Pentagon's $20bn war internet will 'cure world hunger'

Rumsfeld rubs it in: it's the revenge of the drone class

Talk about cultural differences. While the Finns dismiss computer addicts from their military, figuring them to be useless basketcases and sending them on their way with a firm smack round the chops, the United States has given them a job for life.

These are happy days for people who style themselves as Pentagon contractors. With the nation lulled into a permanent sense of war, and deficit-defying budgets earmarked for anything military, technology companies can't believe their luck.

While inadequately-protected soldiers are being shot in Iraq, the US government expects to spend $200bn on "a new internet" for the Department of Defense, the New York Times reports today. The Global Information Grid, or GIG, is a ten-year project to provide a completely new information network uniting the services. Beneficiaries this time will include IBM, Microsoft, Hewlett Packard and Sun Microsystems, alongside more familiar names like Lockheed Martin, Northrop Grumman and Raytheon in a giant consortium formed six weeks ago to build GIG.

On the official GIG website, even Donald Rumsfeld has bought into the bloggers' hopeless, huggy, Thesp-like religion of interconnectednessivity, otherwise known as I've Done My First Acid Trip, Mom! As you can see from his quote here, Rummy will soon be keynoting at a "knowledge management" seminar, near you.

GIG isn't actually new, the Times fails to tell us. It has been the subject of wary reports from the government spending watchdog the Government Accounting Office since 2001, and of hopeful PowerPoint presentations for even longer. What is new is that it will finally get funding beyond most of the consortium members' wildest dreams. Infrastructure spending on what the Times calls 'connections' will be $24 billion in the next five years, with cryptography spending another $5 billion.

Isn't there an abundance of open source cryptography already available, you're thinking? Isn't the existing internet good enough? Evidently not, because the GIG's real purpose is to be most expensive, and certainly the most exclusive TV channel ever created.

God's-eye view

Swooning a little, the Times tells us,

"It gives the generals what one supporter describes as 'a picture of the battle space, a God's-eye view'".

That's a vision which thanks to the technology, has just been launched from its cage inside a General's dozing mind. Where it really should have stayed.

There are problems with this "God's-eye-wins" view of military technology. Skeptics point out that with modern warfare already 'asymmetric', high technology is little help here. Low technology insurgents have taken a toll on the mightiest military the world has ever seen. Having an abundance of information doesn't help when all you need is a little very good information, so quality triumphs quantity when you're in a tight spot. And basic human qualities, like courage and intuition, are needed like never before. These should be the basis for a military technology policy, but our generals keep having power fantasies based on what they're sold - missold, really - by technology companies, such as the only alliance behind GIG.

And from all the public specifications so far released, GIG looks like the biggest boondoggle the IT sector has ever created: they've actually persuaded the government to write a blank check for which they can a create an open-ended project, into which they can pour as many IT consultants as they can afford to employ. A lot of them with "knowledge management" on their business cards.

In the 1990s, when they pitched for business against the lower reaches of the public sector, IT consultants realized that they were far smarter at managing their contracts than their partners, and so could evade the accountability requirements (like public floggings) necessary when you goof. But to find such bedfellows as IBM and Microsoft and Sun, all in a consortium angling for government pork, you have to suspect that they're pretty desperate people. Or they think it's easy money.

There's another explanation, which we cannot dismiss. Has a small, frustrated class of middle manager asserted its authority in the USA, the class of "knowledge management" experts? If this is the case, then they've clearly got their man installed right at the top, as we noticed with the bloggy Rumsfeld-speak at the website.

Visionary department

Meanwhile, the project has rung alarm bells with the spending watchdog, the GAO, because the Department of Defense doesn't know what it's doing. An August report suggests that GIG is already out of control. "While DOD has taken steps to define its vision and objectives for the GIG on paper and in policy … it is not fully known how DOD will meet these objectives.

That's because the staff at the DOD's tasked "visionary department" have been staring at blobs on a PowerPoint for the last four years, wondering what the heck to do. Panic! Better call in some more knowledge management consultants.

"Moreover, it is not known how DOD will assess the overall progress of the GIG and determine whether the network as a whole is providing a worthwhile return on investment, particularly in terms of enhancing and even transforming military operations.

So in the best case, things will be as bad as they were before.

"Until DOD implements an investment and oversight strategy for the GIG as a whole, it is at risk of making investments that do not fit its vision for the future. In addition, DOD faces risks inherent with the nature and scope of the effort it is undertaking, for example, risks related to protecting data within the thousands of systems that will be integrated into the network. Furthermore, the technical challenges to develop new networking and network management capabilities to support mobile, integrated communications are considerable. DOD recognizes these challenges, and many of the actions it is taking to implement the GIG are meant to address them. However, it is too early to assess how successful DOD will be in addressing the challenges and overcoming long-standing organizational impediments."

Couldn't $200bn be better spent? In a tactless Freudian slip, one of GIG's proponents accidentally seems to think it could, too -

"This is what we want… A web based, browser enabled, self healing [they've been listening to bloggers again - ed.] network that uses COTS applications to support existing and projected business practices while integrating data elements across all legacy systems protected by a multi-level secure environment that we can trust in war, is US only but can be released to our allies, and cures world hunger by noon tomorrow…"

Now, chaps. Speaking of world hunger… you've got a few questions to answer.

The IT industry's sudden comradely common purpose is fascinating. Long time foes, like Sun and Microsoft, and IBM, have all put down their mutual differences as brothers as they agree - just for a second - what a splendid idea it is to raid the public purse.

The pension industry only just survived its "misselling" scandals because its highly complicated contracts (alarm bells have rung, we hope) allowed it to substitute the word "misselling" for the word "fraud". But it's fraud pure and simple, when someone sells you something they don't have, and will never have in the future.

So how long will it be before an IT consultant or his firm (and knowledge management PowerPointers - yes, we're looking at you) is convicted for misselling a technology that doesn't work? When it's the private sector's money that's being lost to such fraudulent scams such as Jack Welch's "Six Sigma" that's OK with us. Which will be the first IT company to be implicated, now they've all invited each other into the firing line? When it comes to our money being involved, in the public sector, we do notice. ®

Just read the headlines

Internet addicts sent home from Finnish military
Invisible GIs to heal selves, leap tall building with nanotech
US compute labs in desperate need of Federal swill
F-16 strafes New Jersey school
US throws $1bn at unmanned attack aircraft
Epson parades tea cup-sized flying robot
Could Segways replace soldiers as hired killers?
Cheap rocket crumbles in hunt for $10m space prize
Crash test dummies get date for DARPA Robot Run II
Emergent cheese-sandwich detector enlisted in War on Terror
UK's RAF planned WMD delivery via 'pigeons of death'
US puts on pair of robotrousers
I Married an Extropian - reader
US Defense Dept tech crisis leaves Our Boys unpaid

Other stories you might like

  • AI tool finds hundreds of genes related to human motor neuron disease

    Breakthrough could lead to development of drugs to target illness

    A machine-learning algorithm has helped scientists find 690 human genes associated with a higher risk of developing motor neuron disease, according to research published in Cell this week.

    Neuronal cells in the central nervous system and brain break down and die in people with motor neuron disease, like amyotrophic lateral sclerosis (ALS) more commonly known as Lou Gehrig's disease, named after the baseball player who developed it. They lose control over their bodies, and as the disease progresses patients become completely paralyzed. There is currently no verified cure for ALS.

    Motor neuron disease typically affects people in old age and its causes are unknown. Johnathan Cooper-Knock, a clinical lecturer at the University of Sheffield in England and leader of Project MinE, an ambitious effort to perform whole genome sequencing of ALS, believes that understanding how genes affect cellular function could help scientists develop new drugs to treat the disease.

    Continue reading
  • Need to prioritize security bug patches? Don't forget to scan Twitter as well as use CVSS scores

    Exploit, vulnerability discussion online can offer useful signals

    Organizations looking to minimize exposure to exploitable software should scan Twitter for mentions of security bugs as well as use the Common Vulnerability Scoring System or CVSS, Kenna Security argues.

    Better still is prioritizing the repair of vulnerabilities for which exploit code is available, if that information is known.

    CVSS is a framework for rating the severity of software vulnerabilities (identified using CVE, or Common Vulnerability Enumeration, numbers), on a scale from 1 (least severe) to 10 (most severe). It's overseen by, a US-based, non-profit computer security organization.

    Continue reading
  • Sniff those Ukrainian emails a little more carefully, advises Uncle Sam in wake of Belarusian digital vandalism

    NotPetya started over there, don't forget

    US companies should be on the lookout for security nasties from Ukrainian partners following the digital graffiti and malware attack launched against Ukraine by Belarus, the CISA has warned.

    In a statement issued on Tuesday, the Cybersecurity and Infrastructure Security Agency said it "strongly urges leaders and network defenders to be on alert for malicious cyber activity," having issued a checklist [PDF] of recommended actions to take.

    "If working with Ukrainian organizations, take extra care to monitor, inspect, and isolate traffic from those organizations; closely review access controls for that traffic," added CISA, which also advised reviewing backups and disaster recovery drills.

    Continue reading

Biting the hand that feeds IT © 1998–2022