About this Security Clearance Mess

  1. There are many levels to having security clearance.
  2. Having clearance does not automatically grant access to classified information as a result of position, rank or title.
  3. Having any level of security clearance also includes a required signature to a non-disclosure agreement.
  4. Based on information, job duty or other stipulations, clearance has limitation including a ‘need to know’ basis.
  5. Clearance can be and is in many cases a temporary condition for people in and outside of government.
  6. Former DNI, James Clapper made the last and most recent modifications to security clearance access in January of 2017 at the behest of former President Obama. It is 27 pages and can be read here.
  7. All people with any type or level of security clearance includes ‘public trust’.
  8. There is an outside/contracted agency that performs the investigation of personnel applying for clearance.

Security Clearance Process Infographic - ClearanceJobs

Eligibility for access to classified information, commonly known as a security clearance, is granted only to those for whom an appropriate personnel security background investigation has been completed. It must be determined that the individual’s personal and professional history indicates loyalty to the United States, strength of character, trustworthiness, honesty, reliability, discretion, and sound judgment, as well as freedom from conflicting allegiances and potential for coercion, and a willingness and ability to abide by regulations governing the use, handling, and protection of classified information. A determination of eligibility for access to such information is a discretionary security decision based on judgments by appropriately trained adjudicative personnel. Eligibility will be granted only where facts and circumstances indicate access to classified information is clearly consistent with the national security interests of the United States. Access to classified information will be terminated when an individual no longer has need for access.

Security clearances are subject to periodic re-investigation every 5 years. The individual will submit an updated security package and another background investigation will be conducted. The investigation will again cover key aspects of the individual’s life, but will start from one’s previous background investigation.

***

Meanwhile, there are now an estimated 177 signatures on the list rebuking President Trump’s removal of former CIA Director John Brennan.

Was Admiral McRaven a hack with his response? Yuppers.   Watch the interview here.

U.S. is on the Offensive, Espionage and Cyber

In the last few weeks, there was the Aspen Security Forum, a 3 day event. Then there was a DNI report. Then came 2 separate nationwide conference calls hosted by CERT, the cyber division of DHS.

A remarkable White House press briefing included the heads of intelligence agencies explaining the condition of cyber/espionage and the countermeasures against Russia.

Then there is the military side, a division frankly not well known, the Defense Security Services.

 

See the whole 2 page release here.

 

 

 

 

 

 

 

 

 

 

And there is more:

FBI Releases Article on Securing the Internet of Things

The Federal Bureau of Investigation (FBI) has released an article on the risks associated with internet-connected devices, commonly referred to as the Internet of Things (IoT). FBI warns that cyber threat actors can use unsecured IoT devices as proxies to anonymously pursue malicious cyber activities.

As our reliance on IoT becomes an important part of everyday life, being aware of the associated risks is a key part of keeping your information and devices secure. NCCIC encourages users and administrators to review the FBI article for more information and refer to the NCCIC Tip Securing the Internet of Things.

*** IOT?

The internet of things, at its simplest level, is a network of smart devices – from refrigerators that warn you when you’re out of milk to industrial sensors – that are connected to the internet so they can share data, but IoT is far from a simple challenge for IT departments.

Related reading: Five IoT Predictions For 2019

For many companies, it represents a vast influx of new devices, many of which are difficult to secure and manage. It’s comparable to the advent of BYOD, except the new gizmos are potentially more difficult to secure, aren’t all running one of three or four basic operating systems, and there are already more of them.

A lot more, in fact – IDC research says that there are around 13 billion connected devices in use worldwide already, and that that number could expand to 30 billion within the next three years. (There were less than 4 billion smartphone subscriptions active around the world in Ericsson’s most recent Mobility Report.)

With a huge number of companies “doing IoT” – most big-name tech companies, including Google, Microsoft, Apple, Cisco, Intel, and IBM have various types of IoT play – all working to bring as many users as possible into their respective ecosystems, motivation to make sure IoT systems and devices from different companies all work with each other is sometimes lacking.

Internet of Things photo

The problem, of course, is that nobody’s willing to give up on the idea of their own ecosystem becoming a widely accepted standard – think of the benefits to the company whose system wins out! – and so the biggest players in the space focus on their own systems and development of more open technologies lags behind. More here.

The Military Spooling of Countries Due to N. Korea

At present, there are 8 B-1B bombers at the Andersen AFB, Guam (6 from Dyess AFB). This includes in theater 192 conventional 1,200-km range JASSM-ER cruise missiles for as many aim points. In addition deployed are Tomahawk SLCMs on ships, SSNs, SSGNs.

At the UN, Nikki Haley said that China must now condemn North Korea for its repeated missile tests.

“China must decide whether it is finally willing to take this vital step,” she said.

“The time for talk is over. The danger the North Korean regime poses to international peace is now clear to all.”

Earlier on Saturday the US flew two supersonic bombers over the Korean Peninsula.

The B-1 bombers were escorted by South Korean fighter jets as they performed a low-pass over an air base near the South Korean capital of Seoul before returning to Andersen Air Force Base in Guam.

Admiral Scott Swift of the Pacific fleets says he would launch a nuclear attack if ordered to do so.

Meanwhile: U.S.-South Korea Conduct Training in Response to North Korean Missile Launch

Eighth Army Public Affairs

HUMPHREYS GARRISON, Pyeongtaek, South Korea, July 28, 2017 — U.S. Eighth Army and South Korean army personnel today conducted a second combined training event to exercise assets in view of today’s North Korea’s intercontinental ballistic missile launch, Eighth Army officials here announced today.

This exercise once again utilized the Army Tactical Missile System and South Korea’s Hyunmoo Missile II, which fired missiles into territorial waters of South Korea along the country’s eastern coast July 5.

The ATACMS can be rapidly deployed and engaged and provides deep-strike precision capability, enabling the U.S.-South Korean alliance to engage a full array of time-critical targets under all weather conditions.

We must also be watching China. Just in the last few days, they too have been spooling for military conflict. It was reported on July 25th that China displayed a Dongfeng 31 AG ICBM.
It is scheduled that one more operational test launch of an AFGSC Minuteman III IBM is slated for Aug. 2 – Aug. 4 from Vandenberg AFB.

WASHINGTON, July 30, 2017 — The Missile Defense Agency and soldiers of the 11th Air Defense Artillery Brigade from Fort Bliss, Texas, conducted a successful missile defense test today using the Terminal High Altitude Area Defense system, according to a Missile Defense Agency news release.

A medium-range target ballistic missile was air-launched by an Air Force C-17 Globemaster III over the Pacific Ocean. The THAAD weapon system, located at Pacific Spaceport Complex Alaska in Kodiak, detected, tracked and intercepted the target.

The test, designated Flight Experiment THAAD (FET)-01, was conducted to gather threat data from a THAAD interceptor in flight, the release said.

“In addition to successfully intercepting the target, the data collected will allow MDA to enhance the THAAD weapon system, our modeling and simulation capabilities, and our ability to stay ahead of the evolving threat,” said Air Force Lt. Gen. Sam Greaves, Missile Defense Agency director.

Soldiers from the 11th Air Defense Artillery Brigade conducted launcher, fire control and radar operations using the same procedures they would use in an actual combat scenario.  Soldiers operating the equipment were not aware of the actual target launch time, the release said.

15th Successful Intercept

This was the 15th successful intercept in 15 tests for the THAAD weapon system.

The THAAD element provides a globally-transportable, rapidly-deployable capability to intercept ballistic missiles inside or outside the atmosphere during their final, or terminal, phase of flight. THAAD is strictly a defensive weapon system. The system uses hit-to-kill technology where kinetic energy destroys the incoming target, according to the release.

The mission of the Missile Defense Agency is to develop and deploy a layered ballistic missile defense system to defend the United States, its deployed forces, allies and friends from ballistic missile attacks of all ranges in all phases of flight, the release said.

***

Additionally, the U.S. Delivered Two C-208B Aircraft to Philippine Air Force. They are ntelligence, surveillance and reconnaissance aircraft. The delivery of the aircraft is part of a $33 million package through the U.S. National Defense Authorization Act Building Partnership Capacity Program to provide equipment and training to improve Philippine counterterrorism response capability. The Philippines has been fighting for months a terror group known as Abu Sayyaf.

6 Americans Among Hostages in Mali al Qaeda Attack

On Friday, a group of local terrorists stormed the Radisson Blu hotel in Bamako, Mali, taking 170 hostages and up to 3 are dead. Some hostages have been released if they could recite verses of the Koran. U.S. military personnel is assisting as they were already in the region doing training. The U.S. State Department has confirmed there are 6 Americans as part of the hostages. The UN was also holding an event at the hotel.

The group of attackers is known as the Macina Liberation Front, an operating wing of Boko Haram, another operating wing of al Qaeda. Some of the attackers spent the night at the hotel while others stormed the building with grenades and gunfire.

Meanwhile, when the world and especially looks to Barack Obama for answers, solutions, missions and strategies, only blank stares are the result. Obama has retreated completely from global conflicts and national security to focus on social justice agendas. He  attends only 40% of presidential daily briefings known as PDN’s. The Pentagon and the intelligence apparatus is disgusted with the commander in chief. The safety of America and other allied nations is damned to some doom over Obama’s lack of will, knowledge or involvement.

Breitbart:

A new Government Accountability Institute (GAI) report reveals that President Barack Obama has attended only 42.1% of his daily intelligence briefings (known officially as the Presidential Daily Brief, or PDB) in the 2,079 days of his presidency through September 29, 2014.
The GAI report also included a breakdown of Obama’s PDB attendance record between terms; he attended 42.4% of his PDBs in his first term and 41.3% in his second.

The GAI’s alarming findings come on the heels of Obama’s 60 Minutes comments on Sunday, wherein the president laid the blame for the Islamic State’s (ISIS) rapid rise squarely at the feet of his Director of National Intelligence James Clapper.

“I think our head of the intelligence community, Jim Clapper, has acknowledged that I think they underestimated what had been taking place in Syria,” said Obama.

According to Daily Beast reporter Eli Lake, members of the Defense establishment were “flabbergasted” by Obama’s attempt to shift blame.

“Either the president doesn’t read the intelligence he’s getting or he’s bullshitting,” a former senior Pentagon official “who worked closely on the threat posed by Sunni jihadists in Syria and Iraq” told the Daily Beast.

On Monday, others in the intelligence community similarly blasted Obama and said he’s shown longstanding disinterest in receiving live, in-person PDBs that allow the Commander-in-Chief the chance for critical followup, feedback, questions, and the challenging of flawed intelligence assumptions.

“It’s pretty well-known that the president hasn’t taken in-person intelligence briefings with any regularity since the early days of 2009,” an Obama national security staffer told the Daily Mail on Monday. “He gets them in writing.”

The Obama security staffer said the president’s PDBs have contained detailed threat warnings about the Islamic State dating back to before the 2012 presidential election.

“Unless someone very senior has been shredding the president’s daily briefings and telling him that the dog ate them, highly accurate predictions about ISIL have been showing up in the Oval Office since before the 2012 election,” the Obama security staffer told the Daily Mail.

This is not the first time questions have been raised about Obama’s lack of engagement and interest in receiving in-person daily intelligence briefings. On September 10, 2012, the GAI released a similar report showing that Obama had attended less than half (43.8%) of his daily intelligence briefings up to that point. When Washington Post columnist Marc Thiessen mentioned the GAI’s findings in his column, then-White House Press Secretary Jay Carney dubbed the findings “hilarious.” The very next day, U.S. Libyan Ambassador Chris Stevens and three American staff members were murdered in Benghazi. As Breitbart News reported at the time, the White House’s very own presidential calendar revealed Obama had not received his daily intel briefing in the five consecutive days leading up to the Benghazi attacks.

Ultimately, as ABC News reported, the White House did not directly dispute the GAI’s numbers but instead said Obama prefers to read his PDB on his iPad instead of receiving the all-important live, in-person briefings.

Now, with ISIS controlling over 35,000 square miles of territory in its widening caliphate in Iraq and Syria, and with Obama pointing fingers at his own Director of National Intelligence James Clapper for the rise of ISIS, the question remains whether a 42% attendance record on daily intelligence briefings is good enough for most Americans.

Raised Level to ForceCon Bravo Failed Chattanooga

U.S. Northern Command Admiral William Gortney ordered the increase of the force protection condition in the United States to FPCON Bravo in May of 2015.

This order was to increase security given recent threats from Islamic State when they posted the names and photos of former and active military personnel on the internet.

Additionally, this came on the heels of the Garland, Texas shooting coupled with the aggressive and correct statements from FBI Director James Comey where all 50 states had open investigations on terror plots.

Over the July 4th Independence Day weekend, the FBI made several arrests of which the details on those cases have not been fully released.

It should be noted there has been a calculated mistake made by the Obama administration in cadence with the Pentagon to train Islamists and to have them embed with our forces where often the results have been deadly, most notably the deaths of Seal Team 6 members in Extortion 17.

The enemy has embedded with our forces and the psychology of our troops has been to accept this dangerous condition where if for nothing else the Green on Blue attacks occur all too often.

When it comes to attacks on any of our military bases anywhere in the world, the security trip wires for protection is wrapped in political correctness and includes our diplomatic posts which lead to the cause of death in locations such as Benghazi. A suicide attack in the first week of July killed 33 in Khost, Afghanistan at a NATO base.

It was only a few weeks ago that a potentially deadly decision was made that former U.S. bases in Iraq would come out of mothballs and re-open on a measured schedule, when one base in particular, Taqqadum is now staffed with both Iranian militia and U.S. forces. How deadly stupid is that?

The matter of feeble security and the decisions to keep a LIGHT FOOTPRINT  has been a well argued issue going back to 2011 where serious testimony and factual events were listed for both at home and abroad.

It is important to take a look back. It puts things in real perspective given the ‘Allah’ event in Chattanooga that took the treasured lives of 4 Marines.

It must also be noted and beyond dispute, there is NO such thing as a ‘lone wolf’, that is merely a poll tested phrase to not offend any enemy. Any wolf is led by a pack leader after an effective propaganda war creed launched.

December 2011, the document report and testimony to Congress

Homegrown Terrorism: The Threat To Military Communities Inside The United States

At least 33 threats, plots and strikes against U.S. military communities since 9/11 have been part of a surge of homegrown terrorism which Attorney General Eric Holder has said “keeps me up at night.” After Al Qaeda leader Osama Bin Laden was killed May 1, the Department of Homeland Security, Federal Bureau of Investigation and Defense Intelligence Agency warned thousands of U.S. law enforcement and security agencies about possible retaliatory attacks by Al Qaeda, its allies or unaffiliated homegrown terrorists on our military. Weeks after the Pakistan raid, two radicalized U.S. citizens allegedly plotted to attack military personnel in Seattle.

The Majority Staff of the House Committee on Homeland Security has been conducting an investigation, which finds that 70% of the plots against military targets occurred since mid-2009 – including the two successful homeland attacks since 9/11. Other key findings:

 More than five terror plots have been disrupted involving U.S. military insiders in the past decade and at least 11 or more cases involved veterans or those who attempted to join law enforcement and intelligence agencies. The likelihood of another deadly attack by a trusted insider is a severe and emerging threat, which the Pentagon is aggressively investigating to identify perpetrators;

 Two successful attacks against the military outside of Afghanistan and Iraq were perpetrated by radicalized soldiers assigned to U.S.-based Army units: at Camp Pennsylvania in Kuwait in 2003 and at Fort Hood, Texas, in 2009;

 At least 16 external terror plots targeting military personnel stationed inside the U.S. Homeland have been disrupted or investigated;

 At least nine other external plots were thwarted involving U.S. Persons in the homeland who traveled or planned trips overseas to kill G.I.s in Afghanistan, Iraq and elsewhere;

 A growing number of terrorist threats are directed at families of military personnel. Particularly at risk are relatives of troops in units involved in counterterror operations.

For the full 14 page report that includes names and locations up to 2011, click here.