
Beyond belief, but here it is: the “official” explanation of why we are going to waste 12 billion dollars a year on contractors without a clue (vapor-ware). There is zero return on investment here for the taxpayer, only for the contractors and Congress, neither of which will be held accountable for fraud, waste, and abuse.
2010: OPINION–America’s Cyber Scam
2009 Defense Science Board Report on Creating an Assured Joint DoD and Interagency Interoperable Net-Centric Enterprise
2006 General Accountability Office (GAO) Defense Acquisitions DoD Management Approach and Processes Not Well-Suited to Support Development of Global Information Grid
Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101
Journal: Pentagon’s Joint Strike Fighter (JSF) as a Metaphor for a Predictable Defense Meltdown

Defending a New Domain
The Pentagon's Cyberstrategy
William J. Lynn III
WILLIAM J. LYNN III is U.S. Deputy Secretary of Defense.
In 2008, the U.S. Department of Defense suffered a significant compromise of its classified military computer networks. It began when an infected flash drive was inserted into a U.S. military laptop at a base in the Middle East. The flash drive's malicious computer code, placed there by a foreign intelligence agency, uploaded itself onto a network run by the U.S. Central Command. That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control. It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary.
Read Entire Article Below the Line.
Continue reading “Journal: Pentagon Flails in Defending Cyberspace”





