Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Hacking Warriors ‘Enlist’ in Pentagon Cyberwar

June 1, 2009

There’s a dogfight among the biggest U.S.-based military contractors as they battle over young hacker talent to win the billions of dollars starting to spill out of the Pentagon following the recent announcement that the U.S. military has established a unique command for cyberwarfare.

Such giants as Northrop Grumman, General Dynamics, Lockheed Martin and Raytheon are hiring Red Bull-fueled geeks to work on cybersecurity contracts and R&D just as these contractors are gaining ground with big price tag physical security projects for the military and governments. The Pentagon already has several thousand people assigned to cybersecurity protection, countermeasures and proactive warfare strategies.

Winn Schwartau, founder, SCIPP International and InfowarCon and one of Security Magazine’s 25 Most Influential People, has been urging action for three decades, especially from the military. “In 1996, I was speaking about the security integration of the private sector and government. At one point, I referenced some security details about North Korea, NSA-encryption agendas and French intrusions into Boeing. One general, a two-star, literally slid out of his chair, hollering at his two Colonel-grade aides, ‘How the hell did he know that?’”

A few years back, Schwartau called for the creation of a national cyber-corps, “focused on using the innate untapped talents of kids from middle through high school. Mom and pop and family are mission critical to the security of enterprise and country.”

While no one expects Raytheon, for example, to farm school playgrounds, there is recruiting of top young computer, communications, gaming and programming talent.

No doubt, the Pentagon is taking on a more aggressive role. But it hasn’t been totally sitting on the sidelines. In the past there have been numerous projects, both successes and failures. There was the HERF (high energy radio frequency) raygun to “melt” the insides of computers and other electronic devices. Ironically that project led to a do-it-yourself HERF gun subculture. Then there was the Pentagon’s robotics work as it tried to develop ant-sized robots that could crawl inside computer gear to disable the inner workings.

The Internet, and dependence on it, is today’s change agent, coupled with growing evidence that terrorists and governments are using the Internet to hack into military, infrastructure and private sector networks.

Corporations such as Cisco Systems have done pioneering work related to Internet security. Cisco, which for years viewed the Internet as essential as the electricity grid, for instance, has its Cisco Security Center, dedicated to early-warning intelligence, threat and vulnerability analysis to help protect networks.

Check this New York Times article related to the above Zalud’s Blog reporting:

http://www.nytimes.com/2009/05/31/us/31cyber.html?_r=1&scp=3&sq=Pentagon%20cybersecurity&st=cse

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Russia and Cyberattacks

    US indicts Sandworm, Russia's most destructive cyberwar unit

    See More
  • Counterfeit Products are in Pentagon Supply Chain

    See More
  • -data-cyber-supply-freepik

    Pentagon to launch zero trust cyber office in December

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing