Feral Jundi

Monday, September 27, 2010

Leadership: The Next Petraeus–What Makes A Visionary Commander?

“One day you will take a fork in the road, and you’re going to have to make a decision about which direction you want to go. If you go one way, you can be somebody. You will have to make your compromises and … turn your back on your friends, but you will be a member of the club, and you will get promoted and get good assignments. Or you can go the other way, and you can do something, something for your country and for your Air Force and for yourself. … You may not get promoted, and you may not get good assignments, and you certainly will not be a favorite of your superiors, but you won’t have to compromise yourself. … In life there is often a roll call. That’s when you have to make a decision: to be or to do.”

-Col. John Boyd

*****

     As I read through this I was thinking ‘What makes a visionary PMC/PSC CEO?’ You really don’t hear much about that kind of thing in our industry.  Although there is plenty of good stuff to learn from the military community, and that is why I wanted to post this.

     I also had that famous quote running through my head ‘to be, or to do…’ from the mighty Col. John Boyd. One of the points of this article is that the military has a hard time producing leaders that are there ‘to do’ the job, primarily because the system really doesn’t lend itself for that.  It is more restrained and not very flexible.  Everyone has a specific career track, with boxes that must be checked off. God help you if you draw outside the lines in this world, or dare to take a different path.

     The other point made was that of life experiences and preparation for the real world of being in the high command. That these guys are having to not only be masters of the combat arms and strategy, but must also be the ultimate ‘everyman’.  They could be working with civilians, talking with Rolling Stone reporters, hanging out with Presidents that could care less about winning wars and more about politics, working with disaster relief organizations in disaster zones, trying to manage a massive civilian contractor force and ‘building snowmobiles’ on a daily basis just to win the numerous political wars, as well as the real wars. Being a general these days is no joke.

     I would also apply the same standard to today’s CEO of PMC’s and PSC’s.  This is an incredibly fast paced and technological world we live in. In order to stay competitive, a company and it’s leaders must always stay ahead of the game and their competitors. At least in our industry, CEO’s either do well and keep the company profitable, or fail miserably and be kicked to the road.  The free market is what produces our ‘visionary commanders’.

     Good article and check it out. –Matt

—————————————————————–

The next Petraeus

What makes a visionary commander, and why the military isn’t producing more of them

By Renny McPherson

September 26, 2010

President Obama recently demoted General David Petraeus, the man who led the turnaround in Iraq and is widely acknowledged to be the most effective military officer of his generation.

In June, the president needed a new commander to lead the war effort in Afghanistan, after General Stanley McChrystal spoke too openly with a Rolling Stone reporter and was forced to resign. And, while few may realize this, when Petraeus was appointed to take over in Afghanistan, he was replacing a subordinate. Petraeus may yet be hailed for saving the day. But he also got a new boss and moved one step down the chain of command.

How does this happen to the best our military has to offer? Why was there no other general to take the job?

The short answer is that the US military has failed to produce enough leaders like Petraeus–the kind of broad-minded, flexible strategic thinkers needed to lead today’s most difficult missions. And a large contributor to this failure is the military’s inflexible system of promotion, which can actively discourage young officers from getting the mind-expanding, challenging experiences that could turn them into potent generals.

(more…)

Wednesday, September 15, 2010

PMC 2.0: Innovation Prizes For Private Military Companies

“I’m worth a million in prizes..” Iggy Pop

*****

     Wow, I really liked this article at the Economist and I wanted to share.  It kind of shows how desperate private industry and governments are for really good ideas.  And as everyone here knows, I am all about new ideas or ‘building snowmobiles’ and I try to promote that process as much as I can.

    But imagine adding incentive to the ‘building snowmobiles’ theme?  That is what makes innovation prizes such an interesting and potentially lethal concept for our industry and the war effort. Perhaps I should consider raising prize money for the best construction of a Letter of Marque concept for modern warfare use?  How about an innovation prize for low cost, high return warfare ideas?  Really open it up to the public, or just offer the contests within the boundaries of an organization. How about an innovation prize for new types of war or business strategies? Or how about for a company logo? To really put it out there, how about using mobile cash as a means to reward locals as a means of gaining ideas for COIN and reconstruction in Afghanistan?

    Companies could also offer innovation prizes to those who can come up with the best cost saving ideas, or to new directions in business?  There are many complex problems a company could try to solve by putting it out there for their employees to solve through a prize system.  It is just one more way to create that unique situation that would allow for your employees to create something important to the company or ‘people will support what they help to create’.

    Now the one thing that is most valuable and truly the prize, is business success or victory in war. A company would be smart to not only offer prizes for innovations, but to reward their company as a whole by increasing salaries because they are more profitable. Or offer the benefit in one way or another, which would reward your employees for participating in this innovation prize concept in the first place.

    The articles below indicate that this is a major theme throughout the world, and it sounds like most of the experts agree that it works.  For companies reading this, InnoCentive is the company that the Economist identified as a platform for innovation prizes.  Or you could just start your our prize initiatives. If the US government is jumping all over this stuff with their Challenge.gov site, then our industry could probably stand to benefit from it as well. I would even post it here on the blog if it was open to the industry and public?

    As for the problem solvers out there, there are plenty of prizes to go after if you have some big ideas.  Thousands of dollars are available and it sounds like these prizes are only increasing in size and number.  Just check out the chart below. –Matt

And the winner is…

Challenge.gov looking for great ideas

For Corporations (from InnoCentive website)

—————————————————————-

And the winner is…

Offering a cash prize to encourage innovation is all the rage. Sometimes it works rather well

Aug 5th 2010

A CURIOUS cabal gathered recently in a converted warehouse in San Francisco for a private conference. Among them were some of the world’s leading experts in fields ranging from astrophysics and nanotechnology to health and energy. Also attending were entrepreneurs and captains of industry, including Larry Page, the co-founder of Google, and Ratan Tata, the head of India’s Tata Group. They were brought together to dream up more challenges for the X Prize Foundation, a charitable group which rewards innovation with cash. On July 29th a new challenge was announced: a $1.4m prize for anyone who can come up with a faster way to clean oil spills from the ocean.

The foundation began with the Ansari X Prize: $10m to the first private-sector group able to fly a reusable spacecraft 100km (62 miles) into space twice within two weeks. It was won in 2004 by a team led by Burt Rutan, a pioneering aerospace engineer, and Paul Allen, a co-founder of Microsoft. Other prizes have followed, including the $10m Progressive Automotive X Prize, for green cars that are capable of achieving at least 100mpg, or its equivalent. Peter Diamandis, the entrepreneur who runs the foundation, says he has become convinced that “focused and talented teams in pursuit of a prize and acclaim can change the world.”

(more…)

Friday, August 6, 2010

Building Snowmobiles: Using Economic Theory To Predict Enemy Strategy?

“It is clear that war is not a mere act of policy but a true political instrument, a continuation of political activity by other means.” Karl Von Clauswitz

“What is of supreme importance in war is to attack the enemy’s strategy.” – Sun Tzu

     First off, I want to mention that this post is the product of one of my reader’s ‘a ha’ moments.  What really makes this cool is that this reader is a fan of the ‘building snowmobiles’ posts on FJ and this was him putting together these random pieces and creating something out of all of it.  He had attended a college course years back that covered economic theory, he is well read on the war and a veteran of the war in Afghanistan, he had read Feral Jundi and knew how fun analysis and synthesis can be, and then finally stumbled on some recent news about the war and Taliban strategy, and put it all together. And this is me trying to assemble the thing based on his instructions, and I am thoroughly enjoying myself.

     Simply put, this is about using economic theory as a potential tool to predict enemy strategies, so you can defeat those strategies.  Because like Sun Tzu says, it ‘is of supreme importance to attack the enemy’s strategy’. Of course I am not going to go all out and say you can predict with 100 percent certainty what your enemy will do. Still, the closer you can get the better, and these are potential tools you can use for predictive analysis.

    In this exercise, we will use Afghanistan and the current war against the Taliban there. At this time, we are also using a counter-insurgency strategy.  The Taliban are considered the insurgents in this case, and they too are using a insurgency type strategy.  Both strategies are heavily influenced by gaining the support of the population. Famous counter-insurgent David Galula had this to say about counterinsurgency:

The aim of the war is to gain the support of the population Galula proposes four “laws” for counterinsurgency:

1.The aim of the war is to gain the support of the population rather than control of territory.

2.Most of the population will be neutral in the conflict; support of the masses can be obtained with the help of an active friendly minority.

3.Support of the population may be lost. The population must be efficiently protected to allow it to cooperate without fear of retribution by the opposite party.

4.Order enforcement should be done progressively by removing or driving away armed opponents, then gaining support of the population, and eventually strengthening positions by building infrastructure and setting long-term relationships with the population. This must be done area by area, using a pacified territory as a basis of operation to conquer a neighbouring area.

Galula contends that:

A victory [in a counterinsurgency] is not the destruction in a given area of the insurgent’s forces and his political organization. … A victory is that plus the permanent isolation of the insurgent from the population, isolation not enforced upon the population, but maintained by and with the population. … In conventional warfare, strength is assessed according to military or other tangible criteria, such as the number of divisions, the position they hold, the industrial resources, etc. In revolutionary warfare, strength must be assessed by the extent of support from the population as measured in terms of political organization at the grass roots. The counterinsurgent reaches a position of strength when his power is embedded in a political organization issuing from, and firmly supported by, the population. 

   I wanted to put this out there first as one of the main definitions of COIN, so we have somewhere to start.(most strategies are population-centric)  In this war, we are basically fighting for the support of the people, and you could easily say that this is politics with guns.  You could also say that both sides of this conflict are selling to the population that they are a better idea and friend than the other guy.  The Taliban use their methods to achieve population support, and we use ours. In other words, we are in the business of politics in this war. We are trying to win votes or popularity, and like politicians, we are finding all and any way to win as many votes as possible.

(more…)

Thursday, June 24, 2010

Building Snowmobiles: Human-flesh Search Warfare

     Sinnreich adds a psychological component. “A lot of us really know next to nothing about what’s really going on militarily in Afghanistan,” he says, “so when a schism like this opens up, we think, ‘There must be more to this.’ ” A “collective detection mentality” takes over, he says, and thousands of people start piecing together thousands of bits of information to get a bigger picture.

*****

     If anyone is wondering how I come up with this stuff, I will explain.  I will read about one interesting concept, store it away in my brain, and then when I hit some trip wire ideas that fit in with that prior concept, some ‘illumination’ occurs. In this case, I was reading about human-flesh search engines a week or so ago, and then the Rolling Stone atomic bomb of a story comes out, and I started putting two and two together.

   First, let’s discuss what each component is and then we can discuss how they fit together, and then finish up on how to weaponize the concept (if possible).  Because if you look at what happened here, the best general that the US had, second only to Petraeus, was effectively removed from his post, all because of what was said in an article and the flash fire effects of new media.  That is one hell of an attack if you could figure out how to reproduce it.

   The first part of the concept is the human desire to want to know.  And the tools we have available to us these days, give us the ability to ‘know’ what is going on very quickly.  The news cycle and people’s ability to get that news, and how it allows us to pass it on to the next guy is mind boggling fast.  It doesn’t combust like a fire, it explodes like a bomb, and new media/social media is the facilitator for everyone who wants to know.

   For example, when the McChrystal ‘Runaway General’ news came out, I had heard about it via Facebook, Twitter, newsletters, updates via email, and my RSS reader.  I also got the news via my iPhone, which means I did not have to wait until I got home to read all of this stuff. The news exploded, and like most, I passed that news on to my network.  I then got to work on posting a blog entry about the thing, because it was a big story.  And so did thousands of other journalists, bloggers, forum participants, etc.  So analyzing the whole thing kicked in instantly as well.

   On my RSS reader, I saw multiple blog posts coming up from all over about the story.  People analyzing and giving opinions, and everyone was reading everyone else’s stuff and trying to come up with the best conclusions.  Partly because they wanted to know the real deal, and partly because they wanted to choose the right angle on the whole thing so they would not look like an ass to their readers and friends. So not only did bloggers want to ‘know’, they wanted to be the ones that looked like they ‘knew’.  All of these bloggers, to include myself, were furiously going over the material as it came out over the internet.  Our business is to know, and believe me, we were trying to do that.

   That process of wanting to know, or what the professor up top worded as ‘collective detection mentality’ is the first part to understand here. We are human, we are competitive, and knowledge is power.  When everyone is fighting to learn and know what is going on, that process creates the informational tsunami.  That information wave can also do much to force an action and create a desired outcome for whomever originally intended to create such a thing.  If you look at how President Obama and the upper command reacted to this incident, it is startling.  This didn’t happen over the course of weeks or days.  It happened virtually overnight and a top general has been removed from power.

     The second concept to look at is the idea of human-flesh search engines.  This is a concept out of China that has equally startling results. If a person is made a target by whomever on a forum, and whatever act this target did was sufficient to bring on interest and vengeance, well then you have all the elements of a human-flesh search.  People want to ‘know’ why this target did what they did, they want to ‘know’ who they are, what they are doing, where they live, and most importantly, they want to make sure the target suffers for any wrong doing.

   It is that power of wanting to ‘know’ that fuels the crowd in sort of virtual lynch mob.  A prime example of this was the whole Jax Desmond affair here on the blog and forums.  When it came out that Jax was lying about who he was, this industry reacted to it much like how the Chinese human-flesh search engines turned out.  My readers were at first picking apart the guy’s lies, which was great, but then you could see on the forums that people wanted vengeance.  Folks were posting his address, real name, etc. and doing all they could to get back at Jax.  In their minds, he deserved everything he got, and each person out there was going to contribute to his demise. My point with this is that a crowd with the desire to ‘know’, coupled with the desire for vengeance against an individual they perceive as bad, can be quite impressive to watch and certainly damaging to the intended target. As a result, the Jax Desmond name is mud in this industry, and when the crowd decided they ‘knew’ enough to act, they quickly dispensed their justice.

      Now let’s put them together, and build a snowmobile.  Could you initiate a human-flesh search attack (HSA), that could create a desired result? I think you can, but only with a multi-faceted approach, and persistence. You must identify your target, identify the element that the crowd would like to ‘know’, and really exploit the virtual mob mentality if that target has done something that would be considered immoral. Your HSA strategy should strive to mimic other incidents that showed all the hallmarks what is mentioned in these two articles, and the examples I have provided. Most importantly, persistence is key, because you cannot say for sure if your HSA will work the first time out.  It would take a constant attack from multiple angles, to be successful. It helps to throw the match in the right places though, and that is the key.  The forest fire analogy fits well with conducting HSA.  If you can keep shooting flares into pockets of unburned fuel, from across the canyon, eventually you will get one of the pockets burning and they will start the fire that you wanted to start.

   The other thing about Human-flesh Search Warfare is defending against such a thing.  Yet again, I look at the forest fire fighting analogy for the defense.  You must create fire breaks to defend crucial aspects of your forest.  Or in terms of what we are talking about here, you must protect yourself or your principle by insuring you have the appropriate defenses in place.  Having journalists from Rolling Stone hanging out with you for a couple of weeks is probably not a good idea–no buffer there.  Making wild and false claims online about your company or your personal actions, would also not be a good idea–not much buffer there either.

     But most of all, you need good intelligence that focuses on you and the enemy.  ‘Know yourself, know your enemy’ as Sun Tzu would say.  Because if you know yourself, you will know what weaknesses, immoralities, etc. that the enemy might possibly use against you in this kind of attack.  Knowing your enemy will help you to figure out their intentions towards you or folks like you, and how they like to conduct HSA. You should also stay up to date with technology and ‘knowing’ yourself. Use the same tools and resources that your enemy uses, if you want to really know what he knows. You can also try to copy your enemy’s strategy and tactics, and add one little technological or operational piece to that package to get an edge.  If your information officer, or whomever is assigned to be your virtual body guard cannot do these basic things, then you should look at firing them. Because this is something any good practitioner of strategic communications or new media should be wary of and try to understand, so they know how to best build that fire break or place the match in the right patch of fuel in the forest.

   Well, let me know what you think.  If I am missing something here, or you have something to add to this stew of ideas, I would be interested to hear what you got.(be sure to read both stories below because they are relevant to this post) –Matt

New media too speedy to outflank

China’s Cyberposse

Edit: 6/25/2010- I wanted to add one more human-flesh search warfare case to this, for further thought.  Wikileaks is an excellent example of the power of human-flesh search, and what it could do to the war effort.  Some Army Intel kid leaked the videos anonymously to Wikileaks, and that was all that was necessary to spark the human-flesh search engine. Media was linking to the videos and site, and overnight, war leaders and politicians had to deal with this.  When that came out, it exploded as well.  But if you look at Wikileaks, what was the element about it, that would attract that Army Intel kid to contribute in the first place.  That is why this is such an intriguing idea to talk about.

——————————————————————-

New media too speedy to outflank

By John Timpane

Jun. 24, 2010

It began as a scattering of acid remarks within earshot of a Rolling Stone reporter. But – thanks in large part to Twitter, the Web, and cable news – barely two days after those remarks were disclosed, a media firestorm ended Gen. Stanley A. McChrystal’s tenure as commander of U.S. and NATO Coalition Forces in Afghanistan.

Fast, overwhelming, decisive: It’s a case study in how tightly connected 21st-century media can whip a story into a full-on tsunami, with startling consequences for individual careers and national policy.

“Rolling Stone broke the story, but it was Twitter that got the story rolling,” says Aram Sinnreich, a media professor at Rutgers University in New Brunswick, N.J. “The peer-produced social media are doing to cable-news networks what cable news did to broadcast. We’ve gone from the one-day news cycle to every hour on the hour to second by second.”

Noah Shachtman, a nonresident fellow at the Brookings Institution and a blogger at Wired magazine, says: “The fact so many of us are networked together enabled the information to spread speed-of-light fast. That turned what might have been a slower-burning flame into an instant conflagration.”

(more…)

Saturday, May 22, 2010

Building Snowmobiles: Cyber Privateers

     Ahhhh, time to fire up the old Building Snowmobiles category again, and thanks to James from Death Valley Magazine for giving me the heads up on this story below. Wired’s Danger Room wrote up an interesting article on the latest contract that Booz Allen Hamilton won with the Air Force in regards to cyber-security. This is interesting to me, because it is a government contracting a PMC to provide security in a commons called cyber space.  It reminds me of our original privateers in the US who were contracted by Congress via the Letter of Marque, to go after the British in that other ‘commons’ called the open sea. And with this latest contract, I would have to say that Booz Allen Hamilton gets the award for top cyber privateer. lol (that is not to say that Booz Hamilton will be getting bounties or seizing assets any time soon, but private industry is certainly answering the call for this one and making some serious money)

     I have lately been toying with the idea of how the Letter of Marque (LoM) could be applied to today’s current cyber security threats and to cyber warfare.  The scope of threats are so large and so complex, that there must be a strategy implemented that can keep up with these threats.  It is my belief that you should approach the problem with multiple solutions that all contribute to the overall strategy, and to create those solutions you need some analysis and you need synthesis.  And cyber privateers is some serious synthesis in my opinion, and I don’t think anyone has really delved into this before.  Issuing a LoM to individuals or companies might be one way to tap into the creativity and freedom of private industry, and still keep a leash on them based on the legal requirements of the letter.  It would be a way for congress to keep control over these kinds of contractors, yet still allow them to do their thing out there.  That kind of free market warfare coupled with very specific control mechanisms is crucial to this concept.

     The LoM can also allow the government to contract with one person or an entire company.  Companies like Booz Hamilton might not be able to attract the star players of cyber warfare.  So if the government wants to get these lone wolves on their side(both foreign and domestic), the LoM and an extremely lucrative bounty or prize law system would be one way to do that. The LoM could also give that lone wolf cyber warrior a license that is signed off and approved by the nations top law makers.  That to me has more appeal than being a subcontractor for some military branch of service, and hanging in limbo as to what laws and policies I need to follow or pay attention too.  Please note all the legal issues surrounding today’s usage of private military companies in the war.  The LoM could be the answer to mitigate those issues for today’s union between private industry and the government.

     Also, the way the LoM works is pretty flexible in my view.  It can be as complex or as simple as we want to make it.  After all, congress would be the ones forming the committee to issue the things, and they would be writing the thing up.  I am sure no one would want the LoM if it did not fully answer all and any legal issues, hence ‘my lawyer will talk with your lawyer’.  That is the way I would envision this.  Because if not, no one would want to do business with Congress and the US government if it did not have all the right protections in that document.

     As to what kind of activities the cyber privateers could do?  Hmmmm. Let your imagination run wild I guess.  Basically, if China wants to use hackers to go after the US for example, those Chinese hackers would be prime targets for cyber privateers.  Hell, cyber privateers could be tasked with going after entire countries that we consider threats. You could also use cyber privateers to go after organized crime, terrorists, etc., and set up bounties for all types of activities that a congress would want their cyber privateers to do. You might want to use cyber privateers for a very specific corner of the cyber warfare market, and the imagination is the only limit. Like Thomas Jefferson once said “Every possible encouragement should be given to privateering in time of war.” Using cyber privateers to conduct cyber warfare or defend the country, is one tool that the government could implement. For further study on the subject of LoM, I would suggest the reader check out this post and publication here, and use the search feature on this blog. –Matt

——————————————————————-

Booz Allen hiring 5,000 employees this year

Friday, May 14, 2010

Washington Business Journal – by Bryant Ruiz Switzky and Gayle S. Putrich

Consulting giant Booz Allen Hamilton Inc. is going on a major hiring binge.

The McLean-based government contractor is hiring 1,500 people over the next two months and expects to hire about 5,000 workers in 2010, some of which are rehires.

More than 60 percent of those jobs will be in the Washington area, said Leslie Esposito, director of recruiting.

Most of the positions are for consultants and include cost estimators, intelligence analysts, operations research analysts, program managers, acquisitions analysts, clinical health consultants, energy consultants, environmental consultants and human capital management and organizational efficiency experts. There is also a wide range of technology-related positions.

Story here.

——————————————————————-

Recent Air Force Contracts with Booz Allen & Hamilton

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $24,302,677 contract which will provide combat-ready forces to conduct secure cyber operations in and through the electromagnetic spectrum, with air and space operations.  At this time, $496,032 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Deliver Order 0414).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $24,283,152 contract which will provide innovative recommendations on information assurance disciplines for Systems Center Atlantic to develop information assurance capabilities for the Federal Compliance Program.  At this time, $122,060 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0407).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $23,302,445 contract which will provide instrumented live, virtual and constructive joint exercise enabled via the Joint National Training Capability’s global grid to enhance information assurance/cyber activities under U.S. Space Command’s span of control.  At this time, $2,672,756 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0417).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $19,835,902 contract which will provide information integrity and integration of information assurance capabilities into existing operational command and control networks and systems.  At this time, $5,000 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0415).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $19,831,145 contract which will define information assurance scientific and technical analysis to be applied to future military satellite communication systems development and assess vulnerabilities of emerging satellite communication systems to provide secure end-to-end communications services to deployed warfighters.  At this time, $1,607,798 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0411).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $15,870.840 contract which will provide secure and highly reliable network operations and computer network defense components in order to carry out Air Combat Command’s mission.  At this time, $45,120 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Deliver Order 0408).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $14,877,735 contract which will provide information assurance and information systems security improvements to U.S. military ground communication systems and onboard U.S. military airborne systems and platforms.  At this time, $2,692,270 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0413).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded a $14,880,375 contract which will provide state of the art information assurance capabilities in order to increase interoperability and availability of secure information to improve decision making.  At this time, $347,793 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0409).

                Booz Allen & Hamilton, Inc., Herndon, Va., was awarded an $8,925,518 contract which will develop innovative cyber security capabilities and network defense for Air Force information systems.  At this time, $164,682 has been obligated.  55 CONS/LGCD, Offutt Air Force Base, Neb., is the contracting activity (SP0700-98-D-4002, Delivery Order 0410).

——————————————————————

Defense Firms Pursue Cyber-Security Work

MARCH 18, 2009

By AUGUST COLE and SIOBHAN GORMAN

WASHINGTON — The biggest U.S. military contractors are counting on winning billions of dollars in work to protect the federal government against electronic attacks.

U.S. agencies from the Pentagon to the Department of Homeland Security have experienced major cyber-break-ins in recent years, even into classified systems. Cyberspies also have siphoned off critical data from Pentagon contractors, including one breach that cost a major aerospace contractor $15 million.

Intelligence officials estimate annual U.S. losses from cyber breaches to be in the billions of dollars, and some worry that cyber attackers could take control of a nuclear power plant or subway line via the Internet — or wipe out the data of a major financial institution.

(more…)

« Newer PostsOlder Posts »

Powered by WordPress