Air Force Casts a Wide Net For Cyber Warfare Tools


Service wants to make the bidding process more accessible to start-ups.

The Air Force is scanning the market for “cyber warfare systems” tools, in an acknowledgment of the need to open up the opaque and inaccessible space to new players, documents show.  

The acquisition unit for Air Force cyber operations known as the Network Warfare Systems Branch, posted a request for information from firms that could offer software and services to support cyber operations. “The objective of this effort is to overcome restricted competition barriers in subsequent acquisitions for cyber warfare systems supplies and services resulting from legacy security policies, practices, and guidance,” according to the document released Friday. The market research will influence whether the service should bid out contracts openly and set aside some to small businesses.

A more transparent bid process would engage more start-ups when the work of supporting the Defense Department’s classified surveillance and offensive security machinery has typically fallen to the largest defense contractors, even with cheaper products in an increasingly-crowded market.

The document, obliquely worded, did not specify what the Air Force was seeking, but said that “CWS [Cyber Warfare Systems] information includes, but is not limited to: source code, installation code, unit test scripts, unit test data, application programming interfaces, data schemas, training material, graphics, and technical manuals.” There was no mention of exploits or vulnerabilities. Only unclassified information will be accepted. The window for responses is narrow: the call for information closes May 30 at 4 p.m.

The Air Force estimates base spending of $9.89 million in fiscal 2014 for unclassified offensive cyber operational support -- including computer infrastructure and software to perform data analysis.

Service officials are open to reviewing classifications around certain cyber operations, a move that would allow firms to bid for the contracts more easily, the Air Force signaled. It plans on “reviewing the system information of existing cyber warfare systems, preparing that information to be transferred to the appropriate (lower) security levels,” the document said.

The move to loosen up the security classifications on these systems coincides with the willingness of the top brass to highlight the administration’s commitment to honing its adversarial computer capabilities, especially in the face of attacks from Chinese and other foreign entities.

When the Air Force began searching for providers to offer hardware and software maintenance on “network warfare operating systems” in 2010, it focused on contractors with clearances in San Antonio, where the 24th Air Force, an operational warfighting unit that protects Air Force networks, is housed at Lackland Air Force Base. General Dynamics, which was tapped for the work, was hindered by unspecified “operational constraints” from completing deployment before the original contract was slated to end and a follow-on order was drawn up, federal databases reveal. The Air Force also indicated that it plans to launch within five years a full and open source selection for subsequent contracts involving logistical support for those network warfare operating systems.

(Image via Orion-v/