact, the DOJ successfully recouped more than $3 billion USD in settlements and judgments related to the FCA in the last complete fiscal year. Wow.
So yes, it is still actively and effectively deployed today. But why did Katie Arrington bring it up?
In the context of her comments, I believe it was to underscore some half-baked complaints from defense contractors about CMMC compliance being an undue burden.
Arrington reminded attendees that the aim of the CMMC is not to reinvent the wheel. Instead, the process is intended to standardize, confirm, and certify the Defense Industrial Base companies’ existing self-attestation claims of compliance with the various DFARS clauses and NIST regulations. If those self-affirmations have been truthful, the CMMC is really just a "prove it and approve it" exercise with a C3PAO (CMMC Third Party Assessment Organization). If it is a significant burden to implement procedures and protections, then the contractor has likely falsified self-attestations and was in violation of the FCA in previous contracts. That creates a certain kind of elegant Catch-22 for affected companies - complain about the process, complain about the timeline, complain about many things... but don’t complain about having to implement new security measures if you already attested that you had them in place.
FIPS 140 validated encryption is a key building block in CMMC, as with all Federal compliance programs that rely significantly on NIST expertise and recommendations. SafeLogic’s ability to provide drop-in modules for instant compliance, accelerate the FIPS validation, and provide expert support for the crypto implementation make us an extremely valuable partner to have in your Rolodex as you approach CMMC. Even better, we can complete all of those operations in parallel with your CMMC efforts so there is no time wasted.
Contact us anytime with questions and keep an eye out for our upcoming whitepaper on CMMC’s requirements for FIPS 140 validation.
Walt Paley
Walter Paley is the VP of Communications for SafeLogic. He is responsible for strategy, content, marketing, and outreach. Walt has worked with a series of start-ups and companies in growth stages, including Nukona (acquired by Symantec), Qubole, Bitzer Mobile (acquired by Oracle), and TigerText, among others. An Alumnus of the psychology program at UC San Diego, Walt lives in Southern California with his wife, kids, and their black lab, Echo.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)