Enterprise IT Watch Blog

Dec 14 2010   12:26PM GMT

WikiLeaks results in unexpected winner: TeleCommunication Systems Inc.



Posted by: MelanieYarbrough
Tags:
Federal Government
Network security
Wikileaks

In the aftermath of the latest installment of the WikiLeaks saga, at least one company is coming out clean and happy: TeleCommunication Systems Inc., a provider of military-grade technology, was awarded a $49M contract with the Department of Defense. The Mission: Provide technology training to the government’s cyber security workforce. (Can anyone cough and simultaneously say, “After the fact”?)

The partnership with the DoD comes directly from the higher-ups, with support from Obama’s government workforce development effort and Cyber Security Coordinator Howard Schmidt backing the deal. Part of the five-year contract, which includes five option periods, is TCS’s Art of Exploitation University program, launched in May. The Annapolis-based company’s AoE University has already enrolled 1,500 students since its launch, teaching the gamut from computer network security, information assurance, network defense, penetration testing, forensics analysis to cyber intelligence. Hopefully the hands-on learning and real-life simulations will include the proper response to burning Lady Gaga CDs?


TCS’s shares rose $0.07 following the deal on Friday, and the company has since purchased Trident Space & Defense LLC, a private producer of wireless communication systems. The purchase, the company’s fourth of 2010, is expected to expand TCS’s reach to foreign government and commercial companies, where Trident has business. The DoD contract is one on a list of contracts TCS has landed with the U.S. Navy – worth $315M, the Army – worth up to $9.6M, and the Marines – worth $269M.

But is the Department of Defense’s money well-spent? Frank Ohlhorst makes a great point about the hardest leak to plug in IT:

Most, if not all, of these requirements rely on technology to enforce compliance. WikiLeaks teaches us that it is the human factor and not technology that leads to the most damaging of breaches. All it takes is one disgruntled employee to destroy the security around intellectual property, private data or corporate secrets. But how can one build technology to prevent that?

There is no simple answer. Perhaps the only way to handle these situations is with the threat of severe penalties, and therein lays the secret to compliance technology. The enforcement of severe penalties requires incontrovertible evidence. In this particular case, technology that monitors activity and audit usage can become the key to plugging leaks.

If users are properly educated on the implications and penalties involved in disseminating unauthorized information, and are informed that access is tracked in numerous ways, perhaps technology can prevent the issues now plaguing the U.S. Defense and State Departments.

Though the government can’t be criticized for trying, it can be criticized for falling into the oldest pattern in information technology: Learning which vulnerabilities to secure after they’ve been compromised.

Do you think TCS’s reputation is enough to help secure what’s already proven pretty faulty? Let me know in the comments or send me an email at Melanie@ITKnowledgeExchange.com.

Melanie Yarbrough is the assistant community editor at ITKnowledgeExchange.com. Follow her on Twitter or send her an email at Melanie@ITKnowledgeExchange.com.

1  Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • MelanieYarbrough
    [...] so many of us went so wrong in 2010? The U.S. government has started by sending its employees to cyber security university, and Gawker has enabled SSL for Google Apps users and looking to implement OAuth verification, as [...]
    0 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: