So they plan to waste millions on a project that will "install new software designed to spot and track attempts to access or download secret materials without proper authorization."?
If he gets the credentials from users authorized to access the information how will this work? Swing and miss!
You have to let the chatter about the exploit die down enough so that you can pull the heist off with better success. Going out and attempting it immediately after Black Hat is too risky and the sign of foolish thief.
But seem to have failed to realize that you don't need a Kindle to download the Kindle app to any Android or iDevice and connect with your Amazon.com account. Hell, I have the Kindle App on my Motorola Droid phone and get my books for it on there without shelling out the higher $$ for the physical Kindle device. Since Walmart and Target also sell Android tablets and smartphones I guess it won't be long before they stop that too?
The real question should've been "What would you do to IMPROVE the Linux desktop". The original question just starts a flamewar while the latter, revised question would foster innovative thinking and insightful contributions.
I make it my personal SOP when leaving any job to throw DBAN in the drive, let it run and then load a clean copy of the OS with the company licensed software. You could take it a step further and replace the hard drive but that's just a little paranoid don't ya think?