Pentagon May be Behind in Attacking "Honey Pot" - Lured Cyber Intruders

How does the Command defend networks that it doesn’t own from threats that aren’t military in origin?