BlueHalo Acquires Base2 and Fortego
Arlington Capital Partners portfolio company BlueHalo today announced that it has completed the acquisition of Maryland businesses Base2 LLC and Fortego LLC.
While both companies are leading providers of complex, mission-critical cyber and Signals Intelligence (SIGINT) solutions, Base2 specializes in the design and development of cyber-solutions in the areas of Computer Network Operations (CNO), SIGINT, and Quick Reaction Capability (QRC). We reached a point where it was time to consider being part of a larger organization that could help our company grow long term, said Base2 co-founders Edward Wright and Michael Curry. BlueHalo resonated with us because they focus on solving the hardest engineering problems while contributing to national defense imperatives.
was not aware of one of existed before the election day. do you buy that? he said i didn t know the name of the russian ambassador. this excuse of i m not familiar with washington ways, i don t think it will be bought by special counsel mueller. moreover there are other people in these meeting he including manafort and including michael flynn. flynn indicated he wants to make a deal. so if mueller is able to flip him, we will have another side of what s going down in these meetings. finally phillip, i have to note that anthony scaramucci s account of why it may not be the russians, they are so good at hacking. they are so good they would cover their tracks and we wouldn t know it was him. a remark that putin told trump. and moscow s cyber operators soar good at covert and computer network operations if they had dipped into the dnc systems they
note that anthony scaramucci s account of why it may not be the russians, they are so good at hacking. they are so good they would cover their tracks and we wouldn t know it was him. a remark that putin told trump. and moscow s cyber operators soar good at covert and computer network operations if they had dipped into the dnc systems they would not have been caught. they are now laundering essentially the putin line about the culpability here. i guess that s what happened. anthony made clear in that interview that his source who had been anonymous at the start of the interview was president of the united states and that s not unusual in dealing with these white house officials. they hear a lot of theories and explanations from the president and pass those along. sfaz. a lot of theories going on. thank four joining me. next, why the details of the senate health care bill are once again a complete mystery even to senators scheduled to vote on it in less than 24 hours from now.
network operations, they ve had massive distributed denial service attacks against american banks. now, that s more than an irritant, but it s well short of what you re describing, wolf. one final question on this washington post story that moved on their website, which has not been shut down today, a story once again information from edward snowden, detailing the $52.6 billion, let s call it, black budget, of the u.s. intelligence community. this was always kept secret, how this money was spent. it s now been out there. what, if any damage, do you believe was caused by this report? we ll have to see. i read the story that was posted, all right? and that talks in general figures, what the cia budget was, what the nsa budget was, and so on. that causes some harm, but not a great deal of harm. you go to the website and start clicking on things and get down to specific operational activities. that could be very, very disruptive. general hayden, thanks very much for coming in. w
u.s. command described it. the idea is we used cyber warfare coming from the west to make that fail. that s one area floated out there by folks like yourself. how would that work? there s operations on the military side called information operations. this is to degrade all of the pieces. which saw this with the supposed stuxnet and if it was u.s. and irani and if it was focused on the program there we saw that in action back in 2010. right, so what this does is there are groups out there within the information operation divisions of the military called c & o, computer network operations and they focus on building you know programs or malicious software pieces doing precision operations or precision information ops. they ll do recon and find out what s going on and if they find out or get into the country and a foreign asset that we want to degrade the nuclear program or whatever, they ll come in and basically add a payload or add a