Scams come in all shapes and sizes
In recent weeks, small applied technology labs and contractors—particularly those in niches like database design, IT modernization, and call center systems, have reported receiving unsolicited outreach from an entity calling itself the Donaldson-Conestee Institute of Technology (often abbreviated as DC Institute or DCIT). The pitch typically involves opportunities for “small business set-aside” contracts, requests for company details, and a push to sign a mutual Non-Disclosure Agreement (NDA) as a prerequisite for further discussion. While the materials appear professional (complete with signed PDFs, logos, and detailed claims), a deeper investigation reveals this organization bears all the hallmarks of a fraudulent operation.
The Self-Proclaimed History and Scale
According to their website (dc.institute) and associated social media:
- The institute claims to have been founded in 1943 during World War II, emerging from support operations at the former Donaldson Air Force Base near Lake Conestee in Greenville, South Carolina.
- It describes itself as a major player in science, technology, engineering, and medicine, with over 8,000 employees, multiple campuses across the U.S. (including Bozeman, Montana), and global operations.
- They boast diverse departments, including Weapons and Defense Technology (WAD-TECH), Biological Engineering and Research (DCBEAR), Aerospace Services, Robotics (via ARTI), Cybersecurity, Construction, and Information Technology.
- Highlighted “achievements” include multi-million-dollar DoD contracts, such as a $10.5 million Navy SPAWAR award for computer storage and other purported federal grants.
The site features polished pages on commercial offerings, careers (inviting resumes to humanresources@dc.institute), and vague calls for small business partnerships.

Key Red Flags Indicating Illegitimacy
Despite these grandiose claims, exhaustive searches across public records, government databases, and professional networks yield no independent verification:
- No Federal Registration or Contract History:
- Not registered in SAM.gov (System for Award Management), the mandatory database for any entity receiving federal payments or bidding on government contracts.
- No records on USAspending.gov for claimed awards (e.g., the $10.5M Navy contract).
- Real defense/research institutes (e.g., MITRE, Johns Hopkins APL, or Draper Lab) have extensive, verifiable federal footprints—this one has none.
- Recent and Hidden Digital Footprint:
- Domain dc.institute registered in May 2021—directly contradicting an 80+ year history.
- WHOIS protected to obscure ownership; hosted via GoDaddy.
- Online presence limited to their own site, a Facebook page (with ~3,000 likes but low engagement), a YouTube channel, and self-published “news” posts.
- Sparse and Suspicious Professional Presence:
- On LinkedIn, searches for the exact name yield minimal results. The primary profile is for “Andrew Wooten” (listed as Program Manager, Clemson University education, Greenville location, only ~4 connections). Other occasional mentions (e.g., a “Hailey Rodgers” as Purchasing Agent) are thin, with low activity and no robust company page or employee network.
- No credible alumni, partner, or employee endorsements; profiles often lack detailed experience or appear generic.
- Unorthodox “Verification” Requests:
- Outreach emphasizes confirmation via the “US Small Business Chamber of Commerce” (ussbchamber.org)—a private, paid-membership site ($299–$899 fees) with no official affiliation to the U.S. Small Business Administration (SBA).
- Legitimate set-asides require SAM.gov verification only; directing victims here is a common tactic to harvest data or push paid “certifications.”
- Tactics Matching Known Scams:
- Unsolicited RFPs/NDAs to small businesses, promising set-asides or vendor listing.
- Professional-looking documents (like the provided NDA dated December 15, 2025, signed by “Andrew Wooten”) to build trust.
- No public complaints found yet (possibly due to recency), but the pattern aligns with advance-fee fraud, data phishing, or fake procurement schemes targeting contractors.
What This Means for Small Businesses and Contractors

This appears to be a sophisticated phishing or fraud scheme designed to:
- Collect sensitive company information (capabilities, certifications, contacts).
- Potentially lead to requests for fees (e.g., for “chamber” membership or bidding).
- Exploit trust in “government-adjacent” opportunities, especially for SDVO, woman-owned, or other set-aside businesses.
If you’ve received similar outreach:
- Do not sign the NDA or share details.
- Verify any opportunity through official channels (SAM.gov opportunities, direct agency postings).
- Report to your email provider, the FTC (ftc.gov/complaint), or IC3.gov if suspicious.
Legitimate opportunities abound through verified portals—focus there for real growth. The absence of any substantive LinkedIn ecosystem (no company page, minimal employee profiles, zero third-party mentions) is particularly telling for an alleged 8,000-person institute. In the professional world, real organizations live on LinkedIn; this one does not.
Stay vigilant—innovation thrives on real partnerships, not fabricated ones. If you’re pursuing database or IT contracts, I’d be glad to help identify verified avenues!
Leave a comment