Tiger team

From Wikipedia, the free encyclopedia
Jump to: navigation, search
For the Court TV/TruTV television series based on a tiger team, see Tiger Team (TV series).

A tiger team is a diversified group of experts brought together for a single project, need, or event.[1] They are usually assigned to investigate, solve, build, or recommend possible solutions to unique situations or problems. They are almost always populated with mature experts who know what's at stake, what needs to be done, and how to work well with others. Their strengths are diversity of knowledge, a single focus or purpose, cross-functional communications, decision-making sovereignty, and organizational agility.[2] Once their venture is completed they cease to be a team and usually go back to their previous assignments.[2]

The metaphor of a tiger comes from the power and agility of the teams. There are no limits to their size, reasons, or purpose parameters. They may be assigned to locate new knowledge sources, create an impactful event, or form an exit plan. The scope of their work may be very large or very small. They may be a team for a few days, or for many years. They may meet regularly, frequently, intermittently, or rarely.

History[edit]

The concept originally came out of early NASA innovations for solving technical or systemic problems. Tiger teams began as specialized units to test computer security for the military and the aerospace industry. These teams were specifically hired to determine how easily an organization's security measures and data could be accessed or hacked. When successful, members of the tiger team would usually leave behind notes with messages such as "busted" or "your code book has been stolen" to indicate that the system had been penetrated.[3]

Tiger teams were traditionally made up of expert hackers who had experience in attacking remote networks and secure communication channels. The members were regarded for their willingness to break the rules and their ability to think outside of the box and work beyond an organization's boundaries in order to ensure security and protection.[3] These teams were originally focused on espionage and spying, but have transformed and expanded over time to solve a wider variety of problems for businesses and organizations today.

Program Management in Design and Development[edit]

A 1964 paper entitled "Program Management in Design and Development" introduced tiger teams and defined the term as "a team of undomesticated and uninhibited technical specialists, selected for their experience, energy, and imagination, and assigned to track down relentlessly every possible source of failure in a spacecraft subsystem".[4] The paper consists of anecdotes and answers to questions from a panel on improving issues in program management concerning testing and quality assurance in aerospace vehicle development and production.[5] One of the authors was Walter C. Williams, an engineer at the Manned Spacecraft Center and part of the Edwards Air Force Base National Advisory Committee for Aeronautics. Williams suggests that tiger teams are an effective and useful method for advancing the reliability of systems and subsystems in the context of actual flight environments.

Apollo 13[edit]

A tiger team was crucial to the Apollo 13 lunar landing mission in 1970. During the mission, part of the Apollo 13 Service Module unexpectedly malfunctioned and exploded.[6] A team of specialists was immediately formed to fix the issue and bring the astronauts back to earth safely. The team was led by NASA Flight and Mission Operations Director Gene Kranz.[7] Kranz and the members of his "White Team", later designated the "Tiger Team", received the Presidential Medal of Freedom for their efforts in the Apollo 13 mission.

Security[edit]

In security work, a tiger team is a specialized group that tests an organization's ability to protect its assets by attempting to circumvent, defeat, or otherwise thwart that organization's physical or information security. In this context, the tiger team is often created internally to work in perpetuity since security is typically an ongoing effort in an organization.[8] For example, one implementation of an information security tiger team approach divides the team into two co-operating groups: one for vulnerability research, which primarily finds and researches the technical aspects of a vulnerability, and one for vulnerability management, which primarily manages communication and feedback between the team and the organization, as well as ensuring each discovered vulnerability is tracked throughout its life-cycle and ultimately resolved.[8] Tiger teams can also be brought in externally typically for a single test of either the physical site security of information security intrusion. [9]

Government[edit]

Tiger teams have seen extensive use in governmental organizations. They are often used for assessment of compliance with and efficacy of existing policies as well as creating proposals or recommendations for future policies. In the United States, governmental tiger team recommendations have directly influenced laws and policies in the national government.[10]

Most of the United States federal executive departments have used tiger teams to some extent. One of the largest governmental initiatives involving tiger teams was implemented by the Department of Energy (DOE) under then Secretary James D. Watkins. From 1989 through 1992 the DOE formed tiger teams to assess 35 DOE facilities for compliance with environment, safety, and health requirements. Beginning in October 1991 smaller tiger teams were formed to perform follow up assessments to focus on the most pressing issues in a more detailed manner.[11] Tiger teams are still being used by the DOE, though not to the same extent.

Military[edit]

The use of tiger teams in the military may have roots in physical security and counter-espionage. Teams were formed to test military base security through attempts to access restricted areas without detection, steal classified materials, and leave analogues for incendiary or explosive devices.[12][9] This is likely the origin of the use of the term in computer security circles where hackers attempt to follow similar measures with computer systems.[9] The military also forms more traditional tiger teams much like other government agencies.

Examples[edit]

Popular culture and media[edit]

The popular comic strip Dilbert released a published strip on May 11, 2010 making fun of the name and concept of specialized tiger teams in the workplace.[16]

In 2007 the Tiger Team (TV series) featured a tiger team that was hired to test for electronic, psychological, tactical, and physical threats and vulnerabilities for organizations.

The 1995 Apollo 13 (film) movie featured a scene where a tiger team was quickly formed by employees at NASA to solve a crisis with the spacecraft.[17]

See also[edit]

References[edit]

  1. ^ Miller, Marilyn; Armon, Rick (June 6, 2016). "University of Akron announces new "Tiger Team" to address enrollment slide, finances, leadership issues". Akron Beacon Journal. Akron Beacon Journal/Ohio.com. Retrieved 18 October 2016. 
  2. ^ a b Wheelwright, Kim B. Clark Steven C. "Organizing and Leading "Heavyweight" Development Teams." California Management Review (1992). p 13-14
  3. ^ a b http://www.newdirectionsconsulting.com/leadership-engagement/tiger-teams-the-new-frontier-of-teaming-2/
  4. ^ J. R. Dempsey, W. A. Davis, A. S. Crossfield, and Walter C. Williams, "Program Management in Design and Development," in Third Annual Aerospace Reliability and Maintainability Conference, Society of Automotive Engineers, 1964, p. 7–8
  5. ^ https://saemobilus.sae.org/content/640548
  6. ^ http://nssdc.gsfc.nasa.gov/planetary/lunar/ap13acc.html
  7. ^ https://www.nasa.gov/sites/default/files/files/Gene-Kranz-Bio.pdf
  8. ^ a b Laakso, Marko; Takanen, Ari; Röning, Juha (1999). "The vulnerability process: a tiger team approach to resolving vulnerability cases". Proc. 11th FIRST Conf. Computer Security Incident Handling and Response. Brisbane, Australia: CiteSeerX: 1–2, 6. Retrieved 28 September 2016. 
  9. ^ a b c Boston, Vin Mclellan; Vin Mclellan Writes About Computers From (1989-01-15). "HACKER FOR HIRE: Peter Goldis; Looking for the Loopholes". The New York Times. ISSN 0362-4331. Retrieved 2017-02-11. 
  10. ^ "PRESS RELEASE: US Congress and Administration Want PNT Resilience – eLoran Highlighted «  Resilient Navigation and Timing Foundation". rntfnd.org. Retrieved 2017-02-13. 
  11. ^ Ziemer, P. L. (1992-01-01). "The Department of Energy Tiger Teams; analysis of findings and plans for the future". 
  12. ^ "the definition of tiger team". Dictionary.com. Retrieved 2017-02-11. 
  13. ^ "Cyber Defense Exercise 2008 - NSA Video Transcripts - NSA/CSS". Nsa.gov. 2009-01-15. Retrieved 2012-01-08. 
  14. ^ "Benefits of a One NASA Organization in Solving Program and Project Technical Issues". Lessons Learned. NASA. 2004-05-07. Retrieved 6 November 2015. 
  15. ^ Hamilton, Jon. "How A Team Of Elite Doctors Changed The Military's Stance On Brain Trauma". NPR. All Things Considered, NPR. Retrieved 23 August 2016. 
  16. ^ http://dilbert.com/strip/2010-05-11
  17. ^ https://www.youtube.com/watch?v=C2YZnTL596Q

External links[edit]

This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later.