1. 2 Tier I/II $Ks Tier III/IV $Ms Tier V/VI $Bs Create New Vulnerabilities Discover New Vulnerabilities Exploit Known Vulnerabilities.
2 December 2009 Chris Miller PEO C4I 858-537-8779 [email protected]
Information Technology Opportunity Dilemma