How to Run a State-of-the-Art Technology Program – Quietly

FACT: In the new movie “Iron Man,” defense-contracting billionaire and engineering genius Tony Stark (played by Robert Downey Jr.) designs and builds a suit capable of individual flight (highly engineered control surfaces powered by an “arc-reactor” – it is Hollywood after all). During his first test flight, zooming straight up from Malibu and stressing the system to its max, he asks his onboard computer, “What’s the altitude record for the SR-71?” His computer responds back, “85,000 feet,” whereupon he zooms past that ceiling.

ANALYSIS: Funny moment, and excellent movie.  In its honor, below I’m going to give you access to a remarkable, recently declassified document describing one of America’s boldest Cold War technical achievements.  If you’ve ever run (or wanted to run) a high-tech company or program, like Tony Stark in the movie, you’ll appreciate the startling scope of the work – and if you’ve recently worked in DoD or the Intelligence Community you’ll marvel at how they did it “in the good old days.”

Continue reading

A Roadmap for Innovation – from Center or the Edge?

Fact:   In marking its five-year anniversary earlier this month, the Department of Homeland Security released a fact sheet touting the department’s accomplishments in that time, including “establish[ing] the Computer Emergency Readiness Team (US-CERT) to provide a 24-hour watch, warning, and response operations center, which in 2007 issued over 200 actionable alerts on cyber security vulnerabilities or incidents. US-CERT developed the EINSTEIN intrusion detection program, which collects, analyzes, and shares computer security information across the federal civilian government. EINSTEIN is currently deployed at 15 federal agencies, including DHS, and plans are in place to expand the program to all federal departments and agencies.”

Analysis:  I’m not going to write, in this post at least, about US-CERT and EINSTEIN in particular. I will point out that some writers have been skeptical of “Big DHS” progress on cyber security up to now, and the anniversary was an occasion for much cynical commentary. 

cnet-news.jpgCharles Cooper in his popular Coop’s Corner blog on CNet wrote that “when it comes to network security, DHS appears to be more of a wet noodle than even its sharpest critics assumed… Talk with security consultants and former government officials involved with DHS and you come away wondering what these folks do all day.”

Continue reading

%d bloggers like this: