BeeBright/Shutterstock.com

The Contractor that Hired Russian Coders for a Pentagon Project Has Struck a Deal with Prosecutors

The deal ends a criminal investigation and imposes restrictions and audits on Netcracker Technology.

Russian developers did some of the coding work for a Defense Department software system and stored that code inside a server in Moscow, according to a non-prosecution agreement released Monday.

Those Russian coders only worked on unclassified portions of the Defense Information Systems Agency project, but, in some cases, knew they were helping to develop a highly sensitive system that would attach to Defense Department information networks, according to the agreement between the Justice Department and Netcracker Technology Corp., the subcontractor that hired the Russian coders.

The non-prosecution deal ends a criminal investigation against Netcracker that was led by the Justice Department’s national security division and the U.S. Attorney’s Office for the Eastern District of Virginia.

» Get the best international military business news each week in the Global Business Brief from Marcus Weisgerber. Sign up here.

The agreement comes amid heightened concerns about Russian spy agencies’ efforts to infiltrate U.S. government computer networks.

Government agencies are currently scrambling to rid their computer systems of the Russian anti-virus Kaspersky, which the Homeland Security Department has determined is too closely tied to the Russian government and could be a jumping off point for Russian hackers.

One of Homeland Security’s main public justifications for the Kaspersky order is a Russian law that gives the nation’s security services access to content and other information stored on Russian networks. That law also would have applied to the Netcracker coders, according to the Justice Department.

Even if they only accessed unclassified portions of Defense systems, malicious Russian coders could insert backdoors that beaconed back sensitive information to Russian spies, security experts told Nextgov.

Depending on which software vulnerabilities those backdoors relied on they might withstand moderate or even rigorous security inspections by the Defense Department, the experts said.

Whether the system would have undergone such rigorous vetting isn’t clear and would depend on various factors unique to the project, a former Homeland Security official told Nextgov.

A backdoor into an unclassified system could also be used to search for additional vulnerabilities that could give hackers access to more sensitive or classified data, security experts said.

Even if they didn’t insert a backdoor, the coders could simply share information about the basic structure of Pentagon systems that would make it easier for Russian cyber spies to do their work.

“[The U.S. and Russia] spy on each other heavily and we need to be very careful about who we employ and how the government employs coders who get into the most sensitive things our government does,” said the former Homeland Security official who requested anonymity to discuss the issue freely.

Overall, government and industry have both been slow to understand and protect against the vulnerabilities produced by expansive global supply chains for digital technology and services, the former official said.

U.S. companies have also often opted to outsource coding to nations with lower averages salaries but with outsized digital talent, such as Russia, Ukraine and India, in order to cut down costs.

“I can contract with guys in Ukraine for pennies on the dollar compared with people here in the U.S.,” the former official said.

Russian government access to Netcracker systems could be more concerning than Russian government influence over Kaspersky, Brian Martin, vice president of vulnerability intelligence at the company Risk Based Intelligence told Nextgov, because its software was closer to sensitive Defense Department information.

At the point Homeland Security ordered Kaspersky off government systems in September, the Russian anti-virus had already been scrubbed from all national security systems and was mostly running at smaller agencies, according to officials.

“I think as far as your actual threat models go, it is a bit more of a concern,” Martin said.

Netcracker’s use of Russian coders on the DISA project was the result of a miscommunication, according to the non-prosecution deal.  

Netcracker’s understanding when it joined the project as a subcontractor in 2008 was that it was allowed to employ non-Americans abroad provided they didn’t receive any classified or sensitive information specific to the customer, according to the agreement.

That understanding was later codified in a 2011 agreement between Netcracker and the prime contractor, which Justice documents do not name.

It was only after the project was completed that DISA and the Justice Department’s national security division determined Netcracker’s use of Russian coders “resulted in an unacceptable degradation of the level of security DISA had intended to achieve.”

The non-prosecution deals bars Netcracker from accessing any U.S. customers’ information from overseas and requires the company to adopt enhanced security measures and a security plan that’s vetted by the Justice Department. The company must also pay for third-party audits that it will share with government officials.

Netcracker also had two other contracts with DISA.

One was a 2007 contract for the company’s core commercial product, which DISA understood included code produced by Russian and Ukrainian coders. DISA determined in a 2008 investigation that those coders’ work did not pose a substantial risk to government security.

The company also entered into a separate 2007 contract to customize its core commercial code for DISA’s “unique systems.” That contract required that all customizing work would be done by U.S. citizens inside the U.S. with secret or top secret-level security clearances.

NEXT STORY: Global Conflicts to Watch in 2018

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.