[Infowarrior] - Cyberwarfare May Be A Bust For Many Defense Contractors
Richard Forno
rforno at infowarrior.org
Wed May 11 06:36:33 CDT 2011
Cyberwarfare May Be A Bust For Many Defense Contractors
May. 9 2011 - 2:20 pm | 2,411 views
Posted by Loren Thompson
http://blogs.forbes.com/beltway/2011/05/09/washingtons-cyberwarfare-boom-loses-its-allure/
As federal spending on national security has leveled off in recent years, big defense contractors have worked hard to secure a role in one of the few market segments expected to keep growing: cyberwarfare. It’s a relatively new field where the terminology hasn’t stabilized yet, but for the purposes of this posting, cyberwarfare means three things: attacking enemy networks, exploiting enemy information flows, and defending friendly networks. Most of the money Washington is currently spending on cyberwarfare goes to the latter activity — securing friendly networks — but offensive activities seem to be growing faster over time. They’re really just different sides of the same coin, since it’s hard to be good at defending computer networks if you don’t have a thorough understanding of how to attack them.
The cyber goldrush was sparked in 2008 when President Bush signed two directives establishing a Comprehensive National Cybersecurity Initiative in response to the growing number of digital assaults on federal networks. The initiative was a signal to industry that a new demand driver had appeared in the marketplace just as everyone was getting ready for a prolonged downturn in military purchases. Seeing few other domestic opportunities on which to place bets with the cash they had accumulated during flush years, military contractors poured into the cyberwarfare field, building operations centers, purchasing niche players, and competing aggressively for contracts. The thinking was that cyber threats would keep proliferating for the foreseeable future, and defense companies were more likely to have the necessary clearances and market knowledge to compete in cyberwarfare than outsiders like Google or Microsoft.
No doubt about it, the cyberwarfare market has grown fast, helped along by an Obama Administration commitment to expand and refine the digital security efforts of its predecessors. Within months after taking office, President Obama established an executive-branch cybersecurity coordinator and a new Cyber Command colocated with the super-secret National Security Agency at Fort Meade, MD. NSA does most of the government’s eavesdropping, so putting the command nearby and making its head the same general who runs the spy agency was a no brainer: NSA already had the ability to monitor internet traffic for hackers and other malefactors. Setting up the new command, staffing components from each military service, and implementing more stringent network security procedures at each federal agency will generate about $9 billion in federal outlays this year. Additional billions will be spent on classified programs to probe and monitor foreign networks, such as those in China.
But even as the government’s cyberwarfare effort expands, some industry executives are beginning to wonder just how lucrative this new opportunity is likely to be. They already know it can’t fill the revenue hole created by cancellation of dozens of weapons programs in recent years, and now they’re starting to suspect the cyber field is so hyper-competitive and volatile they can’t even count on it for significant earnings anytime soon. Once you get past all the fashionable rhetoric about information-age warfare and anarchy on the web, it’s easy to see why they might be having second thoughts. Let’s consider the many ways in which the cyberwarfare market should raise red flags for investors.
The first thing to understand about the cyberwarfare market is that, at least by federal standards, it just isn’t very big. The $9 billion being spent this year on so-called information assurance and security activities is barely one day of federal spending at present rates, and it is fragmented among numerous agencies. It’s true that the lion’s share of funding goes to the Department of Defense, which oversees additional billions spent on network attack and exploitation, but in an organization that annually passes out $400 billion in contracts, it still doesn’t amount to much. Market research firm Input projects federal cybersecurity funding will increase 9% annually through 2015, but the government is entering a period of severe fiscal austerity and there are many other claimants for government dollars. With every major contractor in the business straining to get a piece of this relatively small pie, the prospects for making a killing are not high.
A second problem with the cyberwarfare business is that threats are diverse and continuously evolving, which means it is hard for contractors to establish durable franchises. When companies compete to build military hardware, they expect that once a contract is won they will be the sole supplier of a weapon system for a decade or longer. But in cyberwarfare the government’s needs keep changing because new threats emerge on a weekly basis. For instance, the deluge of WikiLeaks that has embarrassed policymakers in recent months has shifted attention from keeping hackers out of networks to keeping information in, which turns out to be a rather different challenge. The dynamism of cyber threats combined with the slow pace of federal acquisition procedures is a prescription for continuous frustration among contractors.
A third issue facing companies pursuing cyberwarfare opportunities is the relatively low barriers to entry in the current market. That’s probably less true in the offensive segment of the market, where activities are so secret that companies must have special qualifications to bid, but on the defensive side of the ledger there are dozens of contractors and new niche players are constantly emerging. The cyberwarfare space is still wide open to any company that comes up with a point solution to an urgent problem, which means yesterday’s winners can turn into today’s losers. That’s good for aggressive, agile companies like Raytheon that are willing to take risks and buy up niche players as they prove themselves, but some of the bigger companies in the defense business aren’t accustomed to having so many competitors jostling for attention.
A fourth and related problem in the cyberwarfare space is the shortage of available talent, particularly in network attack and exploitation skills. The cyberwarfare market grew so fast that it outstripped available labor pools, so companies now find themselves bidding against each other and the federal customer for scarce skills. It’s not that finding cyber specialists is hard, but securing the necessary clearances (foreigners need not apply) and keeping them trained so they can respond to the latest requirements is a constant challenge. This probably works to the advantage of Lockheed Martin, which is the biggest player in the federal information services market, because it has the mass and resources to keep up with changing needs, but for smaller players it’s a big problem. Lockheed has recently won several major cyberwarfare awards at the expense of competitors, and seems to be a preferred destination for many specialists in the field.
A fifth difficulty in the government cyberwarfare market is the variability of management quality from agency to agency on network-related matters. Industry insiders generally agree that the National Security Agency has the greatest depth and breadth of expertise, because it has been working cyber issues far longer than other agencies. Executive expertise at the Department of Defense is more uneven, and at the Department of Homeland Security it is frequently deficient. These problems are most apparent at the program manager level, where middle-level executives may lack the experience to select among competing solutions to a problem. The job classification process and compensation levels prevailing in the federal civil service are not well suited for putting the best people into positions overseeing cyberwarfare work.
A final, chronic defect in the cyberwarfare market is the loose coordination of federal efforts to secure networks, not just between agencies but even within them. For example, at the same time that the Navy has stood up a cyber command to protect its warfighting nets, it has begun implementing a new information architecture called the Next Generation Enterprise Network likely to be more vulnerable to hackers and spies. The new network replaces a single system integrator with multiple teams of contractors who must compete annually for work, creating the kinds of seams and discontinuities intruders might seek to exploit. The fact a military service that invented the concept of network-centric warfare could pursue such an architecture at this late date suggests that in some parts of the federal government, nobody is really in charge of cyber policy or has the authority to mandate security standards.
So far, these various drawbacks have not discouraged big contractors from continuing to pursue cyberwarfare opportunities. The most aggressive players at present seem to be Raytheon, Science Applications International, General Dynamics and Lockheed Martin, but other players like BAE Systems and Boeing are rapidly bulking up. In other segments of the national-security marketplace, two or three of these companies would eventually emerge as the dominant players, and the rest would move on. But cyberwarfare isn’t like other market segments — it is still in flux, and may remain that way for a long time to come. That means even if government spending on cyberwarfare keeps growing, some players straining to get into the business are not going to be happy with how this new opportunity works out.
More information about the Infowarrior
mailing list