Abstract
In view of the increasing threat of unauthorized intrusions into Department of Defense
computer systems, you asked us to report on the extent to which Defense computer
systems are being attacked, the actual and potential damage to its information and
systems, and the challenges Defense is facing in securing sensitive information.
This report identifies opportunities and makes recommendations to the Secretary of
Defense to improve Defense's efforts to counter attacks on its computer systems.