Jump to content

User:MamoranNCSU/sandbox

From Wikipedia, the free encyclopedia

Government

[edit]

Tiger teams have seen extensive use in governmental organizations. They are often used for assessment of compliance with and efficacy of existing policies as well as creating proposals or recommendations for future policies. In the United States, governmental tiger team recommendations have directly influenced laws and policies in the national government[1].

Most of the United States federal executive departments have used tiger teams to some extent. One of the largest governmental initiatives involving tiger teams was implemented by the Department of Energy (DOE) under then Secretary James D. Watkins. From 1989 through 1992, the DOE formed tiger teams to assess 35 DOE facilities for compliance with environment, safety, and health requirements. Beginning in October of 1991, smaller tiger teams were formed to perform follow up assessments to focus on the most pressing issues in a more detailed manner[2]. Tiger teams are still being used by the DOE, though not to the same extent.

Military

[edit]

The use of tiger teams in the military may have roots in physical security and counter-espionage. Teams were formed to test military base security through attempts to access restricted areas without detection, steal classified materials, and leave analogues for incendiary or explosive devices[3][4]. This is likely the origin of the use of the term in computer security circles where hackers attempt to follow similar measures with computer systems[4]. The military also forms more traditional tiger teams much like other government agencies.

  1. ^ "PRESS RELEASE: US Congress and Administration Want PNT Resilience – eLoran Highlighted «  Resilient Navigation and Timing Foundation". rntfnd.org. Retrieved 2017-02-11.
  2. ^ Ziemer, P. L. (1992-01-01). "The Department of Energy Tiger Teams; analysis of findings and plans for the future". {{cite journal}}: Cite journal requires |journal= (help)
  3. ^ "the definition of tiger team". Dictionary.com. Retrieved 2017-02-11.
  4. ^ a b Boston, Vin Mclellan; Vin Mclellan Writes About Computers From (1989-01-15). "HACKER FOR HIRE: Peter Goldis; Looking for the Loopholes". The New York Times. ISSN 0362-4331. Retrieved 2017-02-11.{{cite news}}: CS1 maint: multiple names: authors list (link)