top of page

CMMC Compliance in the Crosshairs: What DOJ’s Cyber-Fraud Crackdown Means for Defense Contractors

  • mike08242
  • Dec 9, 2025
  • 4 min read

Updated: Dec 18, 2025

Featuring insights from former U.S. Attorney Zach Terwilliger on Bourbon & Bytes

CMMC Compliance has officially entered a new era—one where cybersecurity claims aren’t merely

checked for accuracy, but examined with prosecutorial intensity. In a recent episode of Bourbon & Bytes, Terry McGraw sat down with Zach Terwilliger, Managing Partner of Vinson & Elkins’ Washington, D.C. office and former U.S. Attorney for the Eastern District of Virginia, to unpack a sobering reality:


The Department of Justice (DOJ) is no longer treating cybersecurity misrepresentation as a technical issue. It’s treating it as fraud.


And with the escalation of the Civil Cyber-Fraud Initiative, the spotlight is now firmly fixed on organizations that claim to meet CMMC Compliance, maintain accurate SPRS scores, and protect Controlled Unclassified Information (CUI).


DOJ’s New Enforcement Engine: The Civil Cyber-Fraud Initiative


Terwilliger lays out the mechanics behind this major shift. Any time DOJ launches an “initiative,” it signals priority—and priority means attention, resources, and results. For CMMC Compliance specifically, that translates into:


Cyber Fraud Coordinators in Every U.S. Attorney’s Office


Each office now assigns a point person responsible for tracking cyber-related False Claims Act cases. These coordinators gather statistics and feed them up to DOJ headquarters—creating a feedback loop that drives further enforcement.


Growing Bench Strength Inside DOJ


Subject matter experts are emerging across districts as cyber fraud cases accumulate. Just as some U.S. Attorney’s Offices became known for prosecuting organized crime or public corruption, certain districts are now developing reputations for pursuing cybersecurity fraud.


Resource Reallocation


Funding, personnel, and investigative bandwidth are being shifted toward cyber fraud. DOJ is building the infrastructure to pursue CMMC Compliance violations with the same seriousness as healthcare fraud, procurement fraud, or financial crime.


The message is unmistakable:

Misrepresenting your cybersecurity posture—intentionally or recklessly—is becoming one of DOJ’s top enforcement priorities.


False Claims Act + CMMC Compliance:

A High-Risk Intersection


Terwilliger explains why the False Claims Act (FCA) is the weapon of choice. The FCA allows the government to pursue treble damages and per-claim penalties for fraudulent statements.

In the context of CMMC Compliance, that means:


  • Fabricated SPRS scores

  • Unsupported attestations of NIST 800-171 implementation

  • Misleading statements made in bids or ongoing contracts

  • Security controls that exist “on paper” but not in practice


And because so many defense contractors rely on recurring submissions—monthly, quarterly, annually—each submission becomes a potential separate false claim.


That can turn a cybersecurity lapse into an extinction-level event.


The Whistleblower Pipeline Is Growing


One of the most eye-opening parts of the conversation is Terwilliger’s breakdown of the whistleblower ecosystem. These cases often begin not with law enforcement, but with insiders—CISOs, IT staff, analysts, former employees—who believe an organization is falsely claiming compliance.


Because whistleblowers (relators) can receive a percentage of DOJ recoveries, the incentive is enormous.


And DOJ’s visible success in these cases only encourages more filings.


If your CMMC Compliance claims are shaky, someone inside your organization may already be documenting it.


CMMC Compliance Is No Longer a Paper Exercise


The episode reinforces a core point that many organizations still underestimate:CMMC Compliance is now an auditable, prosecutable standard.


Believing you’re compliant isn’t enough. Purchasing tools isn’t enough. Having policies isn’t enough.

DOJ cares about evidence.CMMC assessors care about artifacts.Whistleblowers care about discrepancies.And the government contracting ecosystem cares about truth.

As Terwilliger put it, the days of “hoping nobody finds out” are over.


Avoiding the FCA Trap: What Organizations Must Do Now


Zach outlines a clear set of priorities for companies handling CUI or pursuing CMMC Compliance:


1. Validate Your Current Cyber Posture

Most organizations think they’re compliant—and many are wrong. Independent assessments and technical validation are no longer optional.


2. Create a Culture of Accuracy and Transparency

Executives, boards, and compliance teams must understand the gravity of cybersecurity attestations. Misstatements, even unintentional ones, can form the basis of FCA liability.


3. Document Everything

CMMC assessors, DOJ investigators, and contracting officers all expect traceability. If you can’t prove it, it doesn’t exist.


4. If a CID Arrives, Don’t Wait

Civil Investigative Demands (CIDs) are serious. Companies should immediately engage experienced counsel who understand both FCA and cybersecurity.


The Future of CMMC Compliance: Increasing Scrutiny, Higher Stakes


The DOJ has explicitly identified procurement fraud, including cyber-related fraud, as a priority area. Combined with the growing sophistication of cyber fraud coordinators and the whistleblower pipeline, contractors should expect:


  • More investigations

  • More audits tied to CMMC

  • More False Claims Act cases

  • Greater scrutiny on SPRS score accuracy

  • Higher expectations for technical evidence


CMMC Compliance is no longer a checkbox. It’s a risk surface with legal, financial, and existential consequences.


Final Thought: Act Now, Not Later


Terwilliger’s discussion makes one thing clear:Organizations must treat CMMC Compliance with the same seriousness as financial compliance under Sarbanes-Oxley.


Boards must demand visibility.

Executives must ensure accuracy.

Security teams must deliver evidence.

And the entire organization must understand that mistakes aren’t just technical—they’re legal.


CMMC Compliance has been elevated to a national security mandate backed by DOJ enforcement power.


If you handle CUI, the time to mature your cybersecurity posture is not “before the audit.”It’s now, before the whistleblower, the investigator, or the CID shows up.

Recent Posts

See All
CMMC Self-Assessments and C3PAO Certifications

Understanding Annual and Triennial Assessment Requirements The Cybersecurity Maturity Model Certification (CMMC) program establishes standardized requirements for assessing and validating the cybersec

 
 
 
THE DARK SIDE OF DIY CMMC ENCLAVES

Why Self-Built CMMC Enclaves Fail In the world of defense contracting, achieving compliance with the Cybersecurity Maturity Model Certification (CMMC) is essential for handling Controlled Unclassified

 
 
 
bottom of page