$460M CYBERCOM Contract Will Create Digital Munitions

Display with system code.

Meanwhile, the military’s digital command hopes to recruit 6,200 operatives to thwart hacks against the US, aid troops overseas, and protect dot-mil.

The first job under a forthcoming $460 million U.S. Cyber Command contract to outsource all mission support involves, among other activities, a lot of digital munitions-making.

An 84-page draft task order released Sept. 30 runs the gamut of hacking and counterhacking work, plus traditional IT support activities.

The proposed solicitation was accompanied by a 114-page draft of the full 5-year contract. In May, CYBERCOM officials cancelled a similar $475 million project announced earlier that month. At the time, officials explained a reorganized request for bids with more details would be out in the fall. 

The initial work order will support “cyber joint munitions effectiveness” — by developing and deploying — “cyber weapons” and coordinating with “tool developers” in the spy community, the documents state. In addition, the prospective vendor will plan and execute joint “cyber fires.” 

CYBERCOM is in the midst of recruiting 6,200 cyberwarriors for teams positioned around the world. The command’s duty is to thwart foreign hackers targeting the United States, aid U.S. combat troops overseas and protect the dot-mil network.  

In the past, some military academics have voiced concerns about the unintended outcomes of such maneuvers. Malicious code released into networks could backfire and harm U.S. individuals or allies, they warned.

Due to the ‘system of systems’ nature” of cyberspace, it is very difficult to know exactly what effect” defensive or offensive actions will have on U.S. and ally assets “since we can’t be sure exactly how far out the cyber action might spread,” Dee Andrews and Kamal Jabbour wrote in a 2011 article for Air Force Space Command’s Journal for Space & Missile Professionals. “The difficulty in doing a damage estimate before cyber action is taken makes cyber friendly fire difficult to identify and mitigate.” 

There are dozens of bullet points on training support work in the contracting documents.

For example, the hired contractor will run exercises on “USCYBERCOM Fires processes” with the Joint Advanced Cyber Warfare Course, the Army Cyberspace Operations Course, the Air Force Weapons School, the Joint Targeting School and other outside groups, the documents state. 

Certain contract personnel supporting these so-called cyber fires will be subjected to additional background reviews and will have to comply with “need-to-know” classification rules, according to officials. 

Beyond unleashing malware, the chosen contract employees will help repel attacks on Defense Department smartphones housing sensitive data, according to the government. This assignment involves analyzing forensics reports on hacked mobile devices and conducting security assessments of mobile apps, among other things. 

There also is some cyber espionage work entailed. The selected contractor will aid the “fusion,” or correlation of clues, from “reliable sources,” network sensors, network scans, open source information, and “situational awareness of known adversary activities,” the documents state 

The professionals hired will probe lurking, well-resourced threats inside military networks and identify ”signatures” of the hacker footprints discovered, they add. The signatures, such as IP addresses and strings of code, will be used to determine if there is malicious activity elsewhere inside Pentagon and defense industry networks, according to officials. 

Another CYBERCOM duty will be proposing procedures for facilitating “all-source intelligence analysis of the foreign threat picture” — information collected from spies, data surveillance, public information and other inputs. 

A final comprehensive solicitation and task order are scheduled to be released later this month. The government is accepting questions about the drafts from companies until Oct. 7.

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.