MORSE Corp, a defense contractor based in Cambridge, Massachusetts, has agreed to pay $4.6 million to resolve allegations that it failed to comply with federal cybersecurity standards—raising serious concerns about how sensitive data is handled by military contractors.
The settlement stems from a whistleblower complaint filed in early 2023, which revealed that MORSE—known for its work in aerospace engineering—may have misrepresented its cybersecurity practices while working on contracts with both the U.S. Army and Air Force.
According to the whistleblower’s legal team, MORSE allegedly inflated its cybersecurity assessment score, failed to develop a unified System Security Plan (SSP), and relied on non-compliant email services that didn’t meet federal security guidelines. More critically, the company was accused of not fully implementing required controls under the NIST (National Institute of Standards and Technology) cybersecurity framework, which is mandatory for contractors handling sensitive government data.
These issues prompted the U.S. Department of Justice to investigate, ultimately concluding that MORSE had violated the False Claims Act, a federal statute used to penalize contractors who mislead the government. On Wednesday, the DOJ formally announced the settlement.
U.S. Attorney Leah B. Foley said:
“Federal contractors must fulfill their obligations to protect sensitive government information from cyber threats. We will continue to hold contractors accountable for upholding cybersecurity standards to protect both taxpayer dollars and national security.”
The Justice Department emphasized that cybersecurity compliance isn’t optional—especially for companies with access to critical defense-related information. Contractors who fail to meet these standards can place national security at risk and create unfair advantages over those who follow the rules.
Heightened Scrutiny on Defense Cybersecurity Practices
While MORSE has not yet issued a public statement regarding the settlement, the case highlights growing scrutiny over how defense contractors handle cybersecurity. Government agencies increasingly rely on third-party vendors, making it essential for those vendors to properly safeguard classified and sensitive data.
Under current rules, all defense contractors are required to report data breaches and implement robust information security measures. Failure to comply can lead not only to financial penalties, but also suspension or exclusion from future contracts.
Meanwhile, U.S. lawmakers are pushing for stronger protections. A proposed bill would require all federal contractors to implement vulnerability disclosure programs, enabling ethical hackers and researchers to report security flaws safely. The goal is to prevent malicious actors from exploiting unreported weaknesses in government systems.
Why the MORSE Cybersecurity Failure Matters
The MORSE cybersecurity failure settlement serves as a stark reminder that compliance with federal cybersecurity standards isn’t just a bureaucratic requirement—it’s a national security imperative. As cyber threats continue to evolve, ensuring accountability across the defense supply chain remains a top priority for federal agencies and enforcement bodies.