From "White House Calls for Internet Identity Ecosystem to Protect Online U= sers" eWeek (01/07/11) Rashid, Fahmida Y. JASON: Science of Cyber Security Needs More Work The JASON independent scientific advisory panel has produced a report on cy= ber security for the DoD that says a fundamental understanding of the scien= ce of cyber security is needed to improve the country's security approaches= . The advisory panel report says the science of cyber security "seems unde= rdeveloped in reporting experimental results, and consequently in the abili= ty to use them." The report also notes that the science of cyber security = is unique in that the background for events is almost completely created by= humans and is digital, and there are good actors as well as adversaries wh= o are purposeful and intelligent. JASON also addresses the importance of d= efinitions, the need for a standard vocabulary to discuss the subject, and = the need to devise experimental protocols for developing a reproducible exp= erimental science of cyber security. The report offers some stimulating ob= servations, =0Awrites the Federation of American Scientists' Steven Aftergo= od, such as how cyber security shares aspects with other fields of science,= and how these other disciplines provide helpful research directions. "At = the most abstract level, studying the immune system suggests that cyber sec= urity solutions will need to be adaptive, incorporating learning algorithms= and flexible memory mechanisms," the report says. JASON also says that Do= D should support a network of cyber security research centers in universiti= es and elsewhere. From "JASON: Science of Cyber Security Needs More Work" Secrecy News (12/14/10) Aftergood, Steven _______________________________________________________________________ (c)Copyright 2011 Information, Inc. Use this link to unsubscribe: http://www.magnetmail.net/Actions/unsubscribe.cfm?message_id=3D1205173&user= _id=3DINSA&recipient_id=3D661651072&email=3Dkhijazi@unveillance.com&group_id= =3D395485 --_NextPart_000_1205173_2011112_1115399 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable

= Click here to view a web based version of this email.

INSA Insider =09 =09
=09
3D""=
=20 =20 =20 =20 =20 =20 =20 =20 =20 3D"InsiderSponsorship" =20 =20 =09
=A0
=09 =20 =20 =20 =20
=09

Announcement


Dear INSA Members,

As= we begin 2011, INSA is poised to build on the tremendous successes of 2010= with an even greater slate of programs and events in the new year.
Last year, INSA's Councils and Task Forces brought together individuals f= rom the private, public and academic sectors to examine a series of issues = affecting the Intelligence Community. In addition, INSA's events including = the William Oliver Baker Dinner, the Alex Wetherbee Charity Golf Tournament= and the inaugural INSA Achievement Awards all offered an opportunity for t= he INSA members to recognize and honor the achievements of a variety of ind= ividuals that have served our country.

Below is a preview of some o= f what you can expect from INSA in 2011:

=B7 Homeland Securi= ty Intelligence Council – Will host a series of smaller even= ts in three specific areas, culminating in a major event around the tenth a= nniversary of the September 11 attacks: defining HSI; analytical and tradec= raft issues; and the five greatest achievements and shortcomings of HSI pos= t 9/11.

=B7 SMART Change Seminar Series – Wil= l host its third and final panel session (Organization) next week. It inten= ds to brief the DNI and publish a white paper on its findings by March rega= rding the most effective ways for the IC to work with national fiscal reali= ties.

=B7 Cyber Security Council – Is current= ly examining a series of issues relating to cyber security, including cyber= intelligence and cloud computing.

=B7 Council on Innovation= and Technology – Will continue to examine the most effectiv= e ways technology can impact our community, including ways to spur innovati= on among start-up firms.

=B7 Organizational Conflict of Inte= rest Task Force – Presented the findings to Dawn Meyerriecks= , ADNI Acquisition and Technology. A white paper will be forthcoming.
If you are interested in participating or learning more about any of thes= e councils or task forces, please contact INSA's new Vice President of Poli= cy, Chuck Alsup, at calsup@insaonl= ine.org.


Thank you,

Frances Fragos Townsend
INSA= Chairwoman


Share =20 =20 =20 =20 =20 =20 =09 =20 =09 =20 =20 =20 =A0 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =09 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =A0 =20 =20 =20 =09 =20 =20 =20 =09

Events Calendar


=20 =20 =09 REGISTER TODAY!
INSA Mentoring Event Featuring Director Tish Long and Steve Cambone
Keynote Speakers:
Tish Long - Director, NGA;
Steve Camb= one - President and COO, Mission Solutions Group, QinetiQ North America, In= c.
Schedule:
Tuesday, January 25, 2011
6:00PM - 8:00PM
<= b>Location:
Sheraton National Hotel, Galaxy Ballroom
900 South Or= me St., Arlington, VA
Cost:
INSA Members and Non-INSA Members = $30; Students $20
To register with the student discount please email = Rachel Phillips at rphillips@in= saonline.org from your student email account.

SAVE THE DATE!
27th Annual William Oliver Bak= er Award Dinner
Schedule:
Friday, June 10, 2011
6:0= 0PM - 10:00PM
Location:
The Ritz-Carlton Tysons Corner
1700= Tysons Boulevard, McLean, VA 22102

INSA EVENT HIGHLIGHT= S

Check out highlights of past INSA events= online!

- Summaries available at www.insaonlin= e.org.
- Pictures available on INSA's Facebook Page.
- Video= clips available on INSA's YouTube Channel and the = CACI Video Library
.


=20 =20 =20

=20

Headlines


=20 Recap of Recent Events
=20 =20 =20 =20 2010 INSA Achievement Awards
=20 =20 =20 SMART Change Panel Two: Acquisition
=20
=20 =20 Advertisement
=20 =20 =20 =20 The Intelligence & Security Academy offers courses for = individual enrollment this Spring via the OPEN INTELLACADEMY™! Check = out our new courses!
=20
=20 =20 =20 =20 =20 =20 =20 Top Story
Congress Faces Series of Homeland Security Decisions

=20 =20 =20 =20 =20 =20 =20 Commentary and Analysis
The Top 20 People to Watch in 2011
Increased CIA Activity Stretches Agency Resources Schmidt Says Cyber Threat Distorted by Media
Can Trains, Subways Be Protected From Terrorists? Napolitano Outlines DHS Cybersecurity Focus

=20 =20 =20 =20 =20 =20 =20 Intelligence and National Security News
Arizona Shooting Prompts Fresh Look at Protecting Lawma= kers
Michael Sheehan Picked for Special-Ops Chief
NSA Marks Start of Work on Utah Cyber Center
Slow Progress for Cyber War Rules of Engagement

=20 =20 =20 =20 =20 =20 =20 Business of Intelligence
Pentagon Issues Conflict of Interest Rule for Contracto= rs
White House Calls for Internet Identity Ecosystem JASON: Science of Cyber Security Needs More Work


=20 =20

Recap of Recent Events


=20 =09
2010 INSA Achievement Awards

The first Annual= INSA Achievement Awards were presented on Wednesday, December 15. The eve= ning was a tremendous success. The inaugural event honored five young memb= ers of the intelligence and national security community for their distingui= shed service to the country and their field. The recipients were Andrew Ba= dger, Harvard University, Matthew Kregor, DEA, Laura Foster, LMI Consulting= , Lieutenant Joseph Michaels, US Navy, and Sergeant Gustavo Rodriguez, NYPD= . These talented young professionals were selected for their leadership, m= ission accomplishments, potential for growth and their emerging professiona= l standing and influence. The presenters of the awards reiterated the impo= rtance of newer members to the Community and the importance of the work the= y already have and will continue to accomplish as they face new challenges = to protect national security.

Click here to read more about = the 2010 INSA=A0Achievement Awards and to view pictures!
Share =20 =20 =20 =20 =20 =20 =09 =20 =09 =20 =20 =20 =A0 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =09 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =A0 =20 =20 =20 =09 =20 =20 =20 | =09 Return to Headlines
=20 =20
SMART Change Panel Two: Acquisition
<= br> On Wednesday, December 15, INSA held the second event of a series of panel = discussions entitled "SMART Change: Lessons of the Past." Led by Joan Demp= sey, former Deputy Director of Central Intelligence for Community Managemen= t, this series provides a much-needed forum to discuss how previous budget = cuts were implemented and what lessons can be learned from the past as the = intelligence community confronts increasingly tighter financial realities. = Panelists included Dr. Ruth David, President and CEO, ANSER, and former De= puty Director for Science and Technology of CIA; Martin Faga, Board of Trus= tees, MITRE and former Director of the NRO; Larry Kindsvater, President and= CEO, Kindsvater Consulting, and former Deputy Director of Central Intellig= ence for Community Management; and Al Munson, Senior Fellow and Member, Boa= rd of Regents, Potomac Institute for Policy Studies, and former Deputy Dire= ctor of National Intelligence for Acquisition.

The panelists opene= d the discussion with short remarks on the key issues surrounding acquisiti= on, especially during budget constraints. Panelists discussed the importan= ce of identifying and prioritizing the vital strategic missions for our nat= ional security and evaluating what capabilities the community needs to serv= e those missions. Another key point was the importance of maintaining flex= ibility in acquisition processes as related to technology. The pace of tec= hnological change is so rapid that it outstrips current budgeting and acqui= sition processes and requires a different approach. Panelists also stresse= d the importance of removing emotions from budget deliberations on the feas= ibility of and potential reductions in any acquisition program.

A = dynamic and knowledgeable discussion among the participants and panelists f= ollowed the opening remarks. Participants as well as panelists were curren= t and former government employees with experience in implementing the budge= t constraints of the 1990s in the Intelligence Community. Many participan= ts emphasized the need for a competent acquisition workforce with an adequa= te technical background, experience, and involvement in acquisition process= es, not just training.

The last SMART Change session will addres= s the impact of budget cuts on organization, while the previous session add= ressed the impact on manpower and personnel. The INSA SMART Change panel s= eries is an exceptional opportunity for a diverse group of senior experts f= rom the government and the private sectors to discuss the increasingly pres= sing issues that currently impact the Intelligence Community. More informa= tion about the SMART Change Task Force is available at www.insaonline.org.

Share =20 =20 =20 =20 =20 =20 =09 =20 =09 =20 =20 =20 =A0 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =09 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =A0 =20 =20 =20 =09 =20 =20 =20 | =09 Return to Headlines
=20 =20 =20
=20 =20

Advertisement


=20 =09
The Intelligence & Security Academy offers cou= rses for individual enrollment this Spring via the OPEN INTELLACADEMY&trade= ;! Check out our new courses!

The Intelligence & Security Academy brings to bear decades of senior execut= ive experience in intelligence, national security and policy analysis. Each= of the Academy's courses is a dynamic, compact and highly informative expl= oration of a key intelligence issue. Courses are unclassified and presente= d at our facility in Reston, Virginia.

-History of U.S. Intelligence= – March 1
-Introduction to U.S. Intelligence – March 2
-= Intelligence Concepts for Cyber Conflict: Basic – March 8
-Cyber C= ollections – March 9-10
-Homeland Security Intelligence – Ma= rch 15
-Intelligence Budget Process – March 16-17
-National Sec= urity Policy Process – March 22
-Analyst Training: Writing Analysi= s; Preparing Briefings – March 23-24
-GEOINT 101 – March 29<= br>-TECHINT – March 30-31
-Intelligence Concepts for Cyber Conflic= t: Advanced – April 5-6
-Risk Awareness Intelligence – April= 12-13
-Mid-East Cultural Intelligence – April 14
-Intelligenc= e and the Law – April 27
-Operational Intelligence – April 2= 8
-Countering Terrorism Finance – May 3

Please visi= t us at http://intellacademy.com/courses/open-intellac= ademy/ for course descriptions, discounts, and on-line enrollment!

=20 =20 =20
=20
=20 =20 =20 =20 =20 =20 =20 =09 =20

Top Story


=20 Congress Faces Series of Homeland Security Decisions

A series of homeland security issues are expected to be taken up by = lawmakers and key congressional committees via legislation and hearings in = the coming months. Senate Majority Leader Sen. Harry Reid (D-Nev.) wrote t= o the president prior to the Christmas recess in which he signaled his inte= nt "to bring cyber security legislation to the Senate floor for considerati= on early in the 112th Congress," and stressed that the White House should p= rovide input on the matter. Reid wants to merge cyber security provisions = from bills written by the Senate Homeland Security and Governmental Affairs= Committee and the Senate Commerce Committee with feedback from lawmakers o= n other key committees such as Judiciary and Intelligence. Last year, lawm= akers attempted to craft immigration legislation but a deal failed to mater= ialize, largely because of GOP objections that the effort to secure U.S. bo= rders was insufficient. Both House and Senate Homeland Security committees= are expected to exercise border security oversight, though it was uncertai= n if either would try to draft standalone legislation. The Senate panel al= so intends to consider bolstering programs aimed at thwarting terrorists fr= om traveling to the United States, while House Republicans are planning to = carefully scrutinize the Obama administration's immigration enforcement ini= tiatives. A spokeswoman for House Judiciary Committee Chairman Rep. Lamar = Smith (R-Texas) says he wants to broaden the federal E-Verify program, whic= h lets employers confirm the legal status of employees. His panel is expec= ted to consider a proposal that would give businesses incentives to use the= program, along with liability protection if they are found to have employe= d illegal workers. This year could be the year when both chambers pass the= first DHS authorization bill, according to House and Senate aides. House = Homeland Security Committee Chairman Rep. Peter King (R-N.Y.) says he expec= ts a bill to be drafted by May at the latest.

From "Congress Faces Series of Homeland Security Decisions"
National Journal (01/07/11) Strohm, Chris
=09 Web Link
=09 =20 Share =A0 =A0=20 | Return to Headlines

=20


=20 =20 =20 =20 =20 =20 =20 =09 =20

Commentary and Analysis


The Top 20 People to Watch in 2011

Among the people deemed by ExecutiveBiz to be the most potentially s= ignificant players in 2011 is DNI Gen. James Clapper, who is working to bui= ld the intelligence community into an integrated team. Clapper's course si= nce taking over ODNI has been one of consolidation and streamlining to boos= t the agency's internal efficiencies, and he has taken note of the part gov= ernment contractors can play... (More)

From "The Top 20 People to Watch in 2011"
ExecutiveBiz (12/14/10) Garrettson, Jim
=09 Web Link
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines

=20 Increased CIA Activity Stretches Agency Resources

The CIA had far more staff in the combat theater in 2010 than at any= time since the Vietnam War, and some agency veterans say the CIA is waging= this campaign with a pool of talent that has not yet fully bounced back fr= om budget cuts in human intelligence programs during the 1990s. "The [int= elligence community] lost the equivalent of 23,000 positions in the 1990s d= ue to the 'peace dividend,'... (More)

From "2010: CIA Ramps Way Up"
Washington Post (12/30/10) Stein, Jeff
=09 Web Link
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines

=20 Schmidt Says Cyber Threat Distorted by Media

U.S. vulnerability to cyber attack has been distorted by the media, = according to White House cyber security czar Howard Schmidt. Although he a= cknowledges that a successful attack on a segment of the U.S. power grid is= certainly possible, he does not think that it will lead to catastrophic fa= ilure. Disruption by Internet activists, as demonstrated by actions agains= t companies that ended their... (More)

From "Howard Schmidt"
Newsweek (12/21/10) Wolff, Josephine
=09 Web= Link
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines

=20 Can Trains, Subways Be Protected From Terrorists?

Although top security officials say they are upgrading subway and ra= il defenses against terrorist attacks across the United States, an analysis= by USA Today uncovered serious vulnerabilities, including many that may be= impossible to address. Former DHS Inspector General Clark Kent Ervin says= mass transit systems are far less secure than the aviation sector or key g= overnment buildings. U.S.... (More)

From "Can Trains, Subways Be Protected From Terrorists?"
USA Today (12/27/10) P. 1B Stoller, Gary
=09 Web Link
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines

=20 Napolitano Outlines DHS Cybersecurity Focus

The DHS Quadrennial Homeland Security Review outlined the department= 's key missions, and that included the security of cyber space, says DHS Se= cretary Janet Napolitano. The importance the review accorded to cyber spac= e protection is reflective of "the fundamental understanding that we have o= n the importance of the problem," she says. Napolitano notes that cyber se= curity is about partnerships... (More)

From "Napolitano Outlines DHS Cybersecurity Focus"
GovInfoSecurity.com (12/20/10) Napolitano, Janet
=09 Web Link
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines


=20 =20 =20 =20 =20 =20 =20 =09 =20

Intelligence and National Security News

=
Arizona Shooting Prompts Fresh Look at Protecting Lawmakers

Lawmakers and those who handle their safety are taking a hard look a= t the risks posed by people they might have dismissed previously while keep= ing access to constituents open in the wake of the Arizona shootings. "In = each district you represent your share of unstable people," says Rep. Jack = Kingston (R-Ga.). "Now you are aware that they do show up at your town hal= l meetings and maybe they are... (More)

From "After Shooting, Fresh Look at Protecting Lawmakers"
New York Times (01/09/11) Hulse, Carl; Parker, Ashley
=09 Web Link
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines

=20 Michael Sheehan Picked for Special-Ops Chief

Former U.S. counterterrorism ambassador Michael Sheehan has been off= ered the top Pentagon post to oversee clandestine special operations assaul= ts and covert drone strikes targeting terrorist groups, say two senior U.S.= officials. The current Assistant Secretary of Defense for Special Operati= ons/Low-Intensity Conflict and Interdependent Capabilities, Michael Vickers= , is awaiting his own... (More)

From "US Officials: White House Picks Special-Ops Chief"
Associated Press (01/03/11) Dozier, Kimberly
=09 Web Link=
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines

=20 NSA Marks Start of Work on Utah Cyber Center

Construction has begun on NSA's new cyber security center at Camp Wi= lliams near Salt Lake City. Workers at the 200-acre facility will be charg= ed with helping DHS and other agencies protect national security networks a= nd identify threats to cyber security. The facility, which will cost $1.2 = billion to build, will have enough computer servers to cover nearly 1 milli= on square feet of space and... (More)

From "Officials Mark Start of Work on Utah Cyber Center"
Associated Press (01/07/11) Loftin, Josh
=09 Web Link
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines

=20 Slow Progress for Cyber War Rules of Engagement

Rules of cyber war engagement are lagging behind world powers' devel= opment of their cyber warfare capabilities. Sources say U.S. officials hav= e held preliminary dialogues with their Russian equivalents on the use of c= yber weapons, as well as with the Chinese, unofficially. Although the Cent= er for Strategic and International Studies' James Lewis notes that "you've = gotten at least the start" of... (More)

From "Rules of Engagement for Cyberwars See Slow Progress"
Financial Times (12/28/10) Menn, Joseph
=09 Web Link
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines


=20 =20 =20 =20 =20 =20 =20 =09 =20

Business of Intelligence


Pentagon Issues Conflict of Interest Rule for Contractors<= br>
The Pentagon recently released a new rule on organizational conflict= s of interests that directs contracting officers to promote competition, an= d which is applicable "to the most important defense programs," according t= o McKenna Long & Aldridge lawyer Thomas C. Papson. He says contractors tha= t supply engineering or analysis support "cannot then subsequently supply t= he weapon systems that come... (More)

From "Pentagon Issues Conflict of Interest Rule for Contractors"
Capital Business (01/03/11) Censer, Marjorie
=09 Web Link=
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines

=20 White House Calls for Internet Identity Ecosystem

The Obama Administration has announced a plan to establish an Intern= et identity ecosystem that will lower the incidence of fraud and identity t= heft while making online transactions simpler. Commerce Secretary Gary Loc= ke and White House Cyber Security Coordinator Howard Schmidt outlined the e= cosystem's framework at the Stanford Institute for Economic Policy Research= . The guidelines for the... (More)

From "White House Calls for Internet Identity Ecosystem to Protect Onli= ne Users"
eWeek (01/07/11) Rashid, Fahmida Y.
=09 Web Link
=09 =20 Share =20 = =A0 =A0=20 | Return to Headlines

=20 JASON: Science of Cyber Security Needs More Work

The JASON independent scientific advisory panel has produced a repor= t on cyber security for the DoD that says a fundamental understanding of th= e science of cyber security is needed to improve the country's security app= roaches. The advisory panel report says the science of cyber security "see= ms underdeveloped in reporting experimental results, and consequently in th= e ability to use them." The... (More)

From "JASON: Science of Cyber Security Needs More Work"
Secrecy News (12/14/10) Aftergood, Steven
=09 Web Link
=09 =20 Share =20 =A0 =A0=20 | Return to Headlines


=20
Abstract News =A9 Copyright 2011 INFORMATION, INC.
3D"Powered
=09
January 11, 2011
Issue #30
=09
=09 =09
=20
=20 =


=20 =20 =20

Sponsored By:
=20 =20 =20 =20 =20 =20 =20 =20 =20 3D"CACI" =20 =20 =09
=09 =20 =20 =20 =20 =20 =20
=09
=20

Find INSA Online


=20 =09


=20 =20 =20

=20


=20 =20

INSA Events


=20 =09 THIS MONTH

Thur= sday, January 20, 2011: INSA Seminar Series - SMART Change: Lesson= s of the Past (Part 3 - Organization) - Invite Only

Tuesda= y, January 25, 2011: INSA Mentoring Event Featuring Keynote Speake= rs Tish Long and Steve Cambone

SAVE TH= E DATE

Friday, June 10, 2011: 27th A= nnual William Oliver Baker Award Dinner

<= u>FUTURE EVENTS

February 2011: INSA'= s Homeland Security Intelligence Council Winter Mixer with FBI

February 2011: INSA Seminar Series - SMART Change Leadership = Dinner

February 2011: INSA Homeland Security Inte= lligence Council - FED Day

March 2011: The Future= of Intelligence Analysis Tradecraft Conference

April 2011= : INSA Homeland Security Intelligence Council Hill Mixer/Law Enfor= cement Day

April 2011: INSA IC Industry Day & OCI= Conference

May 2011: Cyber Security Conference
May 2011: Alex Wetherbee Charity Golf Tournament
September 2011: INSA Homeland Security Intelligenc= e Council Dinner



=20 =20 =20

=20 =20 =20

=20 =09 =B7 Tuesday, January 18: Council on Innovative Technologie= s Meeting

=B7 Wednesday, January 19: Homeland Secur= ity Intelligence Council Meeting

=B7 Friday, January 21: INSA Executive Committee Meeting

=20 =20 =20
=20 =20 =20
=20 =09
Intelligence Community Acquisition & Development
Fall 2010=
A joint AFCEA/INSA white paper regarding the acquisition and developmen= t of technology programs in the national security community, with an effort= to contribute to the ongoing national discussion regarding ways to strengt= hen the Intelligence Community. AFCEA and INSA, working collaboratively, ar= e prepared to provide the setting for discussions and facilitate the proces= s.
Click here to read this paper.

Addressing Cyber Security Through Public - Private Partners= hip: An Analysis of Existing Models
November 2009
An INSA = white paper reviewing historical models for public - private partnership an= d outlining an approach to cyber security based on public - private collabo= ration and coordination.
Click here to read this p= aper.

Counterintelligence for the 21st Century
= September 2009
An INSA paper to help frame the debate on an issue of= high priority to US national security. The paper identifies six major chal= lenges that the DNI faces in the future and makes ten recommendations to be= gin fixing CI.
Click here to read this= paper.

Critical Issues for Cyber Assurance Policy Reform=
March 2009
An INSA paper in support of the presidentially= commissioned task to conduct a comprehensive cyber security study. The pap= er used three question sets to frame the debate and made recommendations fo= r each question set.
C= lick here to read this paper.

Critical Issues for Intelli= gence Acquisition Reform
October 2008
An INSA paper provid= ing industry's assessment of the Intelligence Community acquisition process= . The paper identifies eight areas of concern that are critical to the crea= tion of an efficient acquisition process responsive to the nation's intelli= gence needs and proposes five recommendations to address these issues.
= Click here to read this paper.

Improving Security Whil= e Managing Risk
October 2007
An INSA paper on transforming= the government's personnel security system to make it work better, faster = and more efficiently. The paper makes six recommendations to dramatically i= mprove and enhance the way personnel security works.
Click here to read this pa= per.


=20 =20 =20 =09

About INSA


INSA is the premier intelligence and national security organization that br= ings together the public, private and academic sectors to collaborate on th= e most challenging policy issues and solutions. As a non-profit, non-parti= san, public-private organization, INSA's ultimate goal is to promote and re= cognize the highest standards within the national security and intelligence= communities. INSA has over 100 corporate members and nearly 1,200 individ= ual members who are leaders and senior executives throughout government, th= e private sector and academia. =20 To learn more about INSA visit www.insaonline.org.

INSA Insider is an executive summary of noteworthy = articles pertaining to the business of intelligence, national and homeland = security, and other vital issues of importance to our members. I= NSA Insider is distributed twice each month to INSA members as= an exclusive membership benefit. Our editorial staff monitors nearly 12,00= 0 newspapers, business publications, web sites, national and international = wire services, and other periodicals and summarizes significant articles in= to an easy-to-read summary.=20
For more information about INSA, the INSA Insider, = to suggest an article to be covered in a future issue or to sponsor an upco= ming issue of the Insider, contact:

=20 Jeff Lavine
INSA
901 North Stuart Street,
Suite 205
Arlington, VA 22203
Phone (703) 224-4672
Fax (703) 224-4681
Email: insider@insaonline.org
=20
=09

Click here to unsub= scribe.


=0A --_NextPart_000_1205173_2011112_1115399-- From - Sat May 21 19:33:40 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.223.83.142 with SMTP id f14cs951732fal; Tue, 11 Jan 2011 14:33:29 -0800 (PST) Received: by 10.229.239.6 with SMTP id ku6mr165296qcb.85.1294785207843; Tue, 11 Jan 2011 14:33:27 -0800 (PST) Return-Path: Received: from mail236.magnetmail.net (mail236.magnetmail.net [209.18.70.236]) by mx.google.com with ESMTP id p13si54171615qcu.85.2011.01.11.14.33.25; Tue, 11 Jan 2011 14:33:27 -0800 (PST) Received-SPF: pass (google.com: domain of return@mmsend28.com designates 209.18.70.236 as permitted sender) client-ip=209.18.70.236; Authentication-Results: mx.google.com; spf=pass (google.com: domain of return@mmsend28.com designates 209.18.70.236 as permitted sender) smtp.mail=return@mmsend28.com Received: from MAGNETMAIL1 (172.16.236.1) by mail236.magnetmail.net id h5jdb20ir208 for ; Tue, 11 Jan 2011 17:33:20 -0500 (envelope-from ) Date: Tue, 11 Jan 2011 17:33:18 -0500 From: INSA Insider To: Subject: INSA Insider - January 11 X-TokenInfo-NoToken: X-Bps1: 7644118984 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="_NextPart_000_1204689_2011111_173318422" Message-Id: <4D2CDAB0.0000013C@mail236.magnetmail.net> --_NextPart_000_1204689_2011111_173318422 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable To see the web version of this message click here: =0Ahttp://www.magnetmail= .net/actions/email_web_version.cfm?recipient_id=3D661651072&messa= ge_id=3D1204689&user_id=3DINSA=0A=0DINSA Insider January 11, 2011 Issue #30 _______________________________________________________________________ ANNOUNCEMENT Dear INSA Members, As we begin 2011, INSA is poised to build on the tremendous successes of 20= 10 with an even greater slate of programs and events in the new year. =20 Last year, INSA's Councils and Task Forces brought together individuals fro= m the private, public and academic sectors to examine a series of issues af= fecting the Intelligence Community. In addition, INSA's events including th= e William Oliver Baker Dinner, the Alex Wetherbee Charity Golf Tournament a= nd the inaugural INSA Achievement Awards all offered an opportunity for the= INSA members to recognize and honor the achievements of a variety of indiv= iduals that have served our country.=20 Below is a preview of some of what you can expect from INSA in 2011: * Homeland Security Intelligence Council - Will host a series of smaller ev= ents in three specific areas, culminating in a major event around the tenth= anniversary of the September 11 attacks: defining HSI; analytical and trad= ecraft issues; and the five greatest achievements and shortcomings of HSI p= ost 9/11. * SMART Change Seminar Series - Will host its third and final panel session= (Organization) next week. It intends to brief the DNI and publish a white = paper on its findings by March regarding the most effective ways for the IC= to work with national fiscal realities. * Cyber Security Council - Is currently examining a series of issues relati= ng to cyber security, including cyber intelligence and cloud computing. * Council on Innovation and Technology - Will continue to examine the most = effective ways technology can impact our community, including ways to spur = innovation among start-up firms. * Organizational Conflict of Interest Task Force - Presented the findings t= o Dawn Meyerriecks, ADNI Acquisition and Technology. A white paper will be = forthcoming. If you are interested in participating or learning more about any of these = councils or task forces, please contact INSA's new Vice President of Policy= , Chuck Alsup, at calsup@insaonline.org. Thank you, Frances Fragos Townsend INSA Chairwoman _______________________________________________________________________ EVENTS CALENDAR REGISTER TODAY! INSA Mentoring Event Featuring Director Tish Long and Steve Cambone Keynote Speakers:=20 Tish Long - Director, NGA;=20 Steve Cambone - President and COO, Mission Solutions Group, QinetiQ North A= merica, Inc. Schedule: Tuesday, January 25, 2011 6:00PM - 8:00PM Location: Sheraton National Hotel, Galaxy Ballroom 900 South Orme St., Arlington, VA Cost: INSA Members and Non-INSA Members $30; Students $20 To register with the student discount please email Rachel Phillips at rphil= lips@insaonline.org from your student email account. SAVE THE DATE! 27th Annual William Oliver Baker Award Dinner Schedule: Friday, June 10, 2011 6:00PM - 10:00PM Location: The Ritz-Carlton Tysons Corner 1700 Tysons Boulevard, McLean, VA 22102 INSA EVENT HIGHLIGHTS Check out highlights of past INSA events online! - Summaries available at www.insaonline.org. - Pictures available on INSA's Facebook Page. - Video clips available on INSA's YouTube Channel and the CACI Video Librar= y. _______________________________________________________________________ HEADLINES INSA WHITE PAPERS - RESOURCE CENTER 2010 INSA Achievement Awards SMART Change Panel Two: Acquisition ADVERTISEMENT The Intelligence & Security Academy offers courses for individual enrollmen= t this Spring via the OPEN INTELLACADEMYTM! Check out our new courses! TOP STORY "Congress Faces Series of Homeland Security Decisions" COMMENTARY AND ANALYSIS "The Top 20 People to Watch in 2011" "Increased CIA Activity Stretches Agency Resources" "Schmidt Says Cyber Threat Distorted by Media" "Can Trains, Subways Be Protected From Terrorists?" "Napolitano Outlines DHS Cybersecurity Focus" INTELLIGENCE AND NATIONAL SECURITY NEWS "Arizona Shooting Prompts Fresh Look at Protecting Lawmakers" "Michael Sheehan Picked for Special-Ops Chief" "NSA Marks Start of Work on Utah Cyber Center" "Slow Progress for Cyber War Rules of Engagement" BUSINESS OF INTELLIGENCE "Pentagon Issues Conflict of Interest Rule for Contractors" "White House Calls for Internet Identity Ecosystem" "JASON: Science of Cyber Security Needs More Work" _______________________________________________________________________ NEWSBRIEFS INSA WHITE PAPERS - RESOURCE CENTER 2010 INSA Achievement Awards The first Annual INSA Achievement Awards were presented on Wednesday, Decem= ber 15. The evening was a tremendous success. The inaugural event honored= five young members of the intelligence and national security community for= their distinguished service to the country and their field. The recipient= s were Andrew Badger, Harvard University, Matthew Kregor, DEA, Laura Foster= , LMI Consulting, Lieutenant Joseph Michaels, US Navy, and Sergeant Gustavo= Rodriguez, NYPD. These talented young professionals were selected for the= ir leadership, mission accomplishments, potential for growth and their emer= ging professional standing and influence. The presenters of the awards rei= terated the importance of newer members to the Community and the importance= of the work they already have and will continue to accomplish as they face= new challenges to protect national security.=20 Click here to read more about the 2010 INSA Achievement Awards and to = view pictures!=20 SMART Change Panel Two: Acquisition On Wednesday, December 15, INSA held the second event of a series of panel = discussions entitled "SMART Change: Lessons of the Past." Led by Joan Demp= sey, former Deputy Director of Central Intelligence for Community Managemen= t, this series provides a much-needed forum to discuss how previous budget = cuts were implemented and what lessons can be learned from the past as the = intelligence community confronts increasingly tighter financial realities. = Panelists included Dr. Ruth David, President and CEO, ANSER, and former De= puty Director for Science and Technology of CIA; Martin Faga, Board of Trus= tees, MITRE and former Director of the NRO; Larry Kindsvater, President and= CEO, Kindsvater Consulting, and former Deputy Director of Central Intellig= ence for Community Management; and Al Munson, Senior Fellow and Member, Boa= rd of Regents, Potomac Institute for Policy Studies, and former Deputy Dire= ctor =0Aof National Intelligence for Acquisition. The panelists opened the discussion with short remarks on the key issues su= rrounding acquisition, especially during budget constraints. Panelists dis= cussed the importance of identifying and prioritizing the vital strategic m= issions for our national security and evaluating what capabilities the comm= unity needs to serve those missions. Another key point was the importance = of maintaining flexibility in acquisition processes as related to technolog= y. The pace of technological change is so rapid that it outstrips current = budgeting and acquisition processes and requires a different approach. Pan= elists also stressed the importance of removing emotions from budget delibe= rations on the feasibility of and potential reductions in any acquisition p= rogram. A dynamic and knowledgeable discussion among the participants and panelists= followed the opening remarks. Participants as well as panelists were curr= ent and former government employees with experience in implementing the bud= get constraints of the 1990s in the Intelligence Community. Many particip= ants emphasized the need for a competent acquisition workforce with an adeq= uate technical background, experience, and involvement in acquisition proce= sses, not just training. =20 The last SMART Change session will address the impact of budget cuts on org= anization, while the previous session addressed the impact on manpower and = personnel. The INSA SMART Change panel series is an exceptional opportunit= y for a diverse group of senior experts from the government and the private= sectors to discuss the increasingly pressing issues that currently impact = the Intelligence Community. More information about the SMART Change Task F= orce is available at www.insaonline.org. ADVERTISEMENT INSA'S FUTURE EVENTS THIS MONTH Thursday, January 20, 2011: INSA Seminar Series - SMART Change: Lessons of = the Past (Part 3 - Organization) - Invite Only Tuesday, January 25, 2011: INSA Mentoring Event Featuring Keynote Speakers = Tish Long and Steve Cambone SAVE THE DATE Friday, June 10, 2011: 27th Annual William Oliver Baker Award Dinner FUTURE EVENTS February 2011: INSA's Homeland Security Intelligence Council Winter Mixer w= ith FBI February 2011: INSA Seminar Series - SMART Change Leadership Dinner February 2011: INSA Homeland Security Intelligence Council - FED Day March 2011: The Future of Intelligence Analysis Tradecraft Conference April 2011: INSA Homeland Security Intelligence Council Hill Mixer/Law Enfo= rcement Day April 2011: INSA IC Industry Day & OCI Conference May 2011: Cyber Security Conference May 2011: Alex Wetherbee Charity Golf Tournament September 2011: INSA Homeland Security Intelligence Council Dinner October 2011: DIA Anniversary Ball=20 * Tuesday, January 18: Council on Innovative Technologies Meeting * Wednesday, January 19: Homeland Security Intelligence Council Meeting * Friday, January 21: INSA Executive Committee Meeting =20 Intelligence Community Acquisition & Development Fall 2010 A joint AFCEA/INSA white paper regarding the acquisition and development of= technology programs in the national security community, with an effort to = contribute to the ongoing national discussion regarding ways to strengthen = the Intelligence Community. AFCEA and INSA, working collaboratively, are pr= epared to provide the setting for discussions and facilitate the process. Click here to read this paper. Addressing Cyber Security Through Public - Private Partnership: An Analysis= of Existing Models November 2009 An INSA white paper reviewing historical models for public - private partne= rship and outlining an approach to cyber security based on public - private= collaboration and coordination. Click here to read this paper. Counterintelligence for the 21st Century September 2009 An INSA paper to help frame the debate on an issue of high priority to US n= ational security. The paper identifies six major challenges that the DNI fa= ces in the future and makes ten recommendations to begin fixing CI. Click here to read this paper. Critical Issues for Cyber Assurance Policy Reform March 2009 An INSA paper in support of the presidentially commissioned task to conduct= a comprehensive cyber security study. The paper used three question sets t= o frame the debate and made recommendations for each question set.=20 Click here to read this paper. Critical Issues for Intelligence Acquisition Reform October 2008 An INSA paper providing industry's assessment of the Intelligence Community= acquisition process. The paper identifies eight areas of concern that are = critical to the creation of an efficient acquisition process responsive to = the nation's intelligence needs and proposes five recommendations to addres= s these issues.=20 Click here to read this paper. Improving Security While Managing Risk October 2007 An INSA paper on transforming the government's personnel security system to= make it work better, faster and more efficiently. The paper makes six reco= mmendations to dramatically improve and enhance the way personnel security = works. Click here to read this paper. TOP STORY Congress Faces Series of Homeland Security Decisions A series of homeland security issues are expected to be taken up by lawmake= rs and key congressional committees via legislation and hearings in the com= ing months. Senate Majority Leader Sen. Harry Reid (D-Nev.) wrote to the p= resident prior to the Christmas recess in which he signaled his intent "to = bring cyber security legislation to the Senate floor for consideration earl= y in the 112th Congress," and stressed that the White House should provide = input on the matter. Reid wants to merge cyber security provisions from bi= lls written by the Senate Homeland Security and Governmental Affairs Commit= tee and the Senate Commerce Committee with feedback from lawmakers on other= key committees such as Judiciary and Intelligence. Last year, lawmakers a= ttempted to craft immigration legislation but a deal failed to materialize,= largely because of GOP objections that the effort to secure U.S. borders w= as =0Ainsufficient. Both House and Senate Homeland Security committees are= expected to exercise border security oversight, though it was uncertain if= either would try to draft standalone legislation. The Senate panel also i= ntends to consider bolstering programs aimed at thwarting terrorists from t= raveling to the United States, while House Republicans are planning to care= fully scrutinize the Obama administration's immigration enforcement initiat= ives. A spokeswoman for House Judiciary Committee Chairman Rep. Lamar Smit= h (R-Texas) says he wants to broaden the federal E-Verify program, which le= ts employers confirm the legal status of employees. His panel is expected = to consider a proposal that would give businesses incentives to use the pro= gram, along with liability protection if they are found to have employed il= legal workers. This year could be the year when both chambers pass the fir= st DHS =0Aauthorization bill, according to House and Senate aides. House H= omeland Security Committee Chairman Rep. Peter King (R-N.Y.) says he expect= s a bill to be drafted by May at the latest. --_NextPart_000_1204689_2011111_173318422-- From "Congress Faces Series of Homeland Security Decisions" National Journal (01/07/11) Strohm, Chris COMMENTARY AND ANALYSIS The Top 20 People to Watch in 2011 Among the people deemed by ExecutiveBiz to be the most potentially signific= ant players in 2011 is DNI Gen. James Clapper, who is working to build the = intelligence community into an integrated team. Clapper's course since tak= ing over ODNI has been one of consolidation and streamlining to boost the a= gency's internal efficiencies, and he has taken note of the part government= contractors can play in fulfilling intelligence goals. Cyber security coo= rdinator Howard Schmidt, currently in the second year of his tenure, is out= lining a new series of cyber policymaking priorities. Schmidt led the offi= cial opening of a cyber security operations center, part of the Multi-State= Information Sharing and Analysis Center in New York. He says the center's= opening signals "a significant step forward toward enhancing the cyber sec= urity of our state, local, territorial, and tribal partners." Meanwhile, g= overnment =0Aintelligence veteran Letitia Long is expected to instill a cle= ar focus within the National Geospatial Intelligence Agency with her appoin= tment as its director, and she is expected to be a person of note for contr= actors seeking to expand within the geospatial and cyber security arenas. = ManTech Chairman George Pedersen recently announced his firm's buyout of go= vernment contractor MTCSC. This came after ManTech's acquisition of Qineti= Q North America's Security and Intelligence Solutions unit. The most recen= t mergers send the message that ManTech is planning to sustain its penetrat= ion of key areas of defense and intelligence, making Pedersen a federal con= tractor to watch in 2011. As leader of the U.S. Cyber Command, Gen. Keith = Alexander is convinced of the inevitability of a destructive cyber attack a= gainst the United States. He also must contend with a DoD efficiency manda= te and how it =0Amight affect the Cyber Command's budget. From "The Top 20 People to Watch in 2011" ExecutiveBiz (12/14/10) Garrettson, Jim Increased CIA Activity Stretches Agency Resources The CIA had far more staff in the combat theater in 2010 than at any time s= ince the Vietnam War, and some agency veterans say the CIA is waging this c= ampaign with a pool of talent that has not yet fully bounced back from budg= et cuts in human intelligence programs during the 1990s. "The [intelligen= ce community] lost the equivalent of 23,000 positions in the 1990s due to t= he 'peace dividend,' which hit the IC far harder than Defense," says former= CIA intelligence official and INSA Executive Committee member Mark Lowenth= al. "Then we had the post-9/11 ramp up. Put those two demographics togeth= er--veterans departing, no fill-in behind them for years followed by an inf= lux of new people--and we have, arguably, the least experienced intell comm= unity since its formal inception in 1947 in both ops and analysis." Such a= ssertions are vehemently disputed by the CIA, with representative Jennifer = Youngblood =0Apointing to an influx of officers with "significant outside e= xperience and education" in the last 10 years. The CIA and many outside an= alysts support the idea that the agency achieved victory over al-Qaeda, as = far as containing Osama bin Laden and his lieutenant, Ayman al-Zawahiri, an= d preventing them from launching an attack similar to 9/11. Although some = analysts are concerned that the U.S.'s drone and paramilitary initiatives a= re eroding the CIA's primary espionage mission, a former senior officer say= s that such programs "often provide the agency with its best intelligence a= nd unique, excellent access to the top players ... in a country, some of wh= om become key long-term agents." However, the former official agrees that = the wars in Afghanistan and Iraq have drained collection capabilities and a= ppropriate policy attention in other key regions of the globe, and this is = "possibly ... irrevocably =0Aaltering how the agency does business." From "2010: CIA Ramps Way Up" Washington Post (12/30/10) Stein, Jeff Schmidt Says Cyber Threat Distorted by Media U.S. vulnerability to cyber attack has been distorted by the media, accordi= ng to White House cyber security czar Howard Schmidt. Although he acknowle= dges that a successful attack on a segment of the U.S. power grid is certai= nly possible, he does not think that it will lead to catastrophic failure. = Disruption by Internet activists, as demonstrated by actions against compa= nies that ended their association with WikiLeaks, also is a reality, but Sc= hmidt is confident that such disruptions will be short, as "we continue to = work to make sure that the impact is minimal." He notes that the private s= ector owns and operates the vast bulk of critical infrastructure, and stres= ses that the government is "working with them to [determine] where we can = get these things fixed now, where we need to redirect or remediate, and wha= t are the resources the government can bring to bear, such as law enforceme= nt, =0Ato send a clear message: 'Don't do this, because you will be found = out.'" Schmidt agrees that a more advanced and targeted kind of cyber atta= ck has emerged. "But the threat sort of follows the way we build our defen= ses against it, and I think those things continue to move in parallel," he = concludes. From "Howard Schmidt" Newsweek (12/21/10) Wolff, Josephine Can Trains, Subways Be Protected From Terrorists? Although top security officials say they are upgrading subway and rail defe= nses against terrorist attacks across the United States, an analysis by USA= Today uncovered serious vulnerabilities, including many that may be imposs= ible to address. Former DHS Inspector General Clark Kent Ervin says mass t= ransit systems are far less secure than the aviation sector or key governme= nt buildings. U.S. subways and rails are highly vulnerable to attack, give= n the vastness of the railway network and the impracticality and expense of= screening all passengers. "Mass transit systems in the U.S. are ... a lit= eral black hole," says the Heritage Foundation's James Carafano. "They wou= ld consume every cent we spend on homeland security, and there still would = be vast vulnerabilities." TSA has mainly left local governments responsibl= e for rail security, and they often lack the funds and capability to achiev= e =0Ait. TSA administrator John Pistole says his agency will assign as hig= h a priority to protecting mass transit passengers as it has assigned to ke= eping air travelers safe. Examination of the National Counterterrorism Cen= ter's database by USA Today found that trains and subways have been more fr= equently targeted by terrorists than aircraft and airports worldwide, and E= rvin notes that "logic dictates that because mass transit is 'mass,' terror= ists are interested in attacking it to maximize death, injury, and panic." = House Committee on Homeland Security Chairman Rep. Bennie Thompson (D-Miss= .), says he is deeply troubled by the small percentage of TSA's budget comm= itted to transit and rail security. TSA has promoted random screening of r= ail passengers and a display of force as a check against attacks. Analysts= say intelligence is ultimately the best defense against a terrorist attack= on mass =0Atransit systems. From "Can Trains, Subways Be Protected From Terrorists?" USA Today (12/27/10) P. 1B; Stoller, Gary Napolitano Outlines DHS Cybersecurity Focus The DHS Quadrennial Homeland Security Review outlined the department's key = missions, and that included the security of cyber space, says DHS Secretary= Janet Napolitano. The importance the review accorded to cyber space prote= ction is reflective of "the fundamental understanding that we have on the i= mportance of the problem," she says. Napolitano notes that cyber security = is about partnerships rather than control, and says that DHS is "working mo= re closely than ever to identify the private sector partners who we need, a= nd work with them, and also across the federal family." She cites a pact s= he signed with Defense Secretary Robert Gates to bring DHS and DoD's resour= ces and actions into line, since their departments collectively constitute = more than 90 percent of the cyber equities in the federal family. Napolita= no also points to the cross-assigning of individuals and the identification = =0Aof how the NSA's technology resource base will be utilized in both the m= ilitary and civilian domains. "For the first time ever, DHS has individual= s who are now stationed at NSA ... That gives us the ability to tap into th= at incredible resource," she says. DHS understands that federal agencies m= ust partner to nurture a national culture to make users aware of their role= s within the system and what they must do to enhance its security, accordin= g to Napolitano. "We need to build a cyber system in which the distributed= nature of cyber space becomes a great benefit, not a great weakness, and w= here people at all levels understand the shared responsibility that goes in= to that concept," she stresses. Napolitano sees a need for a more transpar= ent and inclusive process for developing cyber security policy that focuses= on bringing together the most skilled minds from a wide swath of fields. = Areas =0Aof federal cyber security progress Napolitano mentions include the= issuance and testing of an iteration of the National Cyber Incident Respon= se Plan, the deployment of the Einstein 2 intrusion detection system across= federal civilian agencies, and the expansion of the National Cybersecurity= and Communications Integration Center. From "Napolitano Outlines DHS Cybersecurity Focus" GovInfoSecurity.com (12/20/10) Napolitano, Janet INTELLIGENCE AND NATIONAL SECURITY NEWS Arizona Shooting Prompts Fresh Look at Protecting Lawmakers Lawmakers and those who handle their safety are taking a hard look at the r= isks posed by people they might have dismissed previously while keeping acc= ess to constituents open in the wake of the Arizona shootings. "In each di= strict you represent your share of unstable people," says Rep. Jack Kingsto= n (R-Ga.). "Now you are aware that they do show up at your town hall meeti= ngs and maybe they are not all harmless." Representatives of the U.S. Capi= tol Police and the office of the House sergeant-at-arms are advising lawmak= ers to review their security arrangements, contact local law enforcement of= ficials, and appoint a staff member as a law enforcement liaison. The Capi= tol security agencies will join the FBI on January 12 in conducting a joint= security briefing for Democrats and Republicans, who admit that their anxi= eties about their safety and that of their families and staff members have = been =0Aheightened by the shootings. Whether threats have risen commensura= te with the incivility of the current political climate is difficult to qua= ntify, given the Capitol Police's unwillingness to disclose threat statisti= cs for reasons of security. An FBI official says the Capitol Police have p= assed information about threats to the bureau on occasion, when they had sp= ecific elements that made them appear "actionable." Bureau investigators a= ttempt to assess whether the sender of communications to lawmakers intended= for it to be read as threatening and whether there is anything else in the= sender's background that would raise concerns. Following the shootings, l= awmakers said some security improvements might be necessary, from closer co= operation with local police when holding public meetings or possibly giving= the U.S. Marshals Service some role in congressional security. Rep. Rober= t A. Brady =0A(D-Pa.) recently announced his intention to introduce legisla= tion that would extend to members of Congress the federal law outlawing thr= eats to the president. "If people engage in this, they need to know that i= t is criminal and it's going to be a criminal offense," he says. From "After Shooting, Fresh Look at Protecting Lawmakers" New York Times (01/09/11) Hulse, Carl; Parker, Ashley Michael Sheehan Picked for Special-Ops Chief Former U.S. counterterrorism ambassador Michael Sheehan has been offered th= e top Pentagon post to oversee clandestine special operations assaults and = covert drone strikes targeting terrorist groups, say two senior U.S. offici= als. The current Assistant Secretary of Defense for Special Operations/Low= -Intensity Conflict and Interdependent Capabilities, Michael Vickers, is aw= aiting his own confirmation hearing for the Pentagon's top intelligence pos= ition. The operations Sheehan would coordinate are increasingly carried ou= t by staff from a number of different agencies, including the CIA, the Join= t Special Operations Command, and other members of the defense, intelligenc= e, and law enforcement community. U.S. officials from the intelligence and= military side have sometimes clashed over groups going after the same targ= ets, in spite of attempts to cultivate cooperation between agencies. Senio= r =0Aofficials mentioned retired U.S. Army Lt. Col. John Nagl as a possible= deputy to Sheehan. Nagl is currently president of the Center for a New Am= erican Security think tank, which has produced many top Pentagon officials = in the Obama administration.