A tiger team is a team of specialists assembled to work on a specific goal,
or to solve a particular problem.
Origin of the term
A 1964 paper entitled ''Program Management in Design and Development'' used the term ''tiger teams'' and defined it as "a team of undomesticated and uninhibited technical specialists, selected for their experience, energy, and imagination, and assigned to track down relentlessly every possible source of failure in a spacecraft subsystem or simulation".
[J. R. Dempsey, W. A. Davis, A. S. Crossfield, and Walter C. Williams, "Program Management in Design and Development," in Third Annual Aerospace Reliability and Maintainability Conference, Society of Automotive Engineers, 1964]
p. 7–8
https://doi.org/10.4271/640548. Walter C. Williams gave this definition in response to the question "How best can advancements in reliability/maintainability state-of-the-art be attained and used with compressed schedules?" Williams was an engineer at the
Manned Spacecraft Center
The Lyndon B. Johnson Space Center (JSC) is NASA's center for human spaceflight in Houston, Texas (originally named the Manned Spacecraft Center), where human spaceflight training, research, and flight control are conducted. It was renamed in ...
and part of the
Edwards Air Force Base
Edwards Air Force Base (AFB) is a United States Air Force installation in California. Most of the base sits in Kern County, California, Kern County, but its eastern end is in San Bernardino County, California, San Bernardino County and a souther ...
National Advisory Committee for Aeronautics.
The paper consists of anecdotes and answers to questions from a panel on improving issues in program management concerning testing and quality assurance in aerospace vehicle development and production. The panel consisted of Williams, Col. J. R. Dempsey of
General Dynamics
General Dynamics Corporation (GD) is an American publicly traded aerospace and defense corporation headquartered in Reston, Virginia. As of 2020, it was the fifth largest defense contractor in the world by arms sales and fifth largest in the Unit ...
, Lt. Gen. W. A. Davis from the Ballistic Systems Div., Norton Air Force Base,
A. S. Crossfield from
North American Aviation
North American Aviation (NAA) was a major American aerospace manufacturer that designed and built several notable aircraft and spacecraft. Its products included the T-6 Texan trainer, the P-51 Mustang fighter, the B-25 Mitchell bomber, the F- ...
.
Examples
* A tiger team was crucial to the
Apollo 13
Apollo 13 (April 1117, 1970) was the seventh crewed mission in the Apollo program, Apollo space program and would have been the third Moon landing. The craft was launched from Kennedy Space Center on April 11, 1970, but the landing was abort ...
crewed lunar mission in 1970. During the mission, part of the Apollo 13 Service Module malfunctioned and exploded. A team of specialists led by NASA Flight and Mission Operations Director
Gene Kranz
Eugene Francis Kranz (born August 17, 1933) is an American aerospace engineer who served as NASA's second Chief Flight Director, directing missions of the Mercury, Gemini, and Apollo programs, including the first lunar landing mission, Apoll ...
was formed to address the resulting problems and bring the astronauts back to Earth safely. Kranz and the members of his "White Team", later designated the "Tiger Team", received the
Presidential Medal of Freedom
The Presidential Medal of Freedom is the highest civilian award of the United States, alongside the Congressional Gold Medal. It is an award bestowed by decision of the president of the United States to "any person recommended to the President ...
for their efforts in the Apollo 13 mission.
* In security work, a tiger team is a group that tests an organization's ability to protect its assets by attempting to defeat its physical or
information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
. In this context, the tiger team is often a permanent team as security is typically an ongoing priority.
For example, one implementation of an information security tiger team approach divides the team into two co-operating groups: one for vulnerability research, which finds and researches the technical aspects of a vulnerability, and one for vulnerability management, which manages communication and feedback between the team and the organization, as well as ensuring each discovered vulnerability is tracked throughout its life-cycle and ultimately resolved.
* An initiative involving tiger teams was implemented by the
United States Department of Energy
The United States Department of Energy (DOE) is an executive department of the U.S. federal government that oversees U.S. national energy policy and energy production, the research and development of nuclear power, the military's nuclear w ...
(DOE) under then-Secretary
James D. Watkins
James David Watkins (March 7, 1927 – July 26, 2012) was a United States Navy admiral and former Chief of Naval Operations who served as the United States Secretary of Energy during the George H. W. Bush administration, also chairing U.S. gover ...
. From 1989 through 1992 the DOE formed tiger teams to assess 35 DOE facilities for compliance with environment, safety, and health requirements. Beginning in October 1991 smaller tiger teams were formed to perform more detailed follow-up assessments to focus on the most pressing issues.
* The
NASA Engineering and Safety Center (NESC) puts together "tiger teams" of engineers and scientists from multiple NASA centers to assist solving complex problems when requested by a project or program.
*In March 2025,
National Security Advisor Mike Waltz
Michael George Glen Waltz (born January 31, 1974) is an American politician, businessman, author, and former United States Army Special Forces, Army Special Forces officer who is President Donald Trump's current nominee for United States ambassa ...
mentioned the term in the
leaked Signal chat regarding an anticipated strike against the Houthis.
See also
*
Penetration test
A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is perform ...
*
Red team
A red team is a group that simulates an adversary, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses. Red teams work fo ...
References
{{DEFAULTSORT:Tiger Team
Hacking (computer security)
Software testing
Emergency management
Aerospace engineering
Biological engineering
Problem solving