Author Topic: "Infrastructure Protection" is justified/w False Flag Effects Based Operations  (Read 6817 times)

0 Members and 1 Guest are viewing this topic.

Anti_Illuminati

  • Guest
http://www.sovasec.com/2009/06/15/

June 15th, 2009

CyberWar is a Racket
Monday, June 15th, 2009

Inspired by ‘War is a Racket’ by Maj. Gen. Smedly Darlington Butler U.S.M.C

Under the threat of war, the cost of defense is never too high.
A nation is under significant obligation to protect its investments where ever they may be.
What we see now, is the transition from physical to electronic defense.


The United States is returning to Cold War status. In preparation for this the advancement of technology and the power of the intelligence community is of the foremost importance. In order to maintain a position of dominance, the government must sustain its partnership with wartime industry. Through a metamorphosis of the “military industrial complex”, into a new “intelligence industrial complex”, this accomplishment can be witnessed. The ever present fear of terrorism will still be used as justification for sustained engagement. The new terrorist threat comes from what the media refers to as hackers.

The United States’ trade deficit is in the trillions of dollars. The nation must possess assets for which they use to back the value of money sent overseas. China, for example, has accumulated a surplus of US currency. The deficit exists due to the lack of goods being sold in return. These dollars are then stockpiled or used to buy fuel. The oil cartel uses this petro-dollar as the international rate of exchange. There is already discussion to take the world off of this standard. The dollar has already been abandoned in places where once it was used it as a common currency. The United States needs to be ready to compete in the global market, or in default will continue to forfeit property as payment. If the international oil standard were to shift from the dollar, the American economy could be crushed. Places like China would have no reason to continue accepting currency from the United States as a form of trade. In order to continue doing global business, and maintain the standard of living for most Americans, the United States would need to find an acceptable financial solution. It would be necessary to provide a product or service which can be sold on the international market.

With a shift of strategy by the public-private sector, there is the beginning of what could be a record breaking transition. The same corporations, agencies, and institutions which traditionally have been government contractors understand this move, and are shifting production accordingly. International finance, which in the past has funded one or more sides of various conflicts, is already buying into this new deal. With the new President and his many supporters, the official war should be concluded soon. Although there will always be justification for troops stationed around the globe, much funding for war expenses would no longer be necessary.

The companies which produced the equipment, supplied the fuel for the machinery, and paid the workers, would be looking at a massive drop in revenue.  To compensate they will begin to offer services in line with the new focus on infrastructure protection. War profits can be an increase of 7856% over peace time.

That is a real historical figure of seven-thousand eight-hundred and fifty-six percent. Profit is the only motivation for the existence of a corporation. Existing funding could be redirected towards new projects and a new war.

A nation needs a real or fabricated threat to justify taxation to its people, for the necessity of its defenses.

In Orwell’s 1984 we saw Emmanuel Goldstein as the fictional ‘enemy of the people’. The character was a phantom used to justify the actions of the state. Some would say there is a modern analogue to the Goldstein character.

It is claimed that Tim Osman, in only 30 years, was partly responsible for the near collapse of not one, but two world empires. He has never been permanently detained despite a concerted global effort. In fact, he taunts the world by sending recordings of himself to media outlets, which use his image as a rallying symbol of fear comparable to Orwell’s construct. It is hard to imagine how a person in need of regular medical attention, can evade the worlds most advanced intelligence gathering network, and continue to avoid capture.

A sufficiently disruptive electronic attack would be an excellent pretense to create a new phantom enemy.


Sophisticated attacks on domestic infrastructure by unknown foreign entities, could easily be sold to the people as ‘the cost of war hitting home’, against enemies which must be defeated ‘at any cost’. Create a little fear, combined with nationalism, and a popular charismatic leader, and one can accomplish almost anything through the mob mentality.

Operation Cyberstorm has introduced us to the next generation of hypothetical threats.

These new terrorists are individuals and groups of technically skilled people. United by a popular voice of dissent, these groups have formed a loosely knit alliance with a common goal of disrupting the global economy. There are individual actors, the known unknowns, who may assist and possibly increase the severity of an electronic attack. To defend the global financial system and domestic infrastructure, the federal government partnered with private industry, and is spear heading the effort to crack down on criminal activity within these groups. It is not an eAl-Queada, or the iTaliban, the new terrorists are hackers. They are the poltergeist in the machine, whenever there is a disruption in internet service, or a random power outage, or any other system the public has come to depend on is interrupted, there will be the suspicion and speculation as to the root cause. If a server catches fire in Phoenix, or suzie1865 can not get to her mytwitterface account, someone is going to cry wolf. When this occurs the justification for more funding is shown to be necessary, the cycle of funding continues. Operation Cyberstorm was not focused on international state sponsored crime, or independent groups of foreign nationals conducting espionage. Though these are the fears represented in the recent legislation and government reviews.

The very intangible nature of cyber-bogeymen provides the vagueness needed to justify any measure of prevention, or manner of retaliation.


It is possible that we could see the war funding re-purposed for the improvement of infrastructure, the advancement of technology, and the defense of communications networks. These billions of dollars will continue to flow into the same hands.

The nature of security allows the defender to only divulge knowledge when it is to their advantage. The knowledge of potential threats, or even past incidents, is just another form of information which could be released for profit. When the industry shifts from traditional combat to electronic engagement, the resources allocated would create a world class institution. The heavy corporate involvement will open up the opportunity for those holding a large number of dollars to trade them in. The sale of data, proprietary and patented new technologies, and accompanying services, would create an outlet for stockpiled petro-dollars.

However this is not the end of physical combat. With industry there is the necessity for natural resources, the foreign and domestic sources of these materials would continue to require physical protection. To prevent against supply line attacks involving sabotaged materials, increased international oversight would be required at these facilities, which produce today’s high-tech components. Government contractors will supply both electronic and physical security to protect their assets. Tax money is used to fund corporations which are not interested or obligated to protect people’s rights. By partnering with the private sector, the government has relieved itself of much responsibility to the people. This responsibility is transferred to the private sector, which only has the single minded goal of increasing its own profit. This could explain why corporate representatives testify before congress to the need for the very services they provide. The agencies which use their services sit alongside them in agreement. This gives the illusion of a clear and present threat which must be eliminated as soon as possible.

The corporations are lined up with their hands out for increasingly larger slices of the federal pie. Sadly, with the lack of resistance and competition, there will be no organic incentive for innovation. Like a pack of wolves they will only destroy each other fighting over the scraps. Those who rely on the contracts to continue operation are forced into compliance for their ration, forever submitting to the alpha of the pack.

The market would not be free, and likely would eventually create a situation where it will be too hollow to support itself and collapse, leading to a very real threat to national security.

On the other hand there is a great risk for the continued creation of a technocratic fascist state. In which we would see constant and holistic surveillance to protect against foreign or domestic threats, among which the government themselves admit, is public dissent.

America was founded on the principle of dissent against tyranny. It is a patriotic duty to question the motivations of government. Technology can be the key that sets us free, or the yoke under which the many exist to serve the few.

With the end of the war, the media will further turn its attention to programming which numbs the mind. Without the constant reminder of the hellish nature of war the protesters will slowly go away. When the international terrorist computer criminals allegedly cripple some piece of critical infrastructure, and the justification for increased spending be comes a reality, the new victims of war will not draw the public sympathy as do dead and dieing solders in the field. When the power grid is compromised, or restrictions are placed on internet usage, even the anti-war crowd will stand behind the government looking for justice against the terrorists, which have caused their inconvenience. The intelligence assurance community, a government and corporate body, would expand as protectorate of the national electronic infrastructure.

Anyone who operates critical equipment, including networks of computers, will be biometricly catalogued. Some existing uses, of similar government systems, also employ operators in real time remote connection monitoring, as a security measure to ensure the validity of the information transfer, and that standard protocols are being observed. Most domestic communications are intercepted and recorded by the intelligence agencies at various points in the network. Private companies index this information, protecting it from Freedom of Information Act requests. Like so many baseball cards, profiles are bought, sold, and traded.

Information is the new currency.

The data centers are the new vaults, the processing facilities the new banks. Where there are banks there will always be robbers. Where there are robbers there will always be lawmen to make pursuit. In their way are things like privacy, the Constitution, and international boundaries.

The intelligence agencies are more then willing to put themselves above the law when it suits them. Their collaboration with the private sector gives them special access to infrastructure, which they have already shown the willingness to abuse.  Unlike land, gold, and oil, persons and their information are renewable resources, so this new market has infinite growth potential.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: "Infrastructure Protection" Exposed - CYBERGATE = The New CLIMATEGATE!!
« Reply #1 on: December 12, 2009, 12:07:31 pm »
god bless whoever wrote this article!

thanks for posting this.

EVERYONE...

Read it, know it, live it!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: "Infrastructure Protection" Exposed - CYBERGATE = The New CLIMATEGATE!!
« Reply #2 on: December 12, 2009, 12:16:04 pm »
Here are the top companies getting the contracts:

CACI

KROLL

IGI


These organizations are terrorist organizations. They are the ones that would cut up vietnamese children before we were officially in vietnam to blame it on the viet cong. they are the ones that bomb schools in iraq and blame it on tribal issues. they are the ones that wrote the al-qaeda torture manual.

there is nothing stopping these sadistic maniacs once granted the power over all information/infrastructure.

they work for sir henry kissinger who is a main general for Dope, Inc.

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Outer Haven

  • Member
  • *****
  • Posts: 1,954
Re: "Infrastructure Protection" Exposed - CYBERGATE = The New CLIMATEGATE!!
« Reply #3 on: December 12, 2009, 12:19:26 pm »
That's some scary stuff!!

But what do we do after they shut down the Internet/switch to Internet2?

And why are you calling it "CYBERGATE"? What has been leaked here?
"Building the future and keeping the past alive are one and the same thing."
-- Snake

luckee1

  • Guest
Re: "Infrastructure Protection" Exposed - CYBERGATE = The New CLIMATEGATE!!
« Reply #4 on: December 12, 2009, 12:27:28 pm »
Does anyone else get the sense that they are treating us like naughty dogs, by rubbing our noses in it, when it is not even our mess?

Their agenda is like a lascivious woman spreading her wares.  The decent people find her repugnant, but the scurrilous adore her.  Being that there is no more justice in the system, the reward goes to the most base of the group.

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: "Infrastructure Protection" Exposed - CYBERGATE = The New CLIMATEGATE!!
« Reply #5 on: December 12, 2009, 12:34:46 pm »
That's some scary stuff!!

But what do we do after they shut down the Internet/switch to Internet2?

And why are you calling it "CYBERGATE"? What has been leaked here?

In that article, the author clearly explains the nature of the cyber security false flags. It is another war - and this time, with the current economic downturn, the military industrial private contractors will use Cyber Terror as the rationale to further rape and pillage the American people. The "leak" is the analysis of the situation, and the exposure of the real objective behind all of the cyber security false flags to date; and perhaps the biggest to come - one that will guarantee the full acceptance of IPv6 and censorship based on the 'terror' threat. This author speaks the truth about the current agenda with regard to freedom of speech, in essence, there will shortly be NO freedom of speech.

Quote
When the power grid is compromised, or restrictions are placed on internet usage, even the anti-war crowd will stand behind the government looking for justice against the terrorists, which have caused their inconvenience.

And sheeple will welcome this.


And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: "Infrastructure Protection" Exposed - CYBERGATE = The New CLIMATEGATE!!
« Reply #6 on: December 12, 2009, 06:24:16 pm »
Speaking of "Infrastructure Protection":

greg palast had a warrant for his arrest for filming in front of a new orleans concentration camp:

Alex Jones - Greg Palast Charged Criminally for filming FEMA
10 min - Sep 14, 2006 -
www.youtube.com/watch?v=7woOAjUm8vQ [/b]
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline trailhound

  • Member
  • *****
  • Posts: 4,722
Re: "Infrastructure Protection" Exposed - CYBERGATE = The New CLIMATEGATE!!
« Reply #7 on: December 12, 2009, 06:38:43 pm »
Pilikia wrote

Quote
And sheeple will welcome this.

yes most frustrating of all :P

"Do not let your hatred of a people incite you to aggression." Qur'an 5:2
At the heart of that Western freedom and democracy is the belief that the individual man, the child of God, is the touchstone of value..." -RFK

Offline infowarrior_039

  • Member
  • *****
  • Posts: 789
  • explosions in the sky
    • Truth Archive
Re: "Infrastructure Protection" Exposed - CYBERGATE = The New CLIMATEGATE!!
« Reply #8 on: December 14, 2009, 02:08:05 pm »
heres a collection of Infrastructure Protection documents if anyone wants

http://www.sendspace.com/file/ho9k9e

luckee1

  • Guest
Re: "Infrastructure Protection" Exposed - CYBERGATE = The New CLIMATEGATE!!
« Reply #9 on: December 15, 2009, 01:10:37 pm »
heres a collection of Infrastructure Protection documents if anyone wants

http://www.sendspace.com/file/ho9k9e

Oh Bless you Bless you Bless you!!!!!

Anti_Illuminati

  • Guest
http://www.sovasec.com/2009/06/15/

June 15th, 2009

CyberWar is a Racket
Monday, June 15th, 2009

Inspired by ‘War is a Racket’ by Maj. Gen. Smedly Darlington Butler U.S.M.C

Under the threat of war, the cost of defense is never too high.
A nation is under significant obligation to protect its investments where ever they may be.
What we see now, is the transition from physical to electronic defense.


The United States is returning to Cold War status. In preparation for this the advancement of technology and the power of the intelligence community is of the foremost importance. In order to maintain a position of dominance, the government must sustain its partnership with wartime industry. Through a metamorphosis of the “military industrial complex”, into a new “intelligence industrial complex”, this accomplishment can be witnessed. The ever present fear of terrorism will still be used as justification for sustained engagement. The new terrorist threat comes from what the media refers to as hackers.

The United States’ trade deficit is in the trillions of dollars. The nation must possess assets for which they use to back the value of money sent overseas. China, for example, has accumulated a surplus of US currency. The deficit exists due to the lack of goods being sold in return. These dollars are then stockpiled or used to buy fuel. The oil cartel uses this petro-dollar as the international rate of exchange. There is already discussion to take the world off of this standard. The dollar has already been abandoned in places where once it was used it as a common currency. The United States needs to be ready to compete in the global market, or in default will continue to forfeit property as payment. If the international oil standard were to shift from the dollar, the American economy could be crushed. Places like China would have no reason to continue accepting currency from the United States as a form of trade. In order to continue doing global business, and maintain the standard of living for most Americans, the United States would need to find an acceptable financial solution. It would be necessary to provide a product or service which can be sold on the international market.

With a shift of strategy by the public-private sector, there is the beginning of what could be a record breaking transition. The same corporations, agencies, and institutions which traditionally have been government contractors understand this move, and are shifting production accordingly. International finance, which in the past has funded one or more sides of various conflicts, is already buying into this new deal. With the new President and his many supporters, the official war should be concluded soon. Although there will always be justification for troops stationed around the globe, much funding for war expenses would no longer be necessary.

The companies which produced the equipment, supplied the fuel for the machinery,
and paid the workers, would be looking at a massive drop in revenue.
To compensate they will begin to offer services in line with the new focus
on infrastructure protection. War profits can be an increase of 7856% over peace time.


That is a real historical figure of seven-thousand eight-hundred and fifty-six percent. Profit is the only motivation for the existence of a corporation. Existing funding could be redirected towards new projects and a new war.

A nation needs a real or fabricated threat to justify taxation to its people, for the necessity of its defenses.

In Orwell’s 1984 we saw Emmanuel Goldstein as the fictional ‘enemy of the people’. The character was a phantom used to justify the actions of the state. Some would say there is a modern analogue to the Goldstein character.

It is claimed that Tim Osman, in only 30 years, was partly responsible for the near collapse of not one, but two world empires. He has never been permanently detained despite a concerted global effort. In fact, he taunts the world by sending recordings of himself to media outlets, which use his image as a rallying symbol of fear comparable to Orwell’s construct. It is hard to imagine how a person in need of regular medical attention, can evade the worlds most advanced intelligence gathering network, and continue to avoid capture.

A sufficiently disruptive electronic attack would be
an excellent pretense to create a new phantom enemy.


Sophisticated attacks on domestic infrastructure by unknown foreign entities, could easily be sold to the people as ‘the cost of war hitting home’, against enemies which must be defeated ‘at any cost’. Create a little fear, combined with nationalism, and a popular charismatic leader, and one can accomplish almost anything through the mob mentality.

Operation Cyberstorm has introduced us to the next generation of hypothetical threats.

These new terrorists are individuals and groups of technically skilled people. United by a popular voice of dissent, these groups have formed a loosely knit alliance with a common goal of disrupting the global economy. There are individual actors, the known unknowns, who may assist and possibly increase the severity of an electronic attack. To defend the global financial system and domestic infrastructure, the federal government partnered with private industry, and is spear heading the effort to crack down on criminal activity within these groups. It is not an eAl-Queada, or the iTaliban, the new terrorists are hackers. They are the poltergeist in the machine, whenever there is a disruption in internet service, or a random power outage, or any other system the public has come to depend on is interrupted, there will be the suspicion and speculation as to the root cause. If a server catches fire in Phoenix, or suzie1865 can not get to her mytwitterface account, someone is going to cry wolf. When this occurs the justification for more funding is shown to be necessary, the cycle of funding continues. Operation Cyberstorm was not focused on international state sponsored crime, or independent groups of foreign nationals conducting espionage. Though these are the fears represented in the recent legislation and government reviews.

The very intangible nature of cyber-bogeymen provides the vagueness needed
to justify any measure of prevention, or manner of retaliation.


It is possible that we could see the war funding re-purposed for the improvement of infrastructure, the advancement of technology, and the defense of communications networks. These billions of dollars will continue to flow into the same hands.

The nature of security allows the defender to only divulge knowledge when it is to their advantage. The knowledge of potential threats, or even past incidents, is just another form of information which could be released for profit. When the industry shifts from traditional combat to electronic engagement, the resources allocated would create a world class institution. The heavy corporate involvement will open up the opportunity for those holding a large number of dollars to trade them in. The sale of data, proprietary and patented new technologies, and accompanying services, would create an outlet for stockpiled petro-dollars.

However this is not the end of physical combat. With industry there is the necessity for natural resources, the foreign and domestic sources of these materials would continue to require physical protection. To prevent against supply line attacks involving sabotaged materials, increased international oversight would be required at these facilities, which produce today’s high-tech components. Government contractors will supply both electronic and physical security to protect their assets. Tax money is used to fund corporations which are not interested or obligated to protect people’s rights. By partnering with the private sector, the government has relieved itself of much responsibility to the people. This responsibility is transferred to the private sector, which only has the single minded goal of increasing its own profit. This could explain why corporate representatives testify before congress to the need for the very services they provide. The agencies which use their services sit alongside them in agreement. This gives the illusion of a clear and present threat which must be eliminated as soon as possible.

The corporations are lined up with their hands out for increasingly larger slices of the federal pie. Sadly, with the lack of resistance and competition, there will be no organic incentive for innovation. Like a pack of wolves they will only destroy each other fighting over the scraps. Those who rely on the contracts to continue operation are forced into compliance for their ration, forever submitting to the alpha of the pack.

The market would not be free, and likely would eventually create a situation where it will be too hollow to support itself and collapse, leading to a very real threat to national security.

On the other hand there is a great risk for the continued creation of a technocratic fascist state. In which we would see constant and holistic surveillance to protect against foreign or domestic threats, among which the government themselves admit, is public dissent.

America was founded on the principle of dissent against tyranny. It is a patriotic duty to question the motivations of government. Technology can be the key that sets us free, or the yoke under which the many exist to serve the few.

With the end of the war, the media will further turn its attention to programming which numbs the mind. Without the constant reminder of the hellish nature of war the protesters will slowly go away. When the international terrorist computer criminals allegedly cripple some piece of critical infrastructure, and the justification for increased spending be comes a reality, the new victims of war will not draw the public sympathy as do dead and dieing solders in the field. When the power grid is compromised, or restrictions are placed on internet usage, even the anti-war crowd will stand behind the government looking for justice against the terrorists, which have caused their inconvenience. The intelligence assurance community, a government and corporate body, would expand as protectorate of the national electronic infrastructure.

Anyone who operates critical equipment, including networks of computers, will be biometricly catalogued. Some existing uses, of similar government systems, also employ operators in real time remote connection monitoring, as a security measure to ensure the validity of the information transfer, and that standard protocols are being observed. Most domestic communications are intercepted and recorded by the intelligence agencies at various points in the network. Private companies index this information, protecting it from Freedom of Information Act requests. Like so many baseball cards, profiles are bought, sold, and traded.

Information is the new currency.

The data centers are the new vaults, the processing facilities the new banks. Where there are banks there will always be robbers. Where there are robbers there will always be lawmen to make pursuit. In their way are things like privacy, the Constitution, and international boundaries.

The intelligence agencies are more then willing to put themselves above the law when it suits them. Their collaboration with the private sector gives them special access to infrastructure, which they have already shown the willingness to abuse.  Unlike land, gold, and oil, persons and their information are renewable resources, so this new market has infinite growth potential.

From a NWO bootlicking site:
http://www.lexingtoninstitute.org/the-cyber-goldrush-begins?a=1&c=1129

The Cyber Goldrush Begins
Author:
Loren B. Thompson, Ph.D.
Date:
Tuesday, December 8, 2009
Issue Brief

When Chinese agents penetrated the computers of the Obama campaign during the recent election season and stole many sensitive files, they pretty much guaranteed that the nation's next president would make cybersecurity a national priority. Obama has done precisely that. Not only is a "comprehensive national cybersecurity initiative" being funded to the tune of several billion dollars per year, but a Cyber Command has been established at the headquarters of the National Security Agency in Maryland and the Department of Homeland Security is putting much more effort into protecting civil and commercial networks. However, these efforts barely begin to address the challenge of securing intelligence networks, financial systems, utility grids and medical records in the information age; the market for cybersecurity hardware and services will exceed $100 billion in the next decade.

Defense companies have noticed, and are moving fast to secure a share of the market. Lockheed Martin has constructed a major cybersecurity complex near its corporate headquarters. Northrop Grumman has assembled thousands of employees previously scattered across the company in a consolidated business unit. Boeing has been buying up smaller cyber companies. And General Dynamics has built up a diverse roster of cyber customers in the military, civil agencies and even commercial retailing. Each of these companies recognizes that growing demand for cyber skills could help cover any shortfall in revenues from traditional weapons programs. For Boeing, that need is already urgent; for GD, cyber is a nice add-on to military and commercial lines that are still humming.

The problem that investors face in trying to benefit from this trend is that government programs are the biggest source of demand, but they're all secret. For example, ManTech International may be better positioned in the non-defensive facets of computer network operations than any other company in the sector, but it isn't talking. And while other companies like Northrop Grumman and GD have established broad franchises in computer network defense, offense and exploitation, their cyber activities are subsumed in the operations of bigger business units engaged in a range of other activities. A further complication is that some companies are re-labeling information technology workers as cyber specialists in a manner that obscures the true scale of their cyber revenues.

With so many companies rushing into cyber, it's obvious that they aren't all going to be happy with how they fare. General Dynamics -- which traces its dealings with NSA back to the old Bell System/Western Electric days -- is going to do fine, because it knows the technology and players very well. A recent FedSources analysis of publicly available information ranked GD number one in the field, due partly to its dominant role in encryption devices. Northrop has positioned itself nicely by anticipating rising demand in advance of competitors and acquiring key players like Essex. And ManTech's special competencies make it a likely winner, whether it grows or is acquired.

Lockheed Martin is also expected to do well because it is already the biggest provider of information services to the federal government, and is pouring money into business development. SAIC will do well, because it always does. But how the other market entrants will fare remains to be seen. IBM will play, but probably only on defense. Booz Allen will see bigger revenues, but mainly in an advisory capacity. Boeing may be too late to the party, unless it buys an established player. Cyber is a big opportunity, but as with any other emerging business, there will be both winners and losers.

Offline Omni1

  • Member
  • ****
  • Posts: 359
Do you guys have any other mirrors to this? 

Not Found

The requested URL /2009/06/15/ was not found on this server.

Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.
Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8l DAV/2 mod_auth_passthrough/2.1 FrontPage/5.0.2.2635 Server at www.sovasec.com Port 80




I want to post this around but if I give an bad source it will be taken down.