recommended reading

Navy SEAL author cashing in on Special Ops video game

There's more than one way to profit from your experience in the military. For Matt Bisonnette, the former Navy SEAL Team 6 member who wrote a book about killing Osama bin Laden, that includes offering consulting services to a big name video game maker. 

The Los Angeles Times' Alex Pham reports that Bissonnette is a consultant for Electronic Arts' upcoming Special Forces video game Medal of Honor: Warfighter. For video game sequences based in Afghanistan and elsewhere, the game's Los Angeles developers are putting a premium on authenticity, according to Pham, and are working closely with Bissonnette's consulting firm Silent R.  "The team consulted with several special forces soldiers to make sure the settings, weapons and other aspects of the fighting within the game was realistic," reports Pham. "One of those consultants was Bissonnette."

The news of Bissonnette's latest business endeavor comes as he receives a wave of criticism from current and former service members in the Special Ops community for writing No Easy Day, set for release September 11. "When you leave the compound, you leave the secrets there," said Don Mann, a former member of SEAL Team 6 speaking with the Daily Beast's Eli Lake. “As soon as bin Laden was killed, it was known I was a member. I got three lucrative offers. I told them, ‘What I know you would want to know, I am not going to let you know.'"

Roger Castens, a former Army Special Forces officer, expressed similar displeasure with the book's release. “I am on a few list-servs,” he told Lake. “This topic has been a heavy and heated discussion with almost everyone asking WTF?”

It should be said in Bissonnette's defense, his publisher Dutton says, "the majority" of proceeds from the book will go to "unnamed charities that support families of Navy SEALs killed in the line of duty." In addition, there's also the public interest argument that the story deserves to be told from a first person account, given the number of revisions there's been to the official White House account. As Bissonnette writes in the book, "it is time to set the record straight about one of the most important missions in U.S. military history."

READ THE REST AT THE ATLANTIC WIRE.

Below, a trailer for Medal of Honor: Warfighter:

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.