POPULARITY
Alas, now an ancient prophesy has been fulfilled… Telemus said all these things would come to pass someday. — Homer's Odyssey During this episode, the Honorable Dr. Mike Vickers provides his thoughts on a wide range of strategic issues--all of which have connections with the information environment. Mike makes the case that America is like the cyclops in Homer's epic poem, The Odyssey. Like the cyclops, the United States is being blinded and deceived by clever adversaries. Mike also discusses China, India, Estonian technology implementation, the authoritarian-democracy trade off, and international relations theory. He also gives a nuanced examination regarding "whole-of-nation" sloganeering. On one hand, Mike discourages simple phrases that might promote inadequate solutions; on the other, he does agree that we are at a point where we need to cohere around a national strategy and direct our instruments of power productively--including our citizenry. Resources: Cognitive Crucible Podcast Episodes Mentioned #53 Watts on Domestic Extremism Three Dangerous Men: Russia, China, Iran and the Rise of Irregular Warfare by Seth Jones Telemus Group In-Q-Tel Applied Research Lab for Intelligence and Security (ARLIS) Link to full show notes and resources https://information-professionals.org/episode/cognitive-crucible-episode-63 Guest Bio: Dr. Michael G. Vickers is career as a special operator, CIA operations officer, national security policy maker and Intelligence Community leader spanned the last two decades of the Cold War through a decade and a half of our war with al-Qa'ida, its allies and its offshoots – service that saw unprecedented senior tenure across Republican and Democratic administrations. Most recently, from 2011 to 2015, Dr. Vickers served as the Under Secretary of Defense for Intelligence, exercising authority, direction and control over the National Security Agency, Defense Intelligence Agency, National Geospatial-Intelligence Agency, National Reconnaissance Office, Defense Security Service, and the intelligence components of the Military Services and Combatant Commands. As the USD(I), he conceived and led a comprehensive transformation of defense intelligence capabilities, encompassing the signals intelligence system and overhead space architecture, penetrating and persistent remotely piloted aircraft, the Department's strategic human intelligence posture, its corps of all-source analysts, and its cyber operations forces. From 2007 to 2011, he served as the first and only Assistant Secretary of Defense for Special Operations, Low-Intensity Conflict and Interdependent Capabilities. As the ASD SO/LIC&IC, Dr. Vickers was the “Service” Secretary for all Special Operations Forces, and had policy oversight of all of DoD's operational capabilities – strategic forces (nuclear forces, missile defense, space, cyber), conventional force transformation (air, ground and maritime), and Special Operations Forces. He conceived and led the largest expansion of Special Operations Forces in our nation's history, and oversaw several other major capability investments ranging from next generation long-range strike to undersea warfare to deter future great power war. Throughout his nearly decade-long service as a national security policy maker and Intelligence Community leader, Dr. Vickers was heavily involved in operations. He was a key operational strategist for the campaign to dismantle and defeat core al-Qa'ida, and played a major policy and planning role in the operation that killed Usama bin Ladin. He oversaw counterterrorism operations in multiple countries and a wide range of other operations, from the surge of forces in Afghanistan to sensitive intelligence collection operations, paramilitary support to opposition forces battling despotic regimes, operations against rogue state nuclear weapons and missile programs, and operations against drug cartels. During the nearly decade and a half that spanned the operational phase of his career, he served as a Special Forces weapons and engineer sergeant, as the commander of a classified counterterrorism unit, and as CIA operations officer. As a Special Forces solider and officer, he was trained to parachute behind Soviet lines with a “backpack” nuclear weapon, and led hostage rescue operations and sensitive intelligence collection operations. As a CIA officer, he played key roles in the invasion of Grenada, the US government's operational response to the Beirut bombings, and the covert effort to drive the Red Army out of Afghanistan. As the principal strategist for the multi-billion dollar Afghanistan covert action program – the largest and most successful covert action program in CIA's history – Dr. Vickers developed the winning strategy when very few thought it was possible to win. His contributions to the first war the Red Army had ever lost and US victory in the Cold War were chronicled in the film and New York Times best seller, Charlie Wilson's War. Dr. Vickers has received the nation's highest awards in the fields of intelligence and defense, including the Presidential National Security Medal and the OSS Society's William J. Donovan Award. He holds a Ph.D. from Johns Hopkins University, an MBA from the Wharton School of the University of Pennsylvania, and a B.A. from the University of Alabama. He has written a memoir of his career, to be published by Knopf Penguin Random House in 2022. He currently serves as an Executive Vice President at In-Q-Tel, a Principal with the Telemus Group, a senior advisor to the Boston Consulting Group, a senior fellow at Johns Hopkins School of Advanced International Studies and on several corporate, non-profit and government boards. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
The Defense Counterintelligence and Security Agency is just about a year old. The Defense Security Service and the National Background Investigations Bureau merged into one agency last October. And DCSA has gotten bigger since then. It took over some key IT systems and absorbed a few other Defense Department entities a month ago - all while the pandemic has slightly shifted the way DCSA handles background investigations during a pandemic. Federal News Network's Nicole Ogrysko joined Federal Drive with Tom Temin to explain.
The security clearance process is coming back to the Defense Department and the Pentagon made big moves this week on making that happen. The Defense Security Service is no more and a new entity is taking its place. DoD also has a handful of goals it wants to meet. Federal News Network's Scott Maucione and Nicole Ogrysko explained in more detail on Federal Drive with Tom Temin.
Please join us for a public event on initiatives for securing the software supply chain on Wednesday, April 24, 2019 from 1:00-3:00 pm at the CSIS headquarters. Within the U.S. government, there is increasing awareness of and movement on the need for a coordinated strategy to prevent, identify, and respond to threats stemming from the software supply chain throughout the acquisition process. At this event, we will discuss some of the various initiatives, including the Department of Defense’s Deliver Uncompromised, along with work at the Carnegie Mellon, BSA | The Software Alliance, and the Department of Commerce, designed to minimize the risk of compromised software infiltrating critical systems. Opening Speech 1:00 pm - Registration 12:45 pm - William Stephens,Director, Counterintelligence, Defense Security Service, Department of DefenseModerated Discussion 1:15 pm - Allan Friedman, Director of Cybersecurity Initiatives, National Telecommunications Information Administration Bob Metzger, Co-Author MITRE "Deliver Uncompromised"; Head of DC Office, Rogers Joseph O’Donnell, P.C.Tommy Ross, Senior Director, Privacy, BSA | The Software AllianceRoberta Stempfley, Director, CERT Division, Carnegie Mellon University Software Engineering InstituteDerek Weeks, Vice President, Sonatype Inc. Moderated by James A. Lewis, SVP and Director, CSIS Technology Policy Program 2:45 pm - Audience Q&A 3:00 pm - End This event is made possible through general support to CSIS.
In today's Federal Newscast, more time is given for companies to come up with new ideas for the security clearance process.
Joyce Pappas is an Industrial Security Program Manager at the Air Force Materiel Command Information Protection office. In this episode of The Contracting Experience, Pappas demystifies industrial security and explains why it is important for acquisition professionals to understand how it impacts contracts. Does industrial security seem daunting or confusing? What is a DD Form 254, and when should you have one in your contract? What resources can you go to for help regarding industrial security issues? Joyce does a great job answering these questions and more on this episode. 5:20 min – industrial security defined and why it's important 8:40 min – classified contracts and the importance of incorporating security classification guides 14:50 min – What is a DD Form 254? 18:00 min – defense contractor facility clearances 22:15 min – Defense Pricing and Contracting Memo: Use of National Industrial Security Program Classification System within Wide Area Work Flow 28:30 min – additional resources/information on industrial security For more information on the Defense Security Service and additional details on industrial security go to the DSS web site at http://www.dss.mil/. To read the Defense Pricing and Contracting memo, published in October, regarding the use of the National Industrial Security Program Contract Classification System within Wide Area Work Flow visit Air Force Contracting Central or https://www.acq.osd.mil/dpap/policy/policyvault/USA000710-18-DPC.pdf. If you would like to share feedback on the podcast, please submit via thecontractingexperience@gmail.com.
Big change is coming to the Defense Department as the Pentagon prepares to take over the governmentwide security clearance program from the Office of Personnel Management. DoD is planning to merge people and resources from the National Background Investigations Bureau, the Defense Security Service and other entities to form a brand new clearance organization. Federal News Network's Nicole Ogrysko joined Federal Drive with Tom Temin for the details.
Larry Snow with the Secure Transportation and Executive Protection News for Wednesday, May 16th, 2018. In Security News From WBALTV.Com More Maryland communities hiring private security guards While there are 16,000 sworn police officers in Maryland, there are nearly double that number of private security guards, and there are 740 active security agencies in Maryland. Their job is to be a visible deterrent to de-escalate and to intervene if the police need their help. There are 28,000 licensed and certified security guards in the state of Maryland, which is an increase of 5,000 since 2013. Maryland State Police process as many as 900 applications a month. Read More From NextGov.Com The Defense Security Service plans to shift to a risk-based approach, but needs to reach out to stakeholders, GAO says. The Pentagon agency responsible for vetting contractors that handle classified information isn't keeping up with the threat, according to an auditor's report released Monday. The Defense Security Service, or DSS, is responsible for vetting the security of over 12,000 contractor facilities, but could only accomplish about 60 percent of its workload during the 2016 fiscal year, according to the Government Accountability Office report. Read More In Driving News From PoliceDriver.Com Passing Safety Passing the vehicle in front of you is one of those things we often do but don't give much thought. On an urban road, that slow driver in front of you may be problematic – BUT – once the decision has been made to pass a vehicle in an urban environment, realize and remember that you and your car are going to be spending a good deal of time in the wrong lane. To give you an idea of how much time and distance, if you are traveling at 50 mph and passing someone going 40 mph, you will need about 10 seconds and 736 feet to safely complete the pass. Read More ==================== This flash briefing is brought to you by the International Security Driver Association. The ISDA serves its members by supporting an international forum of protection professionals who share their knowledge and experience for the education and benefit of the membership. ISDA represents all aspects of the Executive Protection profession from all parts of the Globe. Whether you are exploring a career in executive protection, new to the profession, honing your expertise, or an established security executive, ISDA offers its Members benchmark educational, networking, and marketing programs. For more information about the ISDA membership, articles related to secure transportation, security, and executive protection, go to isdacenter.org. Thanks for listening to the Security Driver and Executive Protection News flash briefing.
The Trump administration is considering some big changes to the security clearance program and the agency that manages and oversees it. Discussions are in the works to move the entire governmentwide security clearance program from the Office of Personnel Management and National Background Investigations Bureau to the Pentagon. Another key OPM program could also move. Federal News Radio's Nicole Ogrysko joined Federal Drive with Tom Temin to explain that the moves could have major impacts on OPM's financial stability and on the structure of the agency.
If you hold a federal security clearance, you need to be careful what you publish to social networking sites - particularly LinkedIn. The Defense Security Service warns the site is the number one tool being used to target the defense industry today - and that requires more diligence on the part of security clearance holders.
In today's Federal Newscast, the Defense Security Service says it's considering whether or not to provide guidance on asking about cryptocurrency ownership during the clearance process.
The Defense Security Service is pushing to take over its background investigation program. How did it run the program when it was at the helm prior to 2005, and what can we expect from them today?
ClearanceJobs chats with William Henderson, a personnel security consultant. He discusses the history of the personnel security program, including the Defense Security Service, and offers commentary on the proposal to move the background investigations mission over to DSS.
ClearanceJobs talks the current security clearance backlog, interim security clearance and funding difficulties with Michelle Sutphin, an industrial security professional and the industry spokesperson for the National Industrial Security Program Policy Advisory Committee. Learn more about the difficulties facing the security clearance process today, including budget concerns within the Defense Security Service, and a lack of investigators.