Compliance

Compliance

Compliance

Another <100 Employee Company Fined for False SPRS Score

08/2025

5  

min read

Aero Turbine Inc., a defense contractor providing maintenance, repair, and overhaul services, and Gallant Capital Partners, a private equity firm, have agreed to pay $1.75 million to resolve allegations regarding failed cybersecurity requirements. This case highlights a growing enforcement trend: the Department of Justice is holding defense contractors of all sizes — and even their investors — accountable for cybersecurity compliance under the False Claims Act.

"This case serves as a reminder that cybersecurity transcends mission sets. Ensuring companies adhere to robust cybersecurity safeguards is integral to maintaining the Air Force’s operational edge against adversaries."

Caroline Galini
Special Agent in Charge at the Air Force Office of Special Investigations

What Was Notable

01
Company size was <100

Many companies think they are too small to be prosecuted, but this case is one of multiple in 2025 where the company prosecuted was under 100 employees. Small suppliers with niche roles in the defense supply chain are held to the same high standards as industry giants.

02
DoD Went After Investors

In a notable move, the DoD pursued not only the contractor but also its investors, Gallant Capital Partners. This appears to be the first time the Department of Justice has held both a company and its investors directly liable under the Civil Cyber-Fraud Initiative and the FCA for cybersecurity lapses.

03
Disclosure Did Not Eliminate Liability

Although the government acknowledged and commended AeroTurbine and Gallant for their cooperation, both companies were still required to pay $1.75 million. As stated in the settlement agreement,

“ATI submitted two written disclosures to the United States concerning ATI’s non-compliance with cybersecurity requirements relating to the MISTR Contract.”

Despite both ATI and Gallant receiving credit under the UnitedStates Department of Justice’s guidelines in Justice Manual § 4-4.112 for taking disclosure, cooperation, and remediation into account in False ClaimsAct cases, they still faced significant repercussions.

04
Enforcement Was Retroactive

The violations occurred between 2018–2020 but were prosecuted in 2025. The government maintains a historical record of compliance submissions and can review them retroactively. Even if a company later becomes fully compliant, past noncompliance can still trigger penalties. Under the FCA, the statute of limitations extends to ten years.

What Happened

In January 2017, Aero Turbine received a U.S. Air Force contract that required compliance with NIST SP 800-171, federal cybersecurity standards designed to protect Controlled Unclassified Information (CUI). The company shared CUI in a separate enclaved system the company’s CUI was not adequately controlled within the environment; therefore, the data was out of scope.

Between January 2018 and February 2020, the company allegedly failed to implement several of these mandatory controls, leaving its systems vulnerable to potential exploitation and unauthorized data exfiltration. By mid-2019, Aero Turbine and Gallant further compounded the issue by engaging an IT company that outsourced improvements to employees in Egypt.

After these issues came to light, both companies submitted multiple written self-disclosures and cooperated with investigators. While the Department of Justice credited their disclosure, cooperation, and remediation efforts, the matter ultimately concluded with Aero Turbine and Gallant agreeing to a $1.75 million False Claims Act settlement—underscoring the serious consequences of noncompliance in federal contracting.

What to Avoid

01

Don’t Claim Contract Data is Contained When it May Not be

The company maintained a system made for CUI; due to several business, process, and technical reasons the company could not control the flow of data used in the contract and isolate it on the system they claimed. This has increasingly become an issue for companies using virtual or cloud enclaves where all contract data and its derivatives are not being contained to enclave.

02

Don’t Assume Compliance as a Company Official

Executives had attested to compliance without fully understanding the underlying requirements or verifying supporting evidence.Signing attestations without defensible records exposes both the company and individual leaders to significant legal and financial risk. To mitigate this, it is essential to maintain clear, documented, and auditable compliance evidence. Assessors rely on NIST SP 800-171A, which outlines 320 assessment objectives across the 110 controls. For each objective, organizations must provide at least two of three forms of evidence:

  1. Something to examine
  2. Something they can test
  3. Someone they can interview

Without this evidence, compliance claims cannot be substantiated, and weak attestations will not withstand regulatory or auditor scrutiny.

03

When an Issue is Found, Fix It

When issues arise, always disclose them to the government and your prime contractor. If Aero Turbine had attempted to conceal its SPRS noncompliance, the penalties could have been far more severe. Under theSupplier Performance Risk System (SPRS), contractors are required to accurately report their compliance with NIST SP 800-171. An inaccurate SPRS score exposes you to escalating legal risk, since every contract signed under a false score compounds liability. If you do have an inaccurate SPRS Score:

  1. Update your SPRS score to be accurate
  2. Notify your customers of updated SPRS score
  3. Implement controls per NIST SP 800-171A
  4. Document those controls
  5. Update your SPRS Score to show improvement
  6. Notify customers of improved score

If you are concerned about the cybersecurity posture of your business, contact Atomus today to see how we can help you achieve compliance.

Logo image

Become Compliant with NIST 800-171, DFARS 7012, and CMMC Requirements

Talk to an Expert