Feral Jundi

Saturday, May 22, 2010

Building Snowmobiles: Cyber Privateers

     Ahhhh, time to fire up the old Building Snowmobiles category again, and thanks to James from Death Valley Magazine for giving me the heads up on this story below. Wired’s Danger Room wrote up an interesting article on the latest contract that Booz Allen Hamilton won with the Air Force in regards to cyber-security. This is interesting to me, because it is a government contracting a PMC to provide security in a commons called cyber space.  It reminds me of our original privateers in the US who were contracted by Congress via the Letter of Marque, to go after the British in that other ‘commons’ called the open sea. And with this latest contract, I would have to say that Booz Allen Hamilton gets the award for top cyber privateer. lol (that is not to say that Booz Hamilton will be getting bounties or seizing assets any time soon, but private industry is certainly answering the call for this one and making some serious money)

     I have lately been toying with the idea of how the Letter of Marque (LoM) could be applied to today’s current cyber security threats and to cyber warfare.  The scope of threats are so large and so complex, that there must be a strategy implemented that can keep up with these threats.  It is my belief that you should approach the problem with multiple solutions that all contribute to the overall strategy, and to create those solutions you need some analysis and you need synthesis.  And cyber privateers is some serious synthesis in my opinion, and I don’t think anyone has really delved into this before.  Issuing a LoM to individuals or companies might be one way to tap into the creativity and freedom of private industry, and still keep a leash on them based on the legal requirements of the letter.  It would be a way for congress to keep control over these kinds of contractors, yet still allow them to do their thing out there.  That kind of free market warfare coupled with very specific control mechanisms is crucial to this concept.

     The LoM can also allow the government to contract with one person or an entire company.  Companies like Booz Hamilton might not be able to attract the star players of cyber warfare.  So if the government wants to get these lone wolves on their side(both foreign and domestic), the LoM and an extremely lucrative bounty or prize law system would be one way to do that. The LoM could also give that lone wolf cyber warrior a license that is signed off and approved by the nations top law makers.  That to me has more appeal than being a subcontractor for some military branch of service, and hanging in limbo as to what laws and policies I need to follow or pay attention too.  Please note all the legal issues surrounding today’s usage of private military companies in the war.  The LoM could be the answer to mitigate those issues for today’s union between private industry and the government.

     Also, the way the LoM works is pretty flexible in my view.  It can be as complex or as simple as we want to make it.  After all, congress would be the ones forming the committee to issue the things, and they would be writing the thing up.  I am sure no one would want the LoM if it did not fully answer all and any legal issues, hence ‘my lawyer will talk with your lawyer’.  That is the way I would envision this.  Because if not, no one would want to do business with Congress and the US government if it did not have all the right protections in that document.

     As to what kind of activities the cyber privateers could do?  Hmmmm. Let your imagination run wild I guess.  Basically, if China wants to use hackers to go after the US for example, those Chinese hackers would be prime targets for cyber privateers.  Hell, cyber privateers could be tasked with going after entire countries that we consider threats. You could also use cyber privateers to go after organized crime, terrorists, etc., and set up bounties for all types of activities that a congress would want their cyber privateers to do. You might want to use cyber privateers for a very specific corner of the cyber warfare market, and the imagination is the only limit. Like Thomas Jefferson once said “Every possible encouragement should be given to privateering in time of war.” Using cyber privateers to conduct cyber warfare or defend the country, is one tool that the government could implement. For further study on the subject of LoM, I would suggest the reader check out this post and publication here, and use the search feature on this blog. –Matt

——————————————————————-

Booz Allen hiring 5,000 employees this year

Friday, May 14, 2010

Washington Business Journal – by Bryant Ruiz Switzky and Gayle S. Putrich

Consulting giant Booz Allen Hamilton Inc. is going on a major hiring binge.

The McLean-based government contractor is hiring 1,500 people over the next two months and expects to hire about 5,000 workers in 2010, some of which are rehires.

More than 60 percent of those jobs will be in the Washington area, said Leslie Esposito, director of recruiting.

Most of the positions are for consultants and include cost estimators, intelligence analysts, operations research analysts, program managers, acquisitions analysts, clinical health consultants, energy consultants, environmental consultants and human capital management and organizational efficiency experts. There is also a wide range of technology-related positions.

Story here.

——————————————————————-

Recent Air Force Contracts with Booz Allen & Hamilton

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $24,302,677 contract which will provide combat-ready forces to conduct secure cyber operations in and through the electromagnetic spectrum, with air and space operations.  At this time, $496,032 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Deliver Order 0414).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $24,283,152 contract which will provide innovative recommendations on information assurance disciplines for Systems Center Atlantic to develop information assurance capabilities for the Federal Compliance Program.  At this time, $122,060 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0407).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $23,302,445 contract which will provide instrumented live, virtual and constructive joint exercise enabled via the Joint National Training Capability’s global grid to enhance information assurance/cyber activities under U.S. Space Command’s span of control.  At this time, $2,672,756 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0417).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $19,835,902 contract which will provide information integrity and integration of information assurance capabilities into existing operational command and control networks and systems.  At this time, $5,000 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0415).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $19,831,145 contract which will define information assurance scientific and technical analysis to be applied to future military satellite communication systems development and assess vulnerabilities of emerging satellite communication systems to provide secure end-to-end communications services to deployed warfighters.  At this time, $1,607,798 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0411).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $15,870.840 contract which will provide secure and highly reliable network operations and computer network defense components in order to carry out Air Combat Command’s mission.  At this time, $45,120 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Deliver Order 0408).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $14,877,735 contract which will provide information assurance and information systems security improvements to U.S. military ground communication systems and onboard U.S. military airborne systems and platforms.  At this time, $2,692,270 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0413).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $14,880,375 contract which will provide state of the art information assurance capabilities in order to increase interoperability and availability of secure information to improve decision making.  At this time, $347,793 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0409).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded an $8,925,518 contract which will develop innovative cyber security capabilities and network defense for Air Force information systems.  At this time, $164,682 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0410).

——————————————————————

Defense Firms Pursue Cyber-Security Work

MARCH 18, 2009

By AUGUST COLE and SIOBHAN GORMAN

WASHINGTON — The biggest U.S. military contractors are counting on winning billions of dollars in work to protect the federal government against electronic attacks.

U.S. agencies from the Pentagon to the Department of Homeland Security have experienced major cyber-break-ins in recent years, even into classified systems. Cyberspies also have siphoned off critical data from Pentagon contractors, including one breach that cost a major aerospace contractor $15 million.

Intelligence officials estimate annual U.S. losses from cyber breaches to be in the billions of dollars, and some worry that cyber attackers could take control of a nuclear power plant or subway line via the Internet — or wipe out the data of a major financial institution.

Anticipating the demand, defense companies are bolstering training, buying smaller firms and hiring former top government officials. The move into the cyber-security field could offer new revenue streams for the contractors and help offset declines stemming from budget pressures on the Defense Department’s traditional weapons systems.

Last year the Bush administration launched a major cyber-security initiative, and 2009 spending is expected to reach $6 billion. Details are classified, but depending on the outcome of a 60-day White House review due next month, people familiar with the effort say spending could range from $15 billion to $30 billion in the next five years.

Major defense firms are eager to get a slice of that pie. But some in the government are worried these firms don’t have the necessary expertise and that the ramp-up in spending is a recipe for waste and inefficiency.

“My concern and the concern of a lot of people in the government is: Are we going to dump money like we did after 9/11, or are we going to get something for the money we spend?” said one senior intelligence official. “You’re getting people who are not necessarily viewed as experts [in cyber-security] running divisions of these companies.”

Northrop Grumman Corp. Chairman and Chief Executive Ronald Sugar made his case in an open letter to President Barack Obama this month, writing, “America’s defense industry has heavily invested in the tools, techniques and human talent to address this problem.”

In August, aerospace giant Boeing Co. hired Barbara Fast, a former senior Army intelligence officer who worked at the National Security Agency, to focus on cyber issues. Ms. Fast is consolidating the capabilities that Boeing has developed to protect its own massive network into a new division.

Lockheed Martin Corp., the top Pentagon contractor and largest government information-technology provider by sales, is constructing a new cyber-security facility at its main network hub in Gaithersburg, Md.

Some intelligence officials worry the government’s clunky contracting system will end up awarding contracts to familiar big companies that lack the highly skilled technicians who gravitate toward smaller firms. Contractors also need to watch their own network security, said Tom Kellermann, a vice president at Core Security Technologies, citing a Verizon report last year that found 39% of cyber breaches implicated contractors and other third parties.

“You can’t put an IT person out there who doesn’t understand the threat or second- and third-order effects,” said Bill Swanson, chairman and CEO of Raytheon Co. Raytheon’s recent acquisitions, such as Oakley Networks in 2007 and SI Government Solutions in 2008, bolster its cyber capabilities.

Foreign firms are also trying to edge into the marketplace. Europe’s biggest defense contractor by revenue, BAE Systems PLC, bought information security firm Detica Group PLC for $1.06 billion in July. It also recently hired a top Bush White House cyber-security official, Marie O’Neill Sciarrone.

As these big defense firms push further into this territory, they are bumping up against consulting firms.

Booz Allen Hamilton has worked in the cyber-security field for more than a decade. One of its senior executives, Mike McConnell, led the National Security Agency and was also director of national intelligence in the Bush administration. He continues to serve on the president’s Intelligence Advisory Board. And Deloitte Consulting recently recruited Billy O’Brien, who helped draw up the Bush administration’s cyber policy.

Story here.

3 Comments

  1. Boze Allen actually does a considerable amount of security consulting and training. One of the contractors I work with on occasion conducts Security Vulnerability assessments of DOD facilities. Just to see what kind of response I get, I very recently applied for one of their positions as a military trainer in counter-insurgency operations. My background and education fits their requirements, although you can never be sure. The pay is unknown.

    Comment by Jason A — Sunday, May 23, 2010 @ 10:34 PM

  2. Got a response. The gig is based out of Hawaii, but the pay is very low.

    Comment by Jason A — Monday, May 31, 2010 @ 1:55 AM

  3. Here is an article about the same concept that popped up elsewhere.

    —————–

    A Free Market Solution to the War on Terror

    Thu, 08/12/2010 – 12:18pm | posted by Tom Knighton

    On September 11, 2001, our world changed. It seems unreal that it was just nine years ago that Osama bin Laden managed to terrorize an entire nation. We responded militarily, as we tend to do when sucker punched like that. However, I’ve had an idea that’s been bouncing around my head for a little while now, and that is based partially on the idea that Congress can issue letters of marque and reprisal. In the digital age.

    Al Queda has money. They have technical savvy. And they’re a pain in the butt.

    However, a large amount of their ability to function is because of the internet and secure computer systems. Their money’s in banks, they use the internet to communicate. They’re backwards, but very 21st century at the same time. Every system they use is vulnerable to hacking.

    So why not let the hackers have a field day?

    Hackers, once considered a plague on computer systems, have been around since before the computer age. They used all kinds of tricks to get around the telephone systems for free. With the coming of the computer age, hackers started poking around in the new technology. Some maliciousness started, just look at viruses, but most hackers are just the curious sort. They might want to hack the Department of Defense computer system, but most to see if they can do it.

    Now, let’s let them take that curiosity, and focus it on Al Queda. By issuing a letter of marque, you can hone the hackers’ skills towards crippling Al Queda. They want to hack a bank computer? Sure. However, you can only touch Al Queda money. Of course, once you hack it, it’s yours. They would be digital privateers, raiding the waves of the information superhighway and still fighting terrorism

    Obviously, some controls would need to be in place. There would need to be evidence that this was, indeed, Al Queda’s money and not someone else’s. However, imagine a world where zero tax dollars were being expended and yet Al Queda or other terrorist organizations were unable to function due to digital cowboys riding protecting the digital frontier.

    Yes, I hear it now, they’d find a way around it. No argument. There’s no way to prevent anyone from doing anything they want to do badly enough. You can only make it more difficult. However, this is a huge step in making it damn near impossible to operate in this day and age.

    And the great thing is that American troops won’t have to die to accomplish this mission, yet the enemy will wish for a shooting war when it’s all over. Not bad, huh?
    http://www.unitedliberty.org/articles/6645-a-free

    Comment by headjundi — Friday, August 20, 2010 @ 7:25 PM

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.

Powered by WordPress