recommended reading

Contractors to Handle Marines Corps' Cyber Arsenal

Lt. Gen. Richard P. Mills, commander of the Marine Corps Forces Cyberspace Command

Lt. Gen. Richard P. Mills, commander of the Marine Corps Forces Cyberspace Command // Defense Department

One-third of the 1,000 personnel slated to handle cyber weapons for Marine Corps troops overseas will be contractors, according to the chief of the service's cyber command. Providing outsiders with inside knowledge of the military's cyber operations raises questions about the risk of leaks, now that a Booz Allen Hamilton computer specialist supporting the U.S. intelligence community has admitted to exposing the classified surveillance of Americans.

In coordination with U.S. Cyber Command, the Army, Navy, Marine Corps and Air Force each have their own cyber organization assigned to arm troops with network exploits and network defenses. The Marine command is the most focused on providing prompt support to overseas expeditionary service members, Lt. Gen. Richard P. Mills, commander of the Marine Corps Forces Cyberspace Command, told the American Forces Press Service in a story published today. 

More than 300 of the Marine Corps' cyber forces expected to be on staff by 2016 will come from the private sector, with civilian federal employees and uniformed service members fleshing out the rest of the command, he said.  Currently, there are 300 service members, federal civilians and contractors, total, conducting Marine cyber operations.

"They all operate under the same clearance requirements, the same authorities, the same rules," Mills told AFPS. It is unclear whether Edward Snowden, the Booz Allen Hamilton employee who leaked classified information about National Security Agency operations, was restricted by the same authorizations and rules as U.S. intelligence employees while on the contractor's payroll. 

His alleged leak "represents a grave violation of the code of conduct and core values of our firm," according to a statement by the company posted online. Snowden disclosed, among other classified directives, a top secret court order instructing Verizon to supply the government with call records on millions of Americans, according to The Guardian.

A former NSA official told Nextgov Snowden would have been held to the same rules and restrictions as NSA employees. Yet NSA should not have granted Snowden, and even equivalent government staff, access to the assorted information. “What gave him the authority to do that?” the official questioned. “How was he able to gain access to these top secret documents that were leaked -- and particularly that court order?”

Intelligence agencies should have segregated the data files with system permissions. “They've got to do some internal homework about how to keep that data separate,” the former official said, adding that technical controls are not very difficult to configure. “How the heck did this guy in Hawaii gain access to all that [information]?”

On Monday, Booz spokesman James Fisher said company officials "have no additional information to provide beyond what is in our statement," which also said that Snowden had been an employee for less than three months and assigned to a team in Hawaii.

The reason for the Marines' heavy reliance on contractors: Private sector programmers know the latest techniques to confront constantly evolving threats that active-duty Marines haven't necessarily learned yet, Hill said.  

"You need people who are educated and current in their specialties and who are available to stay on the job for long periods of time, whereas Marines come and go in the normal assignment process," he said. "That's one of the things that make them so expensive. They come at a cost, but you have to bear it to make sure that your cyber capabilities are current and that you stay on the cutting edge."

Within Cyber Command, a mix of civilians, contractors and uniformed service members will operate from consoles located within each geographic military command, Maj. Gen. Jennifer Napper, Cyber Command director of plans and policy, told Nextgov in February. As far as private sector staff numbers, "each service is helping to decide for themselves because each service looks at it a little bit differently on all these teams that they are building out,” she said. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.