{"id":197639,"date":"2008-01-21T17:33:00","date_gmt":"2008-01-21T22:33:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2008\/01\/21\/other-governments-turn-to-commercial-systems-and-get-more-for-less\/"},"modified":"2008-01-21T17:33:00","modified_gmt":"2008-01-21T22:33:00","slug":"other-governments-turn-to-commercial-systems-and-get-more-for-less","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2008\/01\/21\/other-governments-turn-to-commercial-systems-and-get-more-for-less\/","title":{"rendered":"Other Governments Turn to Commercial Systems, and Get More for Less"},"content":{"rendered":"<p>There are a couple of interesting articles (<a href=\"http:\/\/www.aviationnow.com\/publication\/awst\/loggedin\/AvnowStoryDisplay.do?fromChannel=awst&amp;pubKey=awst&amp;issueDate=2008-01-21&amp;story=xml\/awst_xml\/2008\/01\/21\/AW_01_21_2008_p44-24614.xml&amp;headline=Military+Hackers+Turn+To+Commercial+Electronic+Attack+Tools\">here<\/a> and <a href=\"http:\/\/www.aviationnow.com\/publication\/awst\/loggedin\/AvnowStoryDisplay.do?fromChannel=awst&amp;pubKey=awst&amp;issueDate=2008-01-21&amp;story=xml\/awst_xml\/2008\/01\/21\/AW_01_21_2008_p49-24626.xml&amp;headline=Portable+Network+Generates+EW+Attack+Weapons\">Portable Network Generates EW Attack Weapons<\/a> in Aviation week(paid subscription required)about the increasing use of civilian tech in military electronic warfare equipment.<\/p>\n<blockquote><p>\u201cThe Chinese, like many countries without billions to spend on defense, are figuring out how to leverage all that commercial technology into their military capabilities,\u201d says Rance Walleston, BAE Systems\u2019 director of information operations initiative and information warfare. \u201cWe\u2019ve spent a lot of time looking at Chinese technologies. They\u2019re not building many unique devices. Their integrated air defense system [IADS] uses commercial standards,\u201d such as GSM and voice over Internet protocols (VOIP).<\/p>\n<p>The Syrian raid\u2014which involved air-to-ground and network-to-network electronic invasion of a Russian-built IADS\u2014is convincing some that custom-built, highly specialized and expensive air defenses with long development times are decreasing in deterrent value. In fact, they have become victims of their own uniqueness. Because they were hard to develop and field, they aren\u2019t often modified. That gives electronic warriors the time to conduct analysis and build countermeasures.<\/p><\/blockquote>\n<p>We also discover that:<\/p>\n<blockquote><p>\u201cThe government historically procured single-use systems to go after signal X or Y,\u201d Sinkiewicz says. \u201cNow that\u2019s unaffordable, and what they want is a multifunction capability with the same architecture and hardware that can go after many types of signals.\u201d<\/p><\/blockquote>\n<p>I&#8217;m sure that some of the free market types would like to use this as an argument for the inherent superiority of the free market over government funded systems, but I would argue that the defense procurement infrastructure is among the most incompetent and corrupt segments of our governments, and that using this will not get good policy.<\/p>\n<p>In fact, the Privatization of essential government services in the military (KBR\/Halliburton, Blackwater, Triple Canopy, etc.)  has proved to be an unmitigated disaster too.<\/p>\n<p>The solution is to put adults in charge of the Military Industrial Complex, because we are currently reaping the consequences of not doing so for the past 60 years.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a couple of interesting articles (here and Portable Network Generates EW Attack Weapons in Aviation week(paid subscription required)about the increasing use of civilian tech in military electronic warfare equipment. \u201cThe Chinese, like many countries without billions to spend on defense, are figuring out how to leverage all that commercial technology into their military &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1008,1025],"tags":[],"class_list":["post-197639","post","type-post","status-publish","format-standard","hentry","category-defense-procurement","category-technology"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/197639"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=197639"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/197639\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=197639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=197639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=197639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}