From "Obama Seeks Big Boost in Cybersecurity Spending" Computerworld (02/15/11) Thibodeau, Patrick Maryland, Agencies Work to Expand Security Talent Pool Maryland government and industry officials are increasing their efforts to = cultivate new employees with math, science, and engineering skills to work = in the cyber security field. Maryland is home to several key U.S. cyber se= curity agencies, including NSA, the U.S. Cyber Command, and DISA. NSA offi= cials are anticipating a significant number of retirements in the coming ye= ars and plans to hire about 1,800 people this year, says NSA Chief of Staff= Deborah A. Bonanni. DISA recently completed a mission to increase its wor= kforce by more than 70 percent, says Director Mark Orndorff. However, more= cyber security workers are needed, and NSA and DISA are working with Maryl= and schools to encourage students' interest in a cyber security or intellig= ence career. For example, NSA recently hosted an event in which college ju= niors and seniors met with agency computer scientists, engineers, and mathe= maticians, =0Awhile DISA is using internships to attract new recruits. From "Maryland, Agencies Hope to Expand Cybersecurity Talent Pool" Washington Post (02/14/11) Censer, Marjorie DHS to Invest $40 Million on Cyber Security Research DHS will invest $40 million on cyber security research areas in fiscal 2011= in support of the Comprehensive National Cyber Initiative. The DHS Scienc= e and Technology Homeland Security Advanced Research Projects Agency is sol= iciting proposals on 14 research areas it intends to concentrate on this ye= ar, of which five will contribute to the CNCI. "The vision of the CNCI res= earch community over the next 10 years is to 'transform the cyber-infrastru= cture to be resistant to attack so that critical national interests are pro= tected from catastrophic damage and our society can confidently adopt new t= echnological advances,'" HSARPA says in its request for proposals. "The on= ly long-term solution to the vulnerabilities of today's networking and info= rmation technologies is to ensure that future generations of these technolo= gies are designed with security built in from the ground up." Traditional = security =0Atechniques such as software assurance, enterprise-level securit= y metrics, and network resiliency will be an area of focus for HSARPA this = year, as will more forward-thinking exploratory areas such as increasing th= e user-friendliness of security to worker productivity, network mapping, an= d measurement. Subjects HSARPA will devote attention to include areas that= became crucial security issues for the government in 2010, including insid= er threats and generating modeling and analysis capabilities to anticipate = the impact of cyber attacks on federal government and other critical infras= tructure. To make the cyber infrastructure attack-resistant, HSARPA will i= nvest in cyber economics, the financial incentive for hackers to perpetrate= cyber attacks, digital provenance, and hardware-enabled trust. From "DHS to Invest $40 Million on Cybersecurity Research" InformationWeek (02/01/11) Montalbano, Elizabeth _______________________________________________________________________ (c)Copyright 2011 Information, Inc. Use this link to unsubscribe: http://www.magnetmail.net/Actions/unsubscribe.cfm?message_id=3D1242255&user= _id=3DINSA&recipient_id=3D661651072&email=3Dkhijazi@unveillance.com&group_id= =3D395485 --_NextPart_000_1242255_2011223_114142807 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable

= Click here to view a web based version of this email.

INSA Insider =09 =09
=09
3D""=
=20 =20 =20 =20 =20 =20 =20 =20 =20 3D"27th =20 =20 =09
 
=09 =20 =20 =20 =20
=09

Announcement


Dear INSA Members,

I = am pleased to release to the INSA membership our recently concluded white p= aper, Organizational Conflicts of Interest: An Analysis of Publi= c and Private Perspectives.

This product is the result of = the hard work and dedicated efforts of INSA’s OCI Tas= k Force, chaired by Rich Haver. I would like to thank Rich and all of t= he members of the OCI Task Force for devoting their time and expertise to t= his ambiguous but crucial element of procurement. I applaud INSA’s OC= I Task Force’s contributions to help inform the debate for policy-mak= ers and thought leaders. It is the dedication of our members that allows IN= SA to remain a vital and relevant organization in acquisition.

As yo= u know, INSA formed the OCI Task Force in late 2010 in response to a genera= l consensus among senior intelligence officials and industry leaders that c= larity regarding OCI policies was needed after the passage of the Weapon Sy= stems Acquisition Reform Act (WSARA). The Task Force did not have any prede= termined outcome or conclusions. Through a series of interviews with indust= ry executives, congressional staff members, and senior procurement executiv= es from several agencies, the Task Force was able to incorporate the viewpo= ints of a variety of crucial players in this area.

I encourage you a= ll to download and read the white paper and share it with your peers within yo= ur firm/agency and across the community. This is not meant to be the final = word on this issue, as the Task Force hopes to encourage a constructive and= proactive dialogue related to OCI.

As you will see, the study&rsquo= ;s three main conclusions are:

  1. The DNI should provide policy gui= dance to create some level of consistency on the analysis and understanding= of OCI.
  2. The DNI should establish an OCI Board that meets regularly= to assess specific OCI issues.
  3. The Task Force recognized that offi= cials in each agency are best-suited to determine which OCI regulations are= most appropriate for them as long as they meet the requirements of the ODN= I and their respective departments.

Through outreach to our industr= y partners, the executive and legislative branches and the press, INSA hope= s to increase the conversation around OCI. To that end, OCI will be one of = the topics discussed at INSA’s TS/SCI Level Industry Day Symposium, w= hich is currently being scheduled for late April or early May. I encourage = you to stay tuned to this space and www.insaonline.org for further announcements on th= is topic.

Thank you,

Frances Fragos Townsend
INSA Chairwom= an

Share =20 =20 =20 =20 =20 =20 =09 =20 =09 =20 =20 =20   =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =09 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20   =20 =20 =20 =09 =20 =20 =20 =09

Events Calendar


=20 =20 =09

REGISTER TODAY!
Alex Weth= erbee Charity Golf Tournament
Schedule
Wedne= sday, May 25, 2011
8:00AM Registration • 9:00AM Shotgun Start &bull= ; 2:00PM Awards Ceremony
Location
Lansdowne ResortRobert Trent Jones, II Course
44050 Woodridge Parkway
Leesburg, VA = 20176
Cost
Individual - $300
Team of Four - $1,20= 0
If you are registering a team, please contact Monica Simons at msimons@insaonline.org.
Click here to view highlights from the
2010 Alex Wetherbee Char= ity Golf Tournament.


REGISTER TODAY!
27th Annual William Oliver Baker Award D= inner
-Black Tie Event-
Award Recipient=
Honorable John Michael “Mike” McConnell
Schedule
Friday, June 10, 2011
Cocktails 6:00pm • Dinn= er 7:30pm
Location
The Ritz-Carlton, Tysons CornerGrand Ballroom
1700 Tysons Boulevard, McLean, VA 22102
Cost=
Individual INSA Members - $350.00
Non-INSA Members - $450.0= 0
Government employees may attend as guests of INSA.
To register = as a government employee, please email baker@insaonline.org from your government email account.
Tables
Premier Table: Member Price $12,000 | Non-Member Pr= ice $14,000 - SOLD OUT!
Prominent = Table: Member Price $9,000 | Non-Member Price $11,000
Select Table: Memb= er Price $6,000 | Non-Member Price $8,000
If you are interested in p= urchasing a table for this event, please contact Monica Simons at msimons@ins= aonline.org.

Click here to view highlights fro= m the 2010 William Oliver Baker Award Dinner honoring Dr. Robert M. Gates, = Secretary of Defense.



INSA EVENT HIGHLIGHTS

Check out highlights of past INSA events onlin= e!

- Summaries available at www.insaonline.org= .
- Pictures available on INSA's Facebook Page.
- Video clip= s available on INSA's YouTube Channel
and the <= a href=3D"http://www.mmsend28.com/link.cfm?r=3D661651072&sid=3D12= 407091&m=3D1242255&u=3DINSA&s=3Dhttp://www.insaonline.org/index.php?id=3D76= 9" target=3D"_blank">CACI Video Library
.




=20 =20 =20

=20

Headlines


=20 Recap of Recent Events
=20 =20 =20 =20 INSA Mentoring Event with NGA Director Tish Long and Qi= netiQ's Steve Cambone
=20
=20 =20 Advertisement
=20 =20 =20 =20 The Intelligence & Security Academy offers courses for = individual enrollment this Spring via the OPEN INTELLACADEMY™! Check = out our new courses!
=20
=20 =20 =20 =20 =20 =20 =20 Top Story
DNI Clapper References INSA's SMART Change Efforts in C= ongressional Testimony

=20 =20 =20 =20 =20 =20 =20 Commentary and Analysis
Former INSA Chairman John Brennan Is Obama's Secret Wea= pon
Mike Rogers Plans Bipartisan and Apolitical Intelligenc= e Community Oversight
Lynn Cites Need for Public-Private Partnerships in Cybe= r War
How to Protect U.S. Critical Infrastructure From a Cybe= r Attack

=20 =20 =20 =20 =20 =20 =20 Intelligence and National Security News
Senate Confirms Stephanie O'Sullivan as Principal Deput= y DNI
Cloud Services Could Bolster National Cyber Security
National Threat Assessment Singles Out Domestic Terrori= sm

=20 =20 =20 =20 =20 =20 =20 Business of Intelligence
Obama Seeks Big Boost in Cyber Security Spending
Maryland, Agencies Work to Expand Security Talent Pool<= /a>
DHS to Invest $40 Million on Cyber Security Research

=20
=20 =20 =20 =20 =20 =20 =20 =20 =20 3D"Social= =20 =20 =09
 
=09 =20 =20 =20 =20
=09 =20

Recap of Recent Events


=20 =09
INSA Mentoring Event with NGA Director Tish Lo= ng and QinetiQ's Steve Cambone

On Tu= esday, January 25, 2011, INSA hosted a Mentoring Event with keynote speaker= s Letitia (Tish) Long, Director of the National Geospatial-Intelligence Age= ncy (NGA) and a former member of INSA’s Board of Directors, and Steve= Cambone, President and COO of Mission Solutions Group of QinetiQ North Ame= rica and currently a member of INSA’s Board of Directors and INSA&rsq= uo;s Cyber Security Council. Both spoke in-depth about their experiences b= eing mentored and mentoring others.

Director Long cited her many pa= st mentors as essential for navigating through the Intelligence Community t= o her current position. She stressed the importance of challenging assumpti= ons and of finding mentors whose backgrounds vary from one’s own, all= owing for “that cognitive diversity to look at things from different = angles.” Dr. Cambone relayed his own professional anecdotes, emphasiz= ing the importance of being attentive to relationships and of learning from= those who worked for him, not just above him.

Both speakers took q= uestions from those in attendance, including senior IC members from both th= e public and private sectors and newer members to the community. The audien= ce was particularly interested in understanding the dynamics of mentoring p= rograms within NGA and QinetiQ and of programs that crossed over between th= e public and private sectors.

Director Long described NGA’s o= nline mentor directory and periodic mentoring events while Dr. Cambone disc= ussed the Mission Solution Group’s program management course. Directo= r Long further talked about the importance of joint duty assignments. Regar= ding their experiences coming into their management positions in the IC, bo= th speakers agreed that it was vital to listen to the workforce’s con= cerns and visions for each agency and then, based on those conversations, d= evelop priorities.

After the event, Ms. Long and Dr. Cambone were av= ailable to meet and talk one-on-one with those in attendance.

Click here to view highlights from this event.

Share =20 =20 =20 =20 =20 =20 =09 =20 =09 =20 =20 =20   =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =09 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20   =20 =20 =20 =09 =20 =20 =20 | =09 Return to Headlines
=20 =20 =20
=20 =20

Advertisement


=20 =09
The Intelligence & Security Academy offers cou= rses for individual enrollment this Spring via the OPEN INTELLACADEMY&trade= ;! Check out our new courses!

The Intelligence & Security Academy brings to bear decades of senior execut= ive experience in intelligence, national security and policy analysis. Each= of the Academy’s courses is a dynamic, compact and highly informativ= e exploration of a key intelligence issue. Courses are unclassified and pr= esented at our facility in Reston, Virginia.

-History of U.S. Intell= igence – March 1
-Introduction to U.S. Intelligence – March = 2
-Intelligence Concepts for Cyber Conflict: Basic – March 8
-C= yber Collections – March 9-10
-Homeland Security Intelligence &nda= sh; March 15
-Intelligence Budget Process – March 16-17
-Nation= al Security Policy Process – March 22
-Analyst Training: Writing A= nalysis; Preparing Briefings – March 23-24
-GEOINT 101 – Mar= ch 29
-TECHINT – March 30-31
-Intelligence Concepts for Cyber C= onflict: Advanced – April 5-6
-Risk Awareness Intelligence –= April 12-13
-Intelligence and the Law – April 27
-Operational= Intelligence – April 28
-Countering Terrorism Finance – May= 3

Please visit us at http://intellacade= my.com/courses/open-intellacademy/ for course descriptions, discounts, = and on-line enrollment!


=20 =20 =20
=20
=20 =20 =20 =20 =20 =20 =20 =09 =20

Top Story


=20 DNI Clapper References INSA's SMART Change Efforts in Congressional= Testimony

In recent testimony before the House Permanent Select Committee on I= ntelligence (HPSCI), Director of National Intelligence James Clapper made r= eference to work that is being done to help IC leaders effectively adopt to= current fiscal and budgetary circumstances. He was referring to the INSA S= MART Change Task Force, set up in late 2010 and chaired by Joan Dempsey, fo= rmer Deputy Director of Central Intelligence for Community Management, whic= h was established by INSA to explore how previous budget cuts were implemen= ted and what lessons can be learned from the past as the intelligence commu= nity confronts increasingly tighter fiscal realities. Through a series of = panel discussions focused on manpower, acquisition and organization, the gr= oup had developed a collection of observations and recommendations that wil= l soon be presented to executive and legislative branch leaders.

During t= he testimony, Clapper said, "We, I think, all understand that we're going t= o be in for some belt-tightening." He agreed with warnings from Secretary o= f State Hilary Clinton that the massive U.S. deficit has weakened the count= ry's position against potential competitors such as China. "The debt does = pose a potential threat to our national security ... The financial relation= ship we have with China is illustrative of that," he said. Nevertheless, t= he Obama Administration's fiscal 2012 budget proposal includes a request fo= r $55 billion for the CIA and other civilian intelligence services, a four = percent increase over the $53.1 billion that the government spent on intell= igence gathering in fiscal 2010, according to The Washington Post. = It is the first time that the funding request for U.S. intelligence agencie= s has been disclosed. CIA Director Leon Panetta also testified that the na= tional debt poses a security risk, according to the States News Service<= /I>. "That threat of the debt and the level of deficits that this country = is now running and the consequences of that internationally, economically, = and in terms of the resources we need for the future—I think there's = no question that it represents a threat we have to pay attention to," Panet= ta said.

During his testimony Clapper noted that the Intelligence Communi= ty's budget was substantially reduced in the 1990s, only to be ramped up ag= ain as a consequence of September 11, 2001. "So now the pendulum will swin= g back ... and given, you know, the funding that we have been given over th= e last 10 years since 9/11, that's probably appropriate," he said. Clapper= said the Intelligence Community and Congress must cooperate to guide fisca= l constraint in a responsible manner. "I've had at least one outside group = that is completely out of the community, but very familiar with it, looking= at this," he reported, making reference to INSA's SMART Change Task Force.= "They've sent me some recommendations on areas we ... need to consider fo= r examination in the areas of personnel structure and ... acquisition." Al= though he said that he has yet to examine the recommendations, "this will b= e a subject among the IC community and its executive community, leadership,= but this is an area we need to work with [Congress]."

The Post n= otes that intelligence agency budgets have more than doubled in the almost = 10 years since September 11, 2001, which has seen the creation of several n= ew agencies, including the ODNI.

From "DNI Clapper References INSA's SMART Change Efforts in Congression= al Testimony"
Information, Inc. (02/22/11)

=09 Web Link
=09 =20 Share    =20 | Return to Headlines

=20


=20 =20 =20 =20 =20 =20 =20 =09 =20

Commentary and Analysis


Former INSA Chairman John Brennan Is Obama's Secret Weapon=

Former INSA Chairman, John Brennan, Deputy National Security Advisor= for Homeland Security and Counterterrorism, has placed a leading priority = on the continuing threat of radical Islamists who have orchestrated attacks= on U.S. targets during President Obama's Administration. Brennan is keepi= ng a close eye on events in the Middle East, and he is a strong advocate of= the United States displaying... (More)

From "In the Shadows With Counterterrorism Czar John Brennan, Obama's S= ecret Weapon"
Time (02/10/11) Crowley, Michael
=09 Web Link
=09 =20 Share =20    =20 | Return to Headlines

=20 Mike Rogers Plans Bipartisan and Apolitical Intelligence Community = Oversight

U.S. Rep Mike Rogers (R-MI), new Chairman of the House Permanent Sel= ect Committee on Intelligence, says the panel's first public meeting will m= ark the beginning of a new era of aggressive, bipartisan, and apolitical ov= ersight after several years of going astray. Rogers is committed to revita= lizing the committee's oversight and investigation operations, and employin= g its panel to cooperate with... (More)

From "Exclusive Interview: Mike Rogers, the New Intelligence Committee = Chairman"
Foreign Policy (02/10/11) Rogin, Josh
=09 Web Link
=09 =20 Share =20    =20 | Return to Headlines

=20 Lynn Cites Need for Public-Private Partnerships in Cyber War

Information theft is the most prevalent cyber threat, said U.S. Depu= ty Secretary of Defense William Lynn during his keynote address to the RSA = computer security conference. Lynn urged computer security industry specia= lists to partner with the military to safeguard U.S. networks, asserting th= at "the government cannot protect our nation alone. It is going to take a = public-private partnership to... (More)

From "Too Much Hysteria Over Cyber Attacks"
Agence France-Presse (02/16/11) Chapman, Glenn
=09 Web Link
=09 =20 Share =20    =20 | Return to Headlines

=20 How to Protect U.S. Critical Infrastructure From a Cyber Attack

Egypt's shutoff of Internet access has spurred anxieties of similar = suppression elsewhere through an Internet kill switch. Compounding this fe= ar is legislation proposed in recent years to empower the White House to se= ver critical U.S. infrastructure from the Internet in the event of a major = cyber attack. James Lewis with the Center for Strategic and International = Studies' Technology and Public... (More)

From "What Is the Best Way to Protect U.S. Critical Infrastructure From= a Cyber Attack?"
Scientific American (02/04/11) Greenemeier, Larry
=09 Web Li= nk
=09 =20 Share =20    =20 | Return to Headlines


=20 =20 =20 =20 =20 =20 =20 =09 =20

Intelligence and National Security News

=
Senate Confirms Stephanie O'Sullivan as Principal Deputy DNI

The Senate has confirmed Stephanie O'Sullivan to be the Principal De= puty Director of National Intelligence, the second highest position in the = Intelligence Community. "In addition to her more than three decades of int= elligence experience, Ms. O'Sullivan brings a passion and appreciation for = the men and women of the Intelligence Community who serve our nation selfle= ssly each and every day," DNI... (More)

From "Senate Confirms O'Sullivan as ODNI Deputy"
Federal News Radio (02/18/11) Buckner, John
=09 Web Link
=09 =20 Share =20    =20 | Return to Headlines

=20 Cloud Services Could Bolster National Cyber Security

National cyber security could be significantly fortified by a move t= o cloud computing, which would focus cyber security on a relatively small n= umber of service providers rather than a massive cohort of individual busin= esses, according to a new report from the Center for Strategic and Internat= ional Studies. "The move to the cloud is not a silver bullet that will sol= ve all cyber security... (More)

From "Cloud Services Could Bolster National Cyber Security"
Network World (02/02/11) Greene, Tim
=09 Web Link<= br /> =09 =20 Share =20    =20 | Return to Headlines

=20 National Threat Assessment Singles Out Domestic Terrorism<= br>
The heads of the U.S. Intelligence Community told the House Permanen= t Select Committee on Intelligence that homegrown terrorism is the chief th= reat the country faces when they unveiled their annual National Threat Asse= ssment. Identifying Americans planning attacks on U.S. soil is "absolutely= our number 1 priority," said National Counterterrorism Center Director Mic= hael Leiter. DNI James... (More)

From "No. 1 Priority for US Security: Domestic Terrorism, Threat Report= Says"
Christian Science Monitor (02/10/11) Mulrine, Anna
=09 Web Link
=09 =20 Share =20 =    =20 | Return to Headlines


=20 =20 =20 =20 =20 =20 =20 =09 =20

Business of Intelligence


Obama Seeks Big Boost in Cyber Security Spending

President Obama's 2012 budget proposal calls for a major increase in= cyber security research and development to enhance its ability to mitigate= the risk of insider threats and guarantee the security of control systems = such as those employed at power plants. Philip Coyle, Associate Director f= or National Security, says that cyber security R&D spending will climb 35 p= ercent to $548 million next... (More)

From "Obama Seeks Big Boost in Cybersecurity Spending"
Computerworld (02/15/11) Thibodeau, Patrick
=09 Web Link
=09 =20 Share =20    =20 | Return to Headlines

=20 Maryland, Agencies Work to Expand Security Talent Pool

Maryland government and industry officials are increasing their effo= rts to cultivate new employees with math, science, and engineering skills t= o work in the cyber security field. Maryland is home to several key U.S. c= yber security agencies, including NSA, the U.S. Cyber Command, and DISA. N= SA officials are anticipating a significant number of retirements in the co= ming years and plans to hire... (More)

From "Maryland, Agencies Hope to Expand Cybersecurity Talent Pool"
Washington Post (02/14/11) Censer, Marjorie
=09 Web Link=
=09 =20 Share =20    =20 | Return to Headlines

=20 DHS to Invest $40 Million on Cyber Security Research

DHS will invest $40 million on cyber security research areas in fisc= al 2011 in support of the Comprehensive National Cyber Initiative. The DHS= Science and Technology Homeland Security Advanced Research Projects Agency= is soliciting proposals on 14 research areas it intends to concentrate on = this year, of which five will contribute to the CNCI. "The vision of the C= NCI research community over... (More)

From "DHS to Invest $40 Million on Cybersecurity Research"
InformationWeek (02/01/11) Montalbano, Elizabeth
=09 Web Link
=09 =20 Share =20    =20 | Return to Headlines


=20
Abstract News © Copyright 2011 INFORMATION, INC.
3D"Powered
=09
February 23, 2011
Issue #33
=09
=09 =09
=20
=20 =


=20 =20 =20

Sponsored By:
=20 =20 =20 =20 =20 =20 =20 =20 =20 3D"CACI" =20 =20 =09
=09 =20 =20 =20 =20 =20 =20
=09
=20

Find INSA Online


=20 =09


=20 =20 =20

=20


=20 =20

INSA Events


=20 =09 March 2011: INSA Hill Mixer

April 2011: An Evening w= ith Charlie Allen

April 2011: INSA Mentoring Event with Joa= n Dempsey & Mike Leiter

April 2011: INSA SMART Ch= ange Leadership Dinner

April 2011: INSA IC Indust= ry Day & OCI Conference

Wednesday, May 25, 2011: = Alex Wetherbee Charity Golf Tournament

May 2011: = INSA Cyber Security Conference

Friday, June 10, 2011: 27th Annual William Oliver Baker Award Dinner

July 20= 11: The Future of Intelligence Analysis Tradecraft Conference

September 2011: INSA Homeland Security Intelligence C= ouncil Symposium

Saturday, October 1, 2011: DIA 50th Annive= rsary Ball

Wednesday, November 9, 2011: INSA/American Secur= ity Challenge Event

December 2011: INSA Achievement Awards
=20 =20 =20

=20 =20 =20

=20 =09 Thursday, February 24: Homeland Security Intelligen= ce Council Governance Board Meeting

Tuesday, March 1:= Cyber Council Meeting

Thursday, March 3: Homeland Security Intelligence Council Meeting

Monday, March 7:
Board of Directors Meeting

Friday, March 11:
Cloud Computing Task Force Meeting
=20 =20 =20
=20 =20 =20
=20 =09
Organizational Conflicts of Interest: An Analysis of Public and Private = Perspectives
March 2011
An INSA paper exploring the applic= ation of OCI regulation and impacts of the WSARA on the IC. The paper makes= three recommendations acknowledging the need for agencies to tailor their = policies to their respective needs and calling for regular discourse on OCI= issues between industry and the IC under leadership provided by the DNI.Click here to read this paper.

Intelli= gence Community Acquisition & Development
Fall 2010
A join= t AFCEA/INSA white paper regarding the acquisition and development of techn= ology programs in the national security community, with an effort to contri= bute to the ongoing national discussion regarding ways to strengthen the In= telligence Community. AFCEA and INSA, working collaboratively, are prepared= to provide the setting for discussions and facilitate the process.
<= a href=3D"http://www.mmsend28.com/link.cfm?r=3D661651072&sid=3D12= 407152&m=3D1242255&u=3DINSA&s=3Dhttp://insaonline.org/assets/files/AFCEA_IN= SA-White%20paper%20%282%29.pdf">Click here to read this paper.
<= br>Addressing Cyber Security Through Public - Private Partnership: An An= alysis of Existing Models
November 2009
An INSA white pape= r reviewing historical models for public - private partnership and outlinin= g an approach to cyber security based on public - private collaboration and= coordination.
Click here to read this paper.=

Counterintelligence for the 21st Century
September= 2009
An INSA paper to help frame the debate on an issue of high pri= ority to US national security. The paper identifies six major challenges th= at the DNI faces in the future and makes ten recommendations to begin fixin= g CI.
Click here to read this paper.

Critical Issues for Cyber Assurance Policy Reform
<= i>March 2009
An INSA paper in support of the presidentially commissi= oned task to conduct a comprehensive cyber security study. The paper used t= hree question sets to frame the debate and made recommendations for each qu= estion set.
Click here t= o read this paper.

Critical Issues for Intelligence Acqui= sition Reform
October 2008
An INSA paper providing industr= y’s assessment of the Intelligence Community acquisition process. The= paper identifies eight areas of concern that are critical to the creation = of an efficient acquisition process responsive to the nation’s intell= igence needs and proposes five recommendations to address these issues. Click here to read this paper.




=20 =20 =20 =09

About INSA


INSA is the premier intelligence and national security organization that br= ings together the public, private and academic sectors to collaborate on th= e most challenging policy issues and solutions. As a non-profit, non-parti= san, public-private organization, INSA’s ultimate goal is to promote = and recognize the highest standards within the national security and intell= igence communities. INSA has over 130 corporate members and several hundre= d individual members who are leaders and senior executives throughout gover= nment, the private sector and academia. =20 To learn more about INSA visit www.insaonline.org.

INSA Insider is an executive summary of noteworthy = articles pertaining to the business of intelligence, national and homeland = security, and other vital issues of importance to our members. I= NSA Insider is distributed twice each month to INSA members as= an exclusive membership benefit. Our editorial staff monitors nearly 12,00= 0 newspapers, business publications, web sites, national and international = wire services, and other periodicals and summarizes significant articles in= to an easy-to-read summary.=20
For more information about INSA, the INSA Insider, = to suggest an article to be covered in a future issue or to sponsor an upco= ming issue of the Insider, contact:

=20 Rachel Phillips
INSA
901 North Stuart Street,
Suite 205
Arlington, VA 22203
Phone (703) 224-4672
Fax (703) 224-4681
Email: insider@insaonline.org


=20
=09

Click here to unsub= scribe.


=0A --_NextPart_000_1242255_2011223_114142807-- From - Sat May 21 19:31:55 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.224.61.4 with SMTP id r4cs200703qah; Wed, 11 May 2011 14:40:31 -0700 (PDT) Received: by 10.229.130.144 with SMTP id t16mr7765018qcs.146.1305150031004; Wed, 11 May 2011 14:40:31 -0700 (PDT) Return-Path: Received: from mail236.magnetmail.net (mail236.magnetmail.net [209.18.70.236]) by mx.google.com with ESMTP id s3si1068661qco.176.2011.05.11.14.40.28; Wed, 11 May 2011 14:40:29 -0700 (PDT) Received-SPF: pass (google.com: domain of return@mmsend28.com designates 209.18.70.236 as permitted sender) client-ip=209.18.70.236; Authentication-Results: mx.google.com; spf=pass (google.com: domain of return@mmsend28.com designates 209.18.70.236 as permitted sender) smtp.mail=return@mmsend28.com Received: from MAGNETMAIL5 (172.16.236.5) by mail236.magnetmail.net id hpc14q0ir4cq for ; Wed, 11 May 2011 17:40:25 -0400 (envelope-from ) Date: Wed, 11 May 2011 17:40:24 -0400 From: INSA Insider To: Subject: INSA Insider - May 11 X-TokenInfo-NoToken: X-Bps1: 8871329176 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="_NextPart_000_1355970_2011511_174024777" Message-ID: <0.0.0.8.1CC10240A065AFC.511C3@mail236.magnetmail.net> --_NextPart_000_1355970_2011511_174024777 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable To see the web version of this message click here: =0Ahttp://www.magnetmail= .net/actions/email_web_version.cfm?recipient_id=3D661651072&messa= ge_id=3D1355970&user_id=3DINSA=0A=0DINSA Insider May 11, 2011 Issue #39 _______________________________________________________________________ ANNOUNCEMENT Dear INSA Members, It was great seeing so many of you at INSA's Leadership Dinner with DNI Jam= es Clapper last week for what was a truly memorable INSA event. I wish to = join all of you in congratulating Director Clapper and the entire national = security and intelligence community on their remarkable intelligence succes= s in killing UBL a week and half ago. We have all seen the reports on how t= his was an excellent example of agencies and policymakers at all levels of = the government working together and I could not be more proud of the hard w= ork of so many of our peers and colleagues in this lengthy endeavor for jus= tice. The National Reconnaissance Office was among the many agencies that contrib= uted to this great success, which is why An Evening with Charlie Allen and = Bruce Carlson, Director of the NRO on Monday, June 27, is an especially per= tinent opportunity to hear from a top leader in the community. General Bruc= e Carlson (USAF, Ret.) has been an extraordinary leader for the NRO, and I = know this evening will be a very informative evening for all of you. Bruce= and I will speak about: * New business practices recently introduced at the NRO which will keep the= agency on the cutting edge of space technology in the 21st century. * Challenges of managing a large agency that must operate in the hostile re= aches of space in a constrained budget environment. * Concepts for bringing the NRO, with its mission partners, into a more col= laborative Multi-INT environment. As a Distinguished Speaker Series Dinner, INSA corporate members are allott= ed complimentary seats to this event. Click here for details on sponsorshi= p opportunities and registration info. Earlier that same day, INSA will host its annual TS/SCI level INSA IC Indus= try Day. Every year, this event provides enormous insight into the budget a= nd fiscal priorities of the agencies and program managers from across the c= ommunity. INSA has organized panel sessions with a number of intelligence = community representatives (to include CIA, DIA, NGA, NRO, and NSA). The to= pics will include: * Budget and Expectations - Intelligence Community Priorities * IC Agency Perspectives - A Look Ahead * Organizational Conflicts of Interest - Impact on Government and Industry * Internal Research & Development - Investing in the Future Click here to view the latest agenda. Click here for details on sponsorship opportunities and registration info. Lastly, I want to encourage all INSA members to submit an abstract to abstr= acts@insaonline.org for the Innovators' Showcase. Details about this were s= ent out earlier in the week. Click here to learn more and please note the d= eadline has been extended till Friday, May 20. I hope to see you at one or both of these exciting events! Thank you, Charlie Allen INSA Senior Intelligence Advisor _______________________________________________________________________ EVENTS CALENDAR REGISTER TODAY! Alex Wetherbee Charity Golf Tournament Schedule Wednesday, May 25, 2011 8:00AM Registration * 9:00AM Shotgun Start * 2:00PM Awards Ceremony Location Lansdowne Resort Robert Trent Jones, II Course REGISTER TODAY! 27th Annual William Oliver Baker Award Dinner -Black Tie Event- Award Recipient Honorable John Michael "Mike" McConnell Schedule Friday, June 10, 2011 Cocktails 6:00pm * Dinner 8:00pm Location The Ritz-Carlton, Tysons Corner Grand Ballroom REGISTER TODAY! INSA IC Showcase Schedule Monday, June 27, 2011 - Tuesday, June 28, 2011 Events Fifth Annual INSA IC Industry Day An Evening with Charlie Allen & Bruce Carlson Innovators' Showcase Note: Each event requires separate registration. INSA EVENT HIGHLIGHTS Check out highlights of past INSA events online! - Summaries available at www.insaonline.org. - Pictures available on INSA's Facebook Page. - Video clips available on INSA's YouTube Channel=20 and the CACI Video Library. _______________________________________________________________________ HEADLINES INSA WHITE PAPERS - RESOURCE CENTER INSA Leadership Dinner Featuring DNI James Clapper TOP STORY "Intelligence Fusion Got Bin Laden" COMMENTARY AND ANALYSIS "NGA Played Vital Role in Bin Laden Raid" "Terrorism After the Revolutions" "U.S. Rushing to Capitalize on Bin Laden Intelligence" "Annual Secrecy Costs Now Exceed $10 Billion" "Focus Turns to New Leader of Al-Qaeda" INTELLIGENCE AND NATIONAL SECURITY NEWS "Rob Strayer to Lead National Security Preparedness Group" "NMEC to Lead Analysis of Bin Laden Files" "FBI Needs More Skills for National Security Cases" "Terrorists Discover Uses for Twitter" BUSINESS OF INTELLIGENCE "DHS Creates Public-Private Technology Exchange" "New Rules Proposed to Protect Contractor Information" _______________________________________________________________________ NEWSBRIEFS INSA WHITE PAPERS - RESOURCE CENTER INSA Leadership Dinner Featuring DNI James Clapper ADVERTISEMENT INSA'S FUTURE EVENTS Wednesday, May 25, 2011: Alex Wetherbee Charity Golf Tournament Friday, June 10, 2011: 27th Annual William Oliver Baker Award Dinner Monday, June 27, 2011: IC Industry Day Monday, June 27, 2011: An Evening with Charlie Allen & Bruce Carlson Tuesday, June 28, 2011: Innovators' Showcase Wednesday, July 13, 2011: INSA Mentoring Event with Terry Roberts & Jake Ja= coby Wednesday, September 7, 2011: Intelligence to Protect the Homeland Symposiu= m=20 Thursday, September 22, 2011: INSA Cyber Security Symposium=20 Saturday, October 1, 2011: DIA 50th Anniversary Gala Wednesday, November 9, 2011: INSA/American Security Challenge Award Ceremon= y=20 * Thursday, May 19: Homeland Security Intelligence Council Meeting * Friday, May 20: Executive Committee Meeting * Tuesday, May 31: Security Clearance and Suitability Reform Task Force Mee= ting =20 Organizational Conflicts of Interest: An Analysis of Public and Private Per= spectives March 2011 An INSA paper exploring the application of OCI regulation and impacts of th= e WSARA on the IC. The paper makes three recommendations acknowledging the = need for agencies to tailor their policies to their respective needs and ca= lling for regular discourse on OCI issues between industry and the IC under= leadership provided by the DNI. Click here to read this paper. Intelligence Community Acquisition & Development Fall 2010 A joint AFCEA/INSA white paper regarding the acquisition and development of= technology programs in the national security community, with an effort to = contribute to the ongoing national discussion regarding ways to strengthen = the Intelligence Community. AFCEA and INSA, working collaboratively, are pr= epared to provide the setting for discussions and facilitate the process. Click here to read this paper. Addressing Cyber Security Through Public - Private Partnership: An Analysis= of Existing Models November 2009 An INSA white paper reviewing historical models for public - private partne= rship and outlining an approach to cyber security based on public - private= collaboration and coordination. Click here to read this paper. Counterintelligence for the 21st Century September 2009 An INSA paper to help frame the debate on an issue of high priority to US n= ational security. The paper identifies six major challenges that the DNI fa= ces in the future and makes ten recommendations to begin fixing CI. Click here to read this paper. Critical Issues for Cyber Assurance Policy Reform March 2009 An INSA paper in support of the presidentially commissioned task to conduct= a comprehensive cyber security study. The paper used three question sets t= o frame the debate and made recommendations for each question set.=20 Click here to read this paper. Critical Issues for Intelligence Acquisition Reform October 2008 An INSA paper providing industry's assessment of the Intelligence Community= acquisition process. The paper identifies eight areas of concern that are = critical to the creation of an efficient acquisition process responsive to = the nation's intelligence needs and proposes five recommendations to addres= s these issues.=20 Click here to read this paper. TOP STORY Intelligence Fusion Got Bin Laden The CIA-led raid that resulted in the death of al-Qaeda leader Osama bin La= den would not have happened without the contribution of many anonymous fede= ral intelligence employees and the numerous reforms made to the intelligenc= e community over the last 10 years. "This is the cumulative effect of a lo= t of small, medium, and big things," says an intelligence official. "But a= t the end of the day, it's a lot of small things, like the emphasis on coll= aboration ... that ultimately changes the way people behave and the way org= anizations perform." Several intelligence agencies cooperated to gather an= d analyze the data identifying bin Laden's compound, and support the forces= that raided it. A National Geospatial-Intelligence Agency analyst says NG= A generated detailed images of the compound using the National Reconnaissan= ce Office's spy satellites, and models of the compound were produced using = NGA's =0Amaps and images. The analyst says the agencies collaborated to gi= ve the SEAL team as much data as possible on what they could expect to find= within the compound. In the lead-up to the raid, intelligence employees w= ere not just working with their counterparts at other agencies in a virtual= sense, but in some instances they were working side-by-side with their pee= rs, the NGA analyst says. He notes that information was limited to a close= -knit group of individuals at each agency, "so those who really didn't have= a need to know or need to be involved were not so. And in that way you we= re able to still keep the interaction and engagement across the community w= ithout having it get out to too many people, where you have greater opportu= nities for blowing the cover or leaking the information." INSA President E= llen McCarthy says the U.S. government also set up joint facilities for age= ncy cooperation, =0Atrained analysts to exchange data, and devised new comp= uter systems to ease information sharing. "It's hard to measure the precis= e impact of any cultural shift until you look in the rearview mirror," McCa= rthy notes. "Now we can look back at recent events and say, this wouldn't = happen without a phenomenal degree of information sharing." McCarthy also = points out that more than 50 percent of today's intelligence analysts were = hired after 9/11, and the improvements in intelligence in the years since i= s probably the result of the experience these recruits have gained. "They'= ve had years to develop their contacts and information," McCarthy says. "T= his is not something that just happened because the president said, 'I want= [bin Laden] dead.'" --_NextPart_000_1355970_2011511_174024777-- From "Intelligence Fusion Got bin Laden" Federal Times (05/09/11) Losey, Stephen COMMENTARY AND ANALYSIS NGA Played Vital Role in Bin Laden Raid The National Geospatial-Intelligence Agency played an integral role in the = raid that killed al-Qaeda leader Osama bin Laden. The agency generates map= s and interprets imagery from drones and satellites, as well as tracks terr= orists and deciphers signatures off of enemy radar by exploiting the electr= omagnetic spectrum. Among NGA's contributions to the bin Laden mission wer= e the creation of three-dimensional renderings of the bin Laden compound us= ing imagery and laser-based sensors, analysis of data from a drone monitori= ng the compound, assistance to the Joint Special Operations Command in the = generation of mission simulators for helicopter pilots, and providing evalu= ations of the people within the compound to the CIA and other policymakers.= One NGA analyst says the agency can ascertain the composition of building= s from very far away, perform sophisticated pattern analysis of human chara= cteristics, =0Aand penetrate thick clouds using hyperspectral and multispec= tral sensors on satellites and drones. The NGA also played a key role in t= he CIA's location of bin Laden's compound through rigorous examination of m= aps and data-crunching of information compiled by the CIA. Under the guida= nce of now DNI and former SASA (INSA's predecessor) Chairman James Clapper = during the first part of the George W. Bush Administration, the NGA shifted= its concentration from mapping to dynamic, real-time 3D support using all = parts of the electromagnetic spectrum. From "In Raid on Bin Laden, Little-Known Geospatial Agency Played Vital Rol= e" National Journal (05/05/11) Ambinder, Marc Terrorism After the Revolutions Secular uprisings in the Arab world have the potential to be either helpful= or detrimental to jihadist movements, writes Georgetown University Profess= or Daniel Byman. He warns that the unrest could ultimately be beneficial t= o al-Qaeda and its associates, as they will seek to turn any future politic= al turmoil to their advantage. At the same time, the ouster of repressive = regimes could deprive al-Qaeda of one of its best recruitment arguments, wh= ile the advent of democratic government could cause its influence to slip f= urther. The nonviolent toppling of the Egyptian and Tunisian governments t= hrough mainly secular demonstrations could be another blow to al-Qaeda, whi= ch preaches religious violence as the only effective agent of change, Byman= says. However, more democratic Arab regimes may be less willing to cooper= ate with the United States on counterterrorism efforts, given the United St= ates =0Aand dictators' long history of collaboration and the often brutal c= rackdowns, arrests, and interrogations it entailed. Byman also argues that= al-Qaeda might be strengthened because nothing solid has yet replaced the = fallen dictatorships, and in the upheaval many jihadists were released from= prison. Arab governments also find it difficult or not in their interest = to watchdog and constrain these ex-prisoners, while new democratic regimes = may be unlikely to go after the jihadist movement's recruiters, propagandis= ts, and fundraisers. Byman writes that Egypt's Muslim Brotherhood and othe= r Islamist parties will likely play a pivotal role, and excluding them from= the political process would threaten the U.S. campaign against al-Qaeda by= estranging younger and less patient Islamists, who might find al-Qaeda mor= e appealing. The eruption of civil war in unstable countries also could wo= rk to al-Qaeda's =0Aadvantage. Among the strategies Byman says the United = States must follow to keep al-Qaeda in check is to quietly "develop efforts= to train the intelligence and security forces of the new regimes that emer= ge." From "Terrorism After the Revolutions" Foreign Affairs (06/11) Vol. 90, No. 3, P. 48; Byman, Daniel U.S. Rushing to Capitalize on Bin Laden Intelligence U.S. intelligence services are scrambling to exploit a wealth of computer d= ata and documents seized in the May 1 raid on al-Qaeda leader Osama bin Lad= en's compound in Pakistan, before the terrorist group's affiliates can chan= ge their communication protocols and relocate their hideouts. The CIA has = organized a group of analysts in Afghanistan to sift through the new intell= igence for any clues of in-development terrorist plots, financial support n= etworks, and the location of different al-Qaeda leaders. In addition, the = NSA has stepped up electronic monitoring to identify any unusual chatter fr= om al-Qaeda commanders and followers across the globe. National Counterter= rorism Center Director Michael Leiter says the top priority will be detecti= ng ongoing threats and information that could lead to "other high-value tar= gets within al-Qaeda." Researcher David Lindhal speculates that the invest= igation =0Awill likely yield "hundreds of thousands of tiny details" that w= ould render a larger image of al-Qaeda. Security officials are concerned t= hat al-Qaeda franchises or radicalized individuals might try to expedite th= e execution of attack plans already in development before U.S. forces can c= apitalize on the bin Laden intelligence. Another concern is the potential = for attacks in retaliation for bin Laden's killing in the raid. Insiders s= ay those seeking vengeance are expected to target Western assets or individ= uals in other countries. "Any eventual attacks in the coming days, weeks, = or even months will be probably described as revenge for [bin Laden] even = if their conception predates his death," notes a French counterterrorism of= ficial. "Plans for any real retaliatory attacks are only starting now, mea= ning the clock has begun ticking to find out about them and stop them." From "U.S. Rushing to Capitalize on Bin Laden Intel" Global Security Newswire (05/05/11) Annual Secrecy Costs Now Exceed $10 Billion The national security classification system's estimated annual costs increa= sed by 15 percent in 2010 to top $10 billion for the first time, according = to a new report to the president from the Information Security Oversight Of= fice (ISOO). Another $1.25 billion was incurred within industry to safegua= rd classified information, for a total of $11.42 billion in secrecy costs. = The estimates encompass costs of staff security, physical security, inform= ation systems security, and classification management and training. ISOO c= ited profligate overclassification as one of the variables contributing to = the secrecy cost hike. ISOO did not report the security cost estimates for= the major intelligence agencies, because those expenditures are designated= as classified. Two security officials were unable to characterize how nat= ional security would be adversely affected by the disclosure of the securit= y =0Acost estimates for the intelligence agencies, and would only say that = the classification of this information was aligned with intelligence commun= ity guidance. "This is a circular claim, not an explanation," writes Steve= n Aftergood. "The information is classified because somebody said it's cla= ssified, not because it could demonstrably or even plausibly damage nationa= l security." Such reflexive secrecy would be eliminated with the appropria= te and successful deployment of the Obama Administration's pending Fundamen= tal Classification Guidance Review, Aftergood writes. However, he points o= ut that thus far there is no sign that the process is yielding benefits, or= even that the administration is seriously dedicated to it. From "Annual Secrecy Costs Now Exceed $10 Billion" Secrecy News (05/04/11) Aftergood, Steven Focus Turns to New Leader of Al-Qaeda Although Ayman al-Zawahri is still the odds-on favorite to replace Osama bi= n Laden as the head of al-Qaeda, another terrorist figure could take the re= ins of the organization in the event of a power struggle. U.S. officials s= ay that a potential alternative to the deeply unpopular al-Zawahri is forme= r Pakistani commando Ilyas Kashmiri, who has been linked to several terrori= st plots. For example, Kashmiri--who joined the terrorist group Harakat ul= Jihad-i-Islami after leaving the Pakistani military--is thought to be a ma= in figure in the suspected plot to launch Mumbai-style terrorist attacks in= several European cities. The State Department issued a travel advisory in= response to that plot last October. Court documents also show that Kashmi= ri wanted to get American citizens to travel to Pakistan so that he could t= rain them to bomb buildings and bridges in the United States. Kashmiri als= o =0Ais suspected of providing surveillance video of the Copenhagen offices= of Jyllands-Posten, the Danish newspaper that published controversial cart= oons of the Prophet Mohammed, to several suspects in the planned attack on = the paper. Kashmiri has been indicted in the case of a Chicago businessman= who is charged with protecting a Pakistani-American man who conducted surv= eillance for the 2008 Mumbai attacks and plotted to attack the Jyllands-Pos= ten. From "Elusive Ex-Commando to Replace Bin Laden?" MSNBC (05/10/11) Isikoff, Michael INTELLIGENCE AND NATIONAL SECURITY NEWS Rob Strayer to Lead National Security Preparedness Group Rob Strayer has been appointed director of the Bipartisan Policy Center's N= ational Security Preparedness Group. Strayer previously served as the Repu= blican Deputy Staff Director for Sen. Susan Collins (R-ME) on the U.S. Sena= te Homeland Security and Governmental Affairs Committee. He supervised the= development of national security legislation and oversight investigations.= During his tenure at the committee, Strayer oversaw legislation related t= o bioterrorism and cyber security, and was the point person for Collins on = the Security and Accountability for Every (SAFE) Port Act of 2006 and the I= mplementing Recommendations of the 9/11 Commission Act of 2007. BPC's Nati= onal Security Preparedness Group is the successor to the 9/11 Commission. = "Rob's leadership and experience on the committee will greatly benefit the = project as it continues to monitor the implementation of the 9/11 Commissio= n =0Arecommendations and report on new national intelligence threats," says= BPC Senior Vice President David Conover. The National Security Preparedne= ss Group is composed of a distinguished bipartisan group of experts, includ= ing former Homeland Security Advisor and INSA Chairwoman Frances Townsend, = former U.S. Secretary of Energy and U.S. Senator E. Spencer Abraham, Peter = Bergen, Dr. Stephen Flynn, Dr. John Gannon, Dr. Bruce Hoffman, former Congr= essman Dave McCurdy, former Attorney General Edwin Meese III, former U.S. S= ecretary of Homeland Security and Governor of Pennsylvania Tom Ridge, forme= r U.S. Attorney General Richard L. Thornburgh, and former Congressman Jim T= urner.