National Preparedness is up to YOU

At no other time in American history has the United States been so vulnerable to national security threats. The text below is for you benefit, take is seriously and don’t rely on FEMA, you are your own best resource.

National Preparedness Report

Main Content

This page provides information on the 2015 National Preparedness Report, including the overarching findings on national issues, preparedness progress, and opportunities for improvement. This page is for anyone interested in seeing how preparedness can inform priorities and community actions.

National Preparedness Report

The 2015 National Preparedness Report marks the fourth iteration of this annual report. Required annually by Presidential Policy Directive 8: National Preparedness, the National Preparedness Report summarizes progress in building, sustaining, and delivering the 31 core capabilities described in the 2011 National Preparedness Goal (the Goal). Each year, the report presents an opportunity to assess gains that whole community partners—including all levels of government, private and nonprofit sectors, faith-based organizations, communities, and individuals—have made in preparedness, and to identify where challenges remain.

The intent of the National Preparedness Report is to provide the Nation with practical insights on preparedness that can inform decisions about program priorities, resource allocations, and community actions. The 2015 National Preparedness Report focuses primarily on preparedness activities undertaken or reported during 2014, and places particular emphasis on progress made in implementing the National Planning Frameworks (the Frameworks) across the Prevention, Protection, Mitigation, Response, and Recovery mission areas. The Frameworks describe how the whole community works together to achieve the goal of a secure and resilient Nation.

Overarching Findings on National Issues

In addition to key findings for each of the five preparedness mission areas, the 2015 NPR identifies overarching national trends that cut across multiple mission areas:

  • Incorporating Emergency Preparedness into Technology Platforms: Businesses and public-private partnerships are increasingly incorporating emergency preparedness into technology platforms, such as Internet and social media tools and services.
  • Challenges Assessing the Status of Corrective Actions: While Federal departments and agencies individually assess progress for corrective actions identified during national-level exercises and real-world incidents, challenges remain to comprehensively assess corrective actions with broad implications across the Federal Government.
  • Response Coordination Challenges for Events that Do Not Receive Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act) Declarations: Recent events, including the epidemic of Ebola virus disease, have highlighted challenges with coordinating the response to and recovery from complex incidents that do not receive Stafford Act declarations.

The Nation Continues to Make Progress

The 2015 NPR identifies three new core capabilities – Environmental Response/Health and Safety, Intelligence and Information Sharing, and Operational Coordination – as meeting acceptable levels of performance but requiring sustained effort to maintain capability and meet emerging challenges. These capabilities join five others from the 2014 report that future National Preparedness Reports will revisit to determine if they are still meeting performance goals.

Opportunities for Improvement

The 2015 National Preparedness Report also highlights key preparedness challenges remaining for the Nation. Three core capabilities—Cybersecurity, Housing, and Infrastructure Systems—have persisted as areas for improvement across all four National Preparedness Reports. A fourth core capability, Long-term Vulnerability Reduction, repeats as an area for improvement from last year, due in part to questions surrounding the long-term solvency of the National Flood Insurance Program and nascent national efforts for climate change adaptation and green infrastructure. Preparedness data further revealed that the Federal Government, states, and territories are also struggling to build capacity for the Access Control and Identity Verification and Economic Recovery core capabilities. These areas for improvement are a reminder that preparedness gains are gradual and that solutions to complex challenges will not materialize without sustained support from the whole community.

Key Factors for Future Progress

The 2015 NPR represents the fourth opportunity for the Nation to reflect on progress in strengthening national preparedness and to identify where preparedness gaps remain. Looking across all five mission areas, the NPR provides a national perspective on critical preparedness trends for whole community partners to use to inform program priorities, to allocate resources, and to communicate with stakeholders about issues of shared concern.

Resources

Core Capabilities

Main Content

The National Preparedness Goal identified 31 core capabilities—these are the distinct critical elements needed to achieve the goal.

These capabilities are referenced in many national preparedness efforts, including the National Planning Frameworks. The Goal grouped the capabilities into five mission areas, based on where they most logically fit. Some fall into only one mission area, while some others apply to several mission areas.

Download the capabilities crosswalk to see how the legacy Target Capabilities List compares with the new core capabilities.

Planning

  • Mission Areas: All
  • Description: Conduct a systematic process engaging the whole community as appropriate in the development of executable strategic, operational, and/or community-based approaches to meet defined objectives.

Public Information and Warning

  • Mission Areas: All
  • Description: Deliver coordinated, prompt, reliable, and actionable information to the whole community through the use of clear, consistent, accessible, and culturally and linguistically appropriate methods to effectively relay information regarding any threat or hazard, as well as the actions being taken and the assistance being made available, as appropriate.

Operational Coordination

  • Mission Areas: All
  • Description: Establish and maintain a unified and coordinated operational structure and process that appropriately integrates all critical stakeholders and supports the execution of core capabilities.

Forensics and Attribution

  • Mission Area: Prevention
  • Description: Conduct forensic analysis and attribute terrorist acts (including the means and methods of terrorism) to their source, to include forensic analysis as well as attribution for an attack and for the preparation for an attack in an effort to prevent initial or follow-on acts and/or swiftly develop counter-options.

Intelligence and Information Sharing

  • Mission Areas: Prevention, Protection
  • Description: Provide timely, accurate, and actionable information resulting from the planning, direction, collection, exploitation, processing, analysis, production, dissemination, evaluation, and feedback of available information concerning threats to the United States, its people, property, or interests; the development, proliferation, or use of WMDs; or any other matter bearing on U.S. national or homeland security by Federal, state, local, and other stakeholders. Information sharing is the ability to exchange intelligence, information, data, or knowledge among Federal, state, local, or private sector entities, as appropriate.

Interdiction and Disruption

  • Mission Areas: Prevention, Protection
  • Description: Delay, divert, intercept, halt, apprehend, or secure threats and/or hazards.

Screening, Search, and Detection

  • Mission Areas: Prevention, Protection
  • Description: Identify, discover, or locate threats and/or hazards through active and passive surveillance and search procedures. This may include the use of systematic examinations and assessments, sensor technologies, or physical investigation and intelligence.

Access Control and Identity Verification

  • Mission Area: Protection
  • Description: Apply a broad range of physical, technological, and cyber measures to control admittance to critical locations and systems, limiting access to authorized individuals to carry out legitimate activities.

Cybersecurity

  • Mission Area: Protection
  • Description: Protect against damage to, the unauthorized use of, and/or the exploitation of (and, if needed, the restoration of) electronic communications systems and services (and the information contained therein).

Physical Protective Measures

  • Mission Area: Protection
  • Description: Reduce or mitigate risks, including actions targeted at threats, vulnerabilities, and/or consequences, by controlling movement and protecting borders, critical infrastructure, and the homeland.

Risk Management for Protection Programs and Activities

  • Mission Area: Protection
  • Description: Identify, assess, and prioritize risks to inform Protection activities and investments.

Supply Chain Integrity and Security

  • Mission Area: Protection
  • Description: Strengthen the security and resilience of the supply chain.

Community Resilience

  • Mission Area: Mitigation
  • Description: Lead the integrated effort to recognize, understand, communicate, plan, and address risks so that the community can develop a set of actions to accomplish Mitigation and improve resilience.

Long-term Vulnerability Reduction

  • Mission Area: Mitigation
  • Description: Build and sustain resilient systems, communities, and critical infrastructure and key resources lifelines so as to reduce their vulnerability to natural, technological, and human-caused incidents by lessening the likelihood, severity, and duration of the adverse consequences related to these incidents.

Risk and Disaster Resilience Assessment

  • Mission Area: Mitigation
  • Description: Assess risk and disaster resilience so that decision makers, responders, and community members can take informed action to reduce their entity’s risk and increase their resilience.

Threats and Hazard Identification

  • Mission Area: Mitigation
  • Description: Identify the threats and hazards that occur in the geographic area; determine the frequency and magnitude; and incorporate this into analysis and planning processes so as to clearly understand the needs of a community or entity.

Critical Transportation

  • Mission Area: Response
  • Description: Provide transportation (including infrastructure access and accessible transportation services) for response priority objectives, including the evacuation of people and animals, and the delivery of vital response personnel, equipment, and services into the affected areas.

Environmental Response/Health and Safety

  • Mission Area: Response
  • Description: Ensure the availability of guidance and resources to address all hazards including hazardous materials, acts of terrorism, and natural disasters in support of the responder operations and the affected communities.

Fatality Management Services

  • Mission Area: Response
  • Description: Provide fatality management services, including body recovery and victim identification, working with state and local authorities to provide temporary mortuary solutions, sharing information with mass care services for the purpose of reunifying family members and caregivers with missing persons/remains, and providing counseling to the bereaved.

Infrastructure Systems

  • Mission Area: Response, Recovery
  • Description: Stabilize critical infrastructure functions, minimize health and safety threats, and efficiently restore and revitalize systems and services to support a viable, resilient community.

Mass Care Services

  • Mission Area: Response
  • Description: Provide life-sustaining services to the affected population with a focus on hydration, feeding, and sheltering to those who have the most need, as well as support for reunifying families.

Mass Search and Rescue Operations

  • Mission Area: Response
  • Description: Deliver traditional and atypical search and rescue capabilities, including personnel, services, animals, and assets to survivors in need, with the goal of saving the greatest number of endangered lives in the shortest time possible.

On-scene Security and Protection

  • Mission Area: Response
  • Description: Ensure a safe and secure environment through law enforcement and related security and protection operations for people and communities located within affected areas and also for all traditional and atypical response personnel engaged in lifesaving and life-sustaining operations.

Operational Communications

  • Mission Area: Response
  • Description: Ensure the capacity for timely communications in support of security, situational awareness, and operations by any and all means available, among and between affected communities in the impact area and all response forces.

Public and Private Services and Resources

  • Mission Area: Response
  • Description: Provide essential public and private services and resources to the affected population and surrounding communities, to include emergency power to critical facilities, fuel support for emergency responders, and access to community staples (e.g., grocery stores, pharmacies, and banks) and fire and other first response services.

Public Health and Medical Services

  • Mission Area: Response
  • Description: Provide lifesaving medical treatment via emergency medical services and related operations and avoid additional disease and injury by providing targeted public health and medical support and products to all people in need within the affected area.

Situational Assessment

  • Mission Area: Response
  • Description: Provide all decision makers with decision-relevant information regarding the nature and extent of the hazard, any cascading effects, and the status of the response.

Economic Recovery

  • Mission Area: Recovery
  • Description: Return economic and business activities (including food and agriculture) to a healthy state and develop new business and employment opportunities that result in a sustainable and economically viable community.

Health and Social Services

  • Mission Area: Recovery
  • Description: Restore and improve health and social services networks to promote the resilience, independence, health (including behavioral health), and well-being of the whole community.

Housing

  • Mission Area: Recovery
  • Description: Implement housing solutions that effectively support the needs of the whole community and contribute to its sustainability and resilience.

Natural and Cultural Resources

  • Mission Area: Recovery
  • Description: Protect natural and cultural resources and historic properties through appropriate planning, mitigation, response, and recovery actions to preserve, conserve, rehabilitate, and restore them consistent with post-disaster community priorities and best practices and in compliance with appropriate environmental and historical preservation laws and executive orders.

Presidential Senator Candidates Take Big Lobby $$

Hillary was a Senator and just recently a lobby issue could be a problem given the Transpacific Partnership Pact that is so contentious in the country right now.

Per Lee Fang: While Hillary Clinton has demurred over her position on the controversial Trans-Pacific Partnership trade deal, her campaign has partnered with a pro-TPP law and lobby firm to raise money.

At The Intercept, Lee Fang reports that Clinton’s campaign held a fundraiser in Washington, D.C. on Wednesday with the political action committee of a law firm called McGuireWoods. Lobby registration documents reveal that a subsidiary of the group lobbies on behalf of Smithfield Foods, the world’s largest producer of pork, to pass both the TPP and “fast track”—a special presidential mandate that nearly eliminates Congress’ role in crafting trade legislation.

The fundraiser occurred as Congress rescheduled a vote on fast track, also known as Trade Promotion Authority (TPA).

Fang continues:

Despite mounting pressure to take a position, Clinton has only provided [noncommittal] answers regarding her stance on both TPP and TPA. On Sunday, at a rally in Iowa, Clinton said there should be better protections for American workers and called for the president to work with Democrats in Congress — hardly a clarifying statement. Earlier that day, her chief pollster dismissed a call from ABC News’ George Stephanopoulos to provide a clear stance on TPA, casting the issue as simply “Washington inside baseball.”

For the event in D.C., billed as a “Conversation with John Podesta, Campaign Chair,” the Clinton campaign website said that I could learn the exact location only after RSVPing through a donation. I gave one dollar to find out. Apparently, that wasn’t enough. Instead of providing the address of the fundraiser as the campaign website had said it would, the campaign directed me to a site where I could volunteer.

Lobby money owns Washington DC, of this there is no dispute. The 10 largest lobby operations include the following industries:

The Technology lobby, the Mining lobby, the Defense lobby, the Agriculture lobby, Big Oil lobby, the Financial lobby, the Big Pharma lobby, the AARP lobby, the Pro-Israel lobby and the National Rifle Association lobby. The primer of these lobby groups is found here.

So what Senators that are running for president are on some lobby dollar hooks?

From Open Secrets:

Three of five senators running for WH have big backing from lobbyists

Three of the five U.S. senators running for president have made super-fans out of a few K Street lobbyists, an analysis of campaign finance data by OpenSecrets Blog shows.

Republican Sens. Marco Rubio (R-Fla.), Ted Cruz (R-Texas) and Lindsey Graham (R-S.C.) have each raised hundreds of thousands of dollars from current or one-time federal lobbyists throughout their careers, the analysis shows. Sen. Rand Paul (R-Ky.) has raised $82,050 from the same pool and Sen. Bernie Sanders‘ (D-Vt.) total fundraising haul from lobbyists stands at an even more paltry $50,075.

Neither Sanders nor Paul have hidden their disdain for lobbyists, so there’s some logic to their low fundraising totals from those in the profession. Both candidates, in their announcement speeches, railed against those who want to influence politics with money — Sanders referred to “billionaires…and their lobbyists,” Paul called them “special interests” — and struck similar tones.

“Both [Paul and Sanders] have publicly decried the influence of corporations in American public life,” Joshua Rosenstein, a Washington, D.C.-based lawyer and expert on lobbying, said. “If you are a corporation, is it possible that you view each of them as relative lost cause? Sure.”

For some candidates, it’s not bad politics to keep K Street at arm’s length. In 2008 and 2012, Barack Obama pledged not to accept donations from lobbyists and refunded money to those who did contribute. After taking office, he barred federally registered lobbyists from joining advisory boards in his administration, before partially rolling back that ban last year.

But no 2016 hopeful has followed that lead, as the Wall Street Journal reports. And setting Paul and Sanders aside, the other senators running for president have already wooed a handful of lobbyists with deep pockets and a willingness to give to anyone who might help their clients.

In all, Graham has taken in $753,841 during his congressional career from current or one-time federally registered lobbyists who contributed more than $200 to him. Rubio and Cruz have received $571,952 and $265,043 from the same group, respectively. Those sums include donations to the senators’ campaign committees and leadership PACs.

Rubio, Cruz and Graham each have at least one lobbyist donor who, along with their spouses in some cases, has given in excess of $20,000 to the candidate’s campaign and PAC. Rubio has Ignacio Sanchez, a presidential bundler for Mitt Romney in 2012 from the firm DLA Piper; he represents Al Jazeera Satellite Network and Diageo PLC. Cruz has lobbying revolver Charles Cooper of Cooper & Kirk and his wife, Debra.

Graham, a senator since 2003, has enjoyed financial support from current or former lobbyists longer than his GOP Senate colleagues running for president. William H. Skipper, Jr. of the American Business Development Group, Reed Scott of Chesapeake Enterprises and his wife, and presidential bundler Van D. Hipp of American Defense International and his wife, have each given Graham more than $20,000 over the years.

The most Paul has received from any one lobbyist barely tops $6,000; that came from Charles Grizzle of Grizzle Co., who currently represents several Kentucky-based clients like the University of Louisville and the Louisville Regional Airport Authority. Sanders topped out at $3,000 from Nancy Zirkin of the Leadership Conference on Civil Rights and her husband.

The data analysis only covered sitting U.S. senators. Other presidential candidates or potential candidates who have served in federal office, like former Sen. Hillary Clinton (D-N.Y.) and one-time House member, now governor, John Kasich (R-Ohio), haven’t run a Senate or House campaign in some time. And for former governors like Rick Perry and Jeb Bush, state data on which of their donors were lobbyists isn’t available. Fundraising reports for candidates’ presidential campaigns won’t be available till mid-July, and the super PACs backing them don’t have to report until the end of that month.

Still, it’s clear that the non-Senate candidates also have their eyes on K Street money. Clinton has already reached out to prominent lobbyists on her side of the aisle, while Jeb Bush started seeking commitments from Washington allies even earlier this year. Lobbyists are reportedly starting to line up behind him.

Despite that fact that making contributions may be good for business, Rosenstein noted, many lobbyists also donate for ideological reasons.

“While they certainly have to be pragmatists about what they’re doing…and that certainly drives some of the giving,” he said, “there might very well be an equal or greater ideological segment of the lobbying community that aren’t driven by pragmatic reasons,” Rosenstein said.

 

Obama has Synchronized Iran’s Nuclear Program

Consider the stated position of the Supreme leader of Iran:

Reuters and AFP – Iran’s Supreme Leader Ayatollah Ali Khamenei has stated his country’s red lines for a nuclear deal with six world powers.

“Freezing Iran’s research and development for a long time like 10 or 12 years is not acceptable,” Khamenei said in a speech broadcast live on June 23.

Khamenei, who has the final say for Iran on any deal, added that all financial and economic sanctions “should be lifted immediately” if an agreement is signed.

Britain, France, Germany, China, Russia, and the United States want Tehran to commit to a verifiable halt of at least 10 years on sensitive nuclear development work as part of a deal they aim to reach by a June 30 deadline. In exchange, they are offering relief from economic sanctions.

Khamenei reiterated that Iran would not give international inspectors access to its military sites and accused the United States of wanting to destroy Iran’s nuclear industry.

The six powers want limits on Tehran’s programs that could have a military use.

Tehran denies it is pursuing nuclear weapons.

***

When the NYT finally prints an explosive fantasy piece on what the White House and John Kerry at the State Department are doing with Iran, one needs to take notice. The New York Times calls this Iran agreement a ‘fatal flaw’.

The Iran Deal’s Fatal Flaw

PRESIDENT OBAMA’S main pitch for the pending nuclear deal with Iran is that it would extend the “breakout time” necessary for Iran to produce enough enriched uranium for a nuclear weapon. In a recent interview with NPR, he said that the current breakout time is “about two to three months by our intelligence estimates.” By contrast, he claimed, the pending deal would shrink Iran’s nuclear program, so that if Iran later “decided to break the deal, kick out all the inspectors, break the seals and go for a bomb, we’d have over a year to respond.”

Unfortunately, that claim is false, as can be demonstrated with basic science and math.  Most important, in the event of an overt attempt by Iran to build a bomb, Mr. Obama’s argument assumes that Iran would employ only the 5,060 centrifuges that the deal would allow for uranium enrichment, not the roughly 14,000 additional centrifuges that Iran would be permitted to keep mainly for spare parts. Such an assumption is laughable. In a real-world breakout, Iran would race, not crawl, to the bomb.  Iran stands to gain enormously. The deal would lift nuclear-related sanctions, thereby infusing Iran’s economy with billions of dollars annually. In addition, the deal could release frozen Iranian assets, reportedly giving Tehran a $30 billion to $50 billion “signing bonus.”

Showering Iran with rewards for making illusory concessions poses grave risks. It would entrench the ruling mullahs, who could claim credit for Iran’s economic resurgence. The extra resources would also enable Iran to amplify the havoc it is fostering in neighboring countries like Iraq, Syria, Lebanon and Yemen.

Worst of all, lifting sanctions would facilitate a huge expansion of Iran’s nuclear program. Ayatollah Ali Khamenei, Iran’s supreme leader, says that he wants 190,000 centrifuges eventually, or 10 times the current amount, as would appear to be permissible under the deal after just 10 years. Such enormous enrichment capacity would shrink the breakout time to mere days, so that Iran could produce enough weapons-grade uranium for a bomb before we even knew it was trying — thus eliminating any hope of our taking preventive action.

Nothing in the pending deal is worth such risks. Read the full article in context here.

*** But is getting worse as new documents demonstrate.

Reported by Fox News via Associated Press:

The United States and its allies are willing to offer Iran state-of-the-art nuclear equipment if Tehran agrees to pare down its atomic weapons program as part of a final nuclear agreement, a draft document has revealed.

The confidential paper, obtained by the Associated Press, has dozens of bracketed text where disagreements remain. Technical cooperation is the least controversial issue at the talks, and the number of brackets suggest the sides have a ways to go, not only on that topic but also more contentious disputes, with less than a week until the June 30 deadline for a deal.

However, the scope of the help now being offered in the draft may displease U.S. congressional critics who already argue that Washington has offered too many concessions at the negotiations.

The draft, titled “Civil Nuclear Cooperation,” promises to supply Iran with light-water nuclear reactors instead of its nearly completed heavy-water facility at Arak, which would produce enough plutonium for several bombs a year if completed as planned. The full details are here.

Civil Nuclear Cooperation platform is not new.

Chilling are the following facts:

Russia and Saudi Arabia have signed a nuclear cooperation agreement. The U.S. has done the same with Korea. Then comes Pakistan learning from U.S. and India where pacts could lead to even more proliferation globally.

For a more detailed summary of the Nuclear Cooperation agreements, take a look at a surface review on equipment, supply and banks in the matter of Korea.

 

Cyber Conflict, Chaos and Calamity

There have been several Congressional hearings on cyber-terrorism, yet with such an emergency and threat, no solution is forthcoming.

From AEI: “America’s intelligence leaders have made clear the biggest threat today is cyber and counterintelligence. Who are the largest perpetrators of these types of attacks? The intelligence report singles out Russia and China as first examples. These nations have “highly sophisticated cyber programs” and are regularly conducting “politically motivated” attacks. What are they up to exactly? Countries such as China are “reconnoitering and developing access to US critical infrastructure systems, which might be quickly exploited for disruption if an adversary’s intent became hostile.” Back in 2013, Verizon released a report detailing Chinese hackers lurking around inside American industrial control systems—the cyber equivalent to casing a robbery target. In 2014 alone, the FBI investigated a likely Russian hacking campaign against American banking backbone JP Morgan, while two cybersecurity firms blamed Iran for a major campaign against US critical infrastructure like major airliners, medical universities, and energy companies. As the year ended, the US government publicly accused North Korea of a devastating cyberattack against Sony.”

When of Office of National Intelligence produced a report, the first chapter is on cyber threats.

“Risk. Despite ever-improving network defenses, the diverse possibilities for remote hacking intrusions, supply chain operations to insert compromised hardware or software, and malevolent activities by human insiders will hold nearly all ICT systems at risk for years to come. In short, the cyber threat cannot be eliminated; rather, cyber risk must be managed. Moreover, the risk calculus employed by some private sector entities does not adequately account for foreign cyber threats or the systemic interdependencies between different critical infrastructure sectors.

Costs. During 2014, we saw an increase in the scale and scope of reporting on malevolent cyber activity that can be measured by the amount of corporate data stolen or deleted, personally identifiable information (PII) compromised, or remediation costs incurred by US victims. “

The stakes are higher than anyone will admit, most of all the White House. The Office of Personnel Management hack of personnel files now appears to exceed 18 million individuals. “FBI Director James Comey gave the 18 million estimate in a closed-door briefing to Senators in recent weeks, using the OPM’s own internal data, according to U.S. officials briefed on the matter. Those affected could include people who applied for government jobs, but never actually ended up working for the government.”

Just announced as a possible additional agency falling victim to hacking is the National Archives and Records Administration (NARA). What is chilling about this probability is all government reports, records and communications are by law to be maintained by NARA., even classified material.

EXCLUSIVE: Signs of OPM Hack Turn Up at Another Federal Agency

The National Archives and Records Administration recently detected unauthorized activity on three desktops indicative of the same hack that extracted sensitive details on millions of current and former federal employees, government officials said Monday. The revelation suggests the breadth of one of the most damaging cyber assaults known is wider than officials have disclosed.

The National Archives’ own intrusion-prevention technology successfully spotted the so-called indicators of compromise during a scan this spring, said a source involved in the investigation, who was not authorized to speak publicly about the incident. The discovery was made soon after the Department of Homeland Security’s U.S. Computer Emergency Readiness Team published signs of the wider attack — which targeted the Office of Personnel Management — to look for at agencies, according to NARA.

It is unclear when NARA computers were breached. Suspected Chinese-sponsored cyberspies reportedly had been inside OPM’s networks for a year before the agency discovered what happened in April. Subsequently, the government uncovered a related attack against OPM that mined biographical information on individuals who have filed background investigation forms to access classified secrets.

The National Archives has found no evidence intruders obtained “administrative access,” or took control, of systems, but files were found in places they did not belong, the investigator said.

NARA “systems” and “applications” were not compromised, National Archives spokeswoman Laura Diachenko emphasized to Nextgov,  “but we detected IOCs,” indicators of compromise, “on three workstations, which were cleaned and re-imaged,” or reinstalled.

“Other files found seemed to be legitimate,” such as those from a Microsoft website, she said. “We have requested further guidance from US-CERT on how to deal with these” and are still awaiting guidance on how to proceed.

It will take additional forensics assessments to determine whether attackers ever “owned” the National Archives computers, the investigator said.

Diachenko said, “Continued analysis with our monitoring and forensic tools has not detected any activity associated with a hack,” including alerts from the latest version of a governmentwide network-monitoring tool called EINSTEIN 3A.

EINSTEIN, like NARA’s own intrusion-prevention tool, is now configured to detect the tell-tale signs of the OPM attack.

“OPM isn’t the only agency getting probed by this group,” said John Prisco, president of security provider Triumphant, the company that developed the National Archives’ tool. “It could be happening in lots of other agencies.”

Prisco said he learned of the incident at a security industry conference June 9, from an agency official the company has worked with for years.

“They told us that they were really happy because we stopped the OPM attack in their agency,” Prisco said.

The malicious operation tries to open up ports to the Internet, so it can excise information, Prisco said.

“It’s doing exploration work laterally throughout the network and then it’s looking for a way to communicate what it finds back to its server,” he added.

Homeland Security officials on Monday would not confirm or deny the situation at the National Archives. DHS spokesman S.Y. Lee referred to the department’s earlier statement about the OPM hack: “DHS has shared information regarding the potential incident with all federal chief information officers to ensure that all agencies have the knowledge they need to defend against this cybersecurity incident.”

The assault on OPM represents the seventh raid on national security-sensitive or federal personnel information over the past year.

Well-funded hackers penetrated systems at the State Department, the White House, U.S. Postal Service and, previously in March 2014, OPM. Intruders also broke into networks twice at KeyPoint Government Solutions, an OPM background check provider, and once at USIS, which conducted most of OPM’s employee investigations until last summer.

On Wednesday, the House Oversight and Government Reform Committee is scheduled to hold a hearing on the OPM incident that, among other things, will examine the possibility that hackers got into the agency’s systems by using details taken from the contractors.

Sunlight Exposing the Cockroaches like Gruber

‘When Gruber was called before Congress to explain his remarks and his role in the health care law this past year, Gruber claimed he was not really an architect and that he wasn’t “an expert on politics and my tone implied that I was.”‘

From Forbes:

Gruber, the Obamacare architect

Gruber was no independent expert. The Obama administration paid him nearly $400,000 as a consultant on Obamacare’s design, especially its new layer of federal health insurance regulation. But Gruber tried to avoid disclosing this conflict in his public commentary and appearances. Democratic officials did as well, in order to maintain the pose that Gruber’s opinions were non-partisan. Indeed, when Sen. Mike Enzi (R., Wyo.) specifically asked the U.S. Department of Health and Human Services for a list of all its paid consultants, Gruber’s name was mysteriously omitted.

From the Wall Street Journal: MIT economist Jonathan Gruber, who claimed the authors of ObamaCare took advantage of what he called the “stupidity of the American voter,” played a much bigger role in the law’s drafting than previously acknowledged, according to a published report.

The Wall Street Journal, citing 20,000 pages of emails sent by Gruber between January 2009 and March 2010, reported Sunday that Gruber was frequently consulted by staffers and advisers for both the White House and the Department of Health and Human Services (HHS) about the Affordable Care Act. Among the topics that Gruber discusses in the emails are media interviews, consultations with lawmakers, and even how to publicly describe his role.

The emails were released as the Supreme Court prepares to rule on the legality of federal health insurance exchange subsidies.

The Journal reports that the officials Gruber contacted by e-mail included Peter Orszag, then the director of the Office of Management and Budget (OMB); Jason Furman, an economic adviser to the president; and Ezekiel Emanuel, then a special adviser for health policy at OMB.

“His proximity to HHS and the White House was a whole lot tighter than they admitted,” Rep. Jason Chaffetz, R- Utah, chairman of the House oversight committee, told the Journal. “There’s no doubt he was a much more integral part of this than they’ve said. He put up this facade he was an arm’s length away. It was a farce.”

“As has been previously reported, Mr. Gruber was a widely used economic modeler for administrations and state governments run by both parties—both before and after the Affordable Care Act was passed,” HHS spokeswoman Meaghan Smith told the Journal in a statement. “These emails only echo old news.”

Gruber became the center of a political storm in November 2014, when a video surfaced of him taking part in a 2013 panel discussion about ObamaCare. At one point, Gruber said the Obama administration wrote the bill “in a tortured way to make sure [the Congressional Budget Office] did not score the mandate as taxes. If CBO scored the mandate as taxes, the bill dies … Lack of transparency is a huge political advantage. And basically, call it the stupidity of the American voter or whatever, but basically that was really, really critical for the thing to pass.”

At the time of the controversy, President Obama referred to Gruber as “some adviser who never worked on our staff.” However, the Journal reports that Gruber’s emails appear to reference at least one meeting with Obama. Furthermore, one email from Jeanne Lambrew, a top Obama health adviser, thanks Gruber for “being an integral part of getting us to this historic moment”, while another message from Lambrew refers to Gruber as “our hero.”

Fox News previously reported that HHS retained Gruber in March 2009 on a $95,000 contract to produce “a series of technical memoranda on the estimated changes in health insurance coverage and associated costs and impacts to the government under alternative specifications of health system reform.” A second contract with HHS three months later saw Gruber receive an additional $297,600.

Gruber later apologized for his comments in a December 2014 hearing before the House Oversight Committee, calling the remarks “mean and insulting.”