Joint DHS, ODNI, FBI Statement on Russian Malicious Cyber ActivityODNI
December 29, 2016
On October 7, 2016, Secretary Johnson and Director Clapper issued a joint statement that the intelligence community is confident the Russian Government directed the recent compromises of e-mails from U.S. persons and institutions, including from U.S. political organizations, and that the disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks are consistent with the Russian-directed efforts. The statement also noted that the Russians have used similar tactics and techniques across Europe and Eurasia to influence public opinion there.
Today, DHS and FBI released a Joint Analysis Report (JAR) which further expands on that statement by providing details of the tools and infrastructure used by Russian intelligence services to compromise and exploit networks and infrastructure associated with the recent U.S. election, as well as a range of U.S. government, political and private sector entities.
This activity by Russian intelligence services is part of a decade-long campaign of cyber-enabled operations directed at the U.S. Government and its citizens. These cyber operations have included spearphishing, campaigns targeting government organizations, critical infrastructure, think tanks, universities, political organizations, and corporations; theft of information from these organizations; and the recent public release of some of this stolen information. In other countries, Russian intelligence services have also undertaken damaging and disruptive cyber-attacks, including on critical infrastructure, in some cases masquerading as third parties or hiding behind false online personas designed to cause victim to misattribute the source of the attack. The Joint Analysis Report provides technical indicators related to many of these operations, recommended mitigations and information on how to report such incidents to the U.S. Government.
A great deal of analysis and forensic information related to Russian government activity has been published by a wide range of security companies. The U.S. Government can confirm that the Russian government, including Russia's civilian and military intelligence services, conducted many of the activities generally described by a number of these security companies. The Joint Analysis Report recognizes the excellent work undertaken by security companies and private sector network owners and operators, and provides new indicators of compromise and malicious infrastructure identified during the course of investigations and incident response. The U.S. Government seeks to arm network defenders with the tools they need to identify,, detect and disrupt Russian malicious cyber activity that is targeting our country's and our allies' networks.
We encourage security companies and private sector owners and operators to look back within their network traffic for signs of the malicious activity described in the Joint Analysis Report. We also encourage such entities to utilize these indicators in their proactive defense efforts to block malicious cyber activity before it occurs. DHS has already added these indicators to its Automated Indicator Sharing service, which provides indicators of malicious cyber activity at machine speed. Entities that are participating in this service have already implemented these indicators for the network protection activities.
Former Lawrence Livermore National Laboratory Scientist Charged for Fraud Relating to Intelligence Advanced Research Projects Activity Research ProgramODNI
December 21, 2016
On Dec. 20, 2016, the Honorable Jeffrey S. White, U.S. District Court Judge for the Northern District of California, sentenced Dr. S. Darin Kinion, a former Lawrence Livermore National Laboratory (LLNL) scientist, to 18 months in prison for submitting false data and reports with the purpose of defrauding the Intelligence Advanced Research Projects Activity (IARPA) of $3.3 million intended for a quantum computing research program.
The investigation, conducted jointly by the Inspector General of the Intelligence Community (IC IG) and the Department of Energy Office of Inspector General (DOE OIG) produced evidence that Kinion knowingly, intentionally, and repeatedly reported false and fraudulent data and information claiming he used IARPA-purchased equipment successfully to build and test experimental components. As IARPA took deliberate steps to validate Kinion's purported results, he acted further to conceal and to prevent IARPA from discovering his fraudulent scheme. For example, Kinion knowingly mailed non-functional "bogus" components to IARPA's validation team; back-dated and altered Federal Express® mailing labels to support his claims for IARPA funding; and conducted a three-day "charade" experiment during another scientist's visit to LLNL.
In addition to the prison term, Judge White sentenced the defendant to three years of supervised release and to pay $3,317,893 in restitution to the United States. Kinion will begin serving the sentence Jan. 26, 2017.
Intelligence Community Once Again a Best Place to Work in Federal GovernmentODNI
December 16, 2016
For the eighth consecutive year, Intelligence Community employee job satisfaction ranks the IC as one of the "Best Places to Work in the Federal Government," according to an independent analysis of federal workers' job satisfaction and commitment.
The IC finished third overall among large agencies that employ more than 15,000 full-time permanent employees, a category which includes 19 organizations. Rankings were compiled by the Partnership for Public Service and announced yesterday.
Additionally, the IC finished second in teamwork, pay, and effective leadership, and third in employee skills-mission match.
Director of National Intelligence James R. Clapper praised the IC workforce for consistently rising to the challenge during a difficult time for the community and said the ranking is an indication of the IC's commitment to the mission.
"Our nation's IC works on some of our toughest challenges and provides accurate and timely information to policymakers on the diverse array of threats facing the world," he said. "This year's rankings indicate that IC personnel are not only dedicated to the mission of protecting our country, but are also satisfied with and enjoy their work."
Stephanie O'Sullivan, the Principal Deputy Director for National Intelligence, accepted the award yesterday on behalf of the director of national intelligence during a ceremony at the National Press Club, in Washington, D.C.
This award recognizes the professionalism and dedication of a workforce that quietly protects this nation," she said.
The "Best Places to Work in the Federal Government" rankings offer the most comprehensive assessment of how federal public servants view their jobs and workplaces, providing insights into worker satisfaction and commitment on issues ranging from leadership and pay to innovation and work-life balance.
"Best in class private-sector organizations understand that improved employee engagement leads to better performance and improved outcomes" said Max Stier, Partnership president and CEO. "People are our government's greatest asset, and the new administration should commit itself to strengthening the federal workforce and improving the workplace culture."
PPS is a non-profit, nonpartisan organization that aims to revitalize the federal government by transforming the way government works and inspiring a new generation to serve. The institute conducts research and helps federal leaders solve difficult public-policy issues. According to PPS, the Best Places to Work rankings are "the most comprehensive and authoritative rating of employee satisfaction and commitment in the federal government" and "are an important tool for ensuring that employee satisfaction is a top priority for government managers and leaders."
Rankings are based on data from the 2016 Federal Employee Viewpoint Survey which the U.S. Office of Personnel Management administers, as well as from surveys administered by 11 additional agencies plus the Intelligence Community. The first survey was conducted in 2003, but the IC has only participated since 2009 and has been ranked a top place to work every year.
To maintain the security of information about its work force, the IC relies on its own instrument to assess, each year, how its workers feel about issues such as job satisfaction, professional development, and the effectiveness of senior leaders. Beginning in 2009, the IC included several questions from the federal survey provided by PPS in its annual Employee Climate Survey. The Community's information was then comparable with that from other organizations under consideration for Best Places.
Since the first rankings were produced, they have provided federal managers and leaders with data to help boost employee engagement. Additionally, the results are a resource for current and prospective employees, researchers, and policymakers. More details are available online at http://bestplacestowork.org.
Statement on Requests for Additional Information on Russian Interference in the 2016 Presidential ElectionODNI
December 16, 2016
Recently, the Office of the Director of National Intelligence has received requests from Members of Congress, several Electors of the Electoral College and the general public for additional information on Russian interference in the 2016 presidential election.
On October 7, 2016, the Secretary of Homeland Security and the Director of National Intelligence publicly stated that they were "confident" that the Russian government directed compromises of emails from U.S. persons and institutions and that these thefts, as well as disclosures of alleged hacked e-mails by the Guccifer 2.0 persona, were intended to interfere with the U.S. election process. The Secretary and DNI also expressed their belief that "only Russia's senior-most officials could have authorized these activities." We continue to stand by this statement.
The President has recently directed the Intelligence Community to conduct a review of potential foreign interference in presidential elections dating back to 2008. This effort is ongoing and involves sensitive classified information. Once the review is complete in the coming weeks, the Intelligence Community stands ready to brief Congress and will make those findings available to the public consistent with protecting intelligence sources and methods.
Public Affairs Office
Office of the Director of National Intelligence
Faces of Defense Intelligence: Anne G. LoveDIA
December 14, 2016
WASHINGTON — On 14 December, DIA recognizes Anne Love by inducting her as a DIA Torch Bearer for her significant contributions in strengthening Defense Intelligence, her indisputable leadership, sustained impact and lasting contribution, and her extraordinary commitment to DIA, its mission, and its people. Anne was a standard bearer for DIA, and now enters DIA's elite as a recipient of the Torch Bearer Award. DIA applauds her for her Commitment to Excellence in Defense of the Nation.
Editor's note: The Faces of Defense Intelligence series highlights the accomplishments of former military and civilian intelligence personnel who exemplified the Defense Intelligence Agency creed Excellence in Defense of the Nation.
In recognition of a lifetime of service. Anne G. Love: 1922 – November 2016.
In 1994 the U.S. military planned for a sizable operation, UPHOLD DEMOCRACY, in Haiti to reinstate President Jean Bertrand Aristide's government after a coup. In addition to U.S. Navy, U.S. Coast Guard, and U.S. Air Force elements, Joint Special Operations Command, the US Army 7th Transportation Group, 82nd Airborne Division, and the 10th Mountain Division, thirty-one countries agreed to send troops to participate. Aiding substantially in the planning process for this complicated joint operation was a DIA Contingency Support Package (CSP) providing dozens of maps with key civil and military locations, overhead and 3D terrain images, potential landing sites, egress and ingress routes, and areas that U.S. forces could use to stage operations in the event of a conflict. This CSP was vital in the lead-up to the operation and in what eventually became a peacekeeping operation. For its support in the Haiti crisis and other contingency requirements, DIA was awarded the Joint Meritorious Unit Award in 1994. The culmination of months of labor and frequent updates, the Haiti CSP and nearly a hundred like it for other locations around the world came to fruition in large part due to the efforts of Anne Love. Anne, who was transferred with the Army Map Service to DIA in 1963, built a analytic branch and product line that played a critical role in U.S. operations and evacuations in Haiti, Vietnam, Grenada, Panama, Lebanon, Zaire, Rwanda, Burundi and others, and continues to provide critical support to this day. Her accomplishments were often an uphill battle. Upon DIA's establishment in 1961, women comprised 34 percent of the federal workforce and held only 1 percent of government jobs above the GS-12 level. Anne was one of only a handful of female employees at DIA during the 1960s and 1970s that moved into leadership positions, directing the Military Geography Branch. On 14 December DIA recognizes her twenty-five years of service in DIA by inaugurating her as an agency Torch Bearer.
Anne began her career in the 1940's with Women's Army Corps and was transferred to the Army Map Service, which provided a strong baseline for her appreciation of foundational and geographic intelligence. During World War II, accurate strategic intelligence on Germany and Japan was required, but also tactical military intelligence to support operations. In each theatre, the services launched land, air, and amphibious campaigns against terrain and islands the U.S. Government had little or no information. In 1943, the Joint Army Navy Intelligence Studies (JANIS) began publication as an authoritative and coordinated intelligence assessment on different countries. In 1948, the National Security Council issued Intelligence Directive (NSCID) No. 3 that established the National Intelligence Survey (NIS) program as a peacetime replacement for the wartime JANIS program, which was supported by the Army Map Service. Anne was responsible for drafting Section 24, Military Geography, for the NIS publications; these were exhaustive topographic and mapping studies, often more than 200 pages in length. The baseline information provided in the NIS studies were so thorough that they remain in use today. However, to reduce redundancy across the services in the production of such extensive studies, the mission was transferred to DIA. This role took on great significance.
When Anne came to DIA the Military Geography Branch had more than 150 personnel, plus support staff, and ramped up for support to the Vietnam War. The branch provided detailed work on North Vietnamese logistics and infrastructure, but also participated in the growing POW/MIA mission. The Military Geography Division and POW/MIA branches were co-located in the same division, easing collaboration. In mid-1968, DIA POW/MIA analysis identified a major American POW camp known as Son Tay located outside Hanoi. By 1970 DIA estimated that up to 61 POWs were being held at the camp, and supported the concept of the raid, known then by code name "Polar Circle." This special operation was supported throughout its development by DIA air defense and ground force analysts as well as the Military Geography Branch. A geographic assessment was produced to support the operation. Operators and the intelligence officials agreed that DIA's intelligence preparation for the operation was everything anyone could expect and believed the raid would ultimately be successful. When DIA analysts spent the nights leading up to the raid going over the latest photography and information, new intelligence came to light indicating that the prisoners were moved. Despite the finding, it was determined that the gains outweighed the risks, and the President agreed to the operation. The Son Tay Raid was launched on 21 November 1970. All went as scheduled and, after the assault force engaged in a firefight, the Son Tay raiders were again airborne without suffering a single serious casualty. However, they left without a single American POW. The latest intelligence had proven to be accurate. From this episode, however, it was conclusively demonstrated that DIA could provide the full range of intelligence support for operations.
As DIA's ability to support operations increased, force reductions in the 1970s reduced the branch to only a few analysts and Anne as the Branch Chief; from 1974-1978, Anne was dual-hatted as a branch chief and analyst. Despite the reductions, in collaboration with her senior analyst, fellow DIA Torch Bearer recipient Charlie Nomina, Anne developed the new Contingency Support Package product line. These substantive packages used all-source intelligence to provide the information a military operator would need to evacuate U.S. citizens from foreign countries. As a result of the level of detail, CSPs could also be used for a variety of other purposes and scaled to the customer's requirements. The first CSP was scheduled to address Kabul, Afghanistan, just prior to the Soviet invasion in 1980. The topic was bypassed, though, due to equipment limitations and the Soviet invasion of Afghanistan. Planners at the JFK Special Warfare Center at Ft. Bragg requested that the concept be applied to their next primary concern, the U.S. Embassy in Tehran, Iran. Again, the evacuation concept was not implemented due to the surprise takeover of the embassy compound by the Iranians. However, the CSP became the blueprint for what was to become the rescue mission for the hostages. Anne and Charlie used their sixty-one years of collective analytical skills to select the landing sites that would become known as DESERT ONE. The data and format of the package proved valuable to operational missions and over the next decade, CSPs were produced on sixty other nations. Other noteworthy accomplishments during this period included support to planning of Operation El Dorado Canyon, the raid against Libya in April 1986, and analysis pertaining to the destruction of the Marine barrack in Beirut. The packages gained a widespread reputation for their value and were disseminated to more than 80 customers, including the United States Special Operations Command (USSOCOM), SEAL Teams, and Marine Expeditionary Forces. It was not uncommon for a thousand copies of a CSP to be produced.
As a branch chief, Anne was innovative and introduced technology and training for her staff that ensured their analysis would remain timely and relevant. With budget increases of the 1980s, she hired a new cadre of employees who had geographic and engineering experience, but also in the new field of computers. Said one former employee, "when she interviewed me for a job in the branch in 1983, she asked me about my knowledge of 'ADP.' After stuttering for a minute, I explained that I didn't know….I was a topographic engineer." There was a reason for her push to hire computer literate personnel. The development of CSPs was time and labor intensive. CSPs were produced in hard copy from materials collected from throughout the Intelligence Community and across the government; information was overlaid, then photographed, reproduced, then sent for airlift to different customers. "It's amazing how much we accomplished with what we had. The process was totally alien to the technical processes used today." Anne established one of the first computer labs in DIA and fundamentally altered the analytic business process, which has agency-wide effects. As Anne took on additional management responsibilities, taking over the Cultural Geography, Industries, and Underground Analysis missions, the computer capabilities further demonstrated the value added. For example, DIA's underground analysts mapped major foreign cities underground networks.
Anne also worked with Charlie Nomina to develop innovative and mission critical training. As many new employees entered the agency without military or survival experience, she leveraged relationships with the 82nd Airborne Division, the Navy Survival School, Air Force Survival School, USSOCOMs Special Operations School to provide search and rescue, survivability, evasion, resistance, and counterterrorism training. As the branch was responsible for producing Safe Area Intelligence Descriptions (SAIDs) to support downed pilots as well as evasion and escape products, she felt it critical that her analysts have practical experience to supplement their analytic skills. This combination of in-house and outside training provided her analysts with a sense of the impact of their analysis, focused their analysis on what they knew would be beneficial to operators on the ground, and bolstered analytic confidence. A former branch analyst noted, "I trained in the mountains, participated in helicopter insertions and evacuations, was chased and forced to evade the adversary, interrogated, and went through lessons learned after each exercise. I had no military background, so this training was vital in the application of my analytic trade." Anne recognized the limits and skill sets of her employees and focused training accordingly – always with the objective of improving support to military operations.
Anne's ability to scout talent was also notable. In the early 1980's, while trying to fill out her branch, she hired more than a dozen new analysts. Three of those analysts rose to the ranks of Senior Executive Service (SES), and four to GG-15 positions; many remain in the ranks of the agency, continuing their support to the U.S. warfighter.
Anne retired from DIA in 1988 as a GG-15 having re-built DIAs geographic analysis capability,
established new platforms to convey intelligence to customers, and leaving an innovative mark on
agency. To those who remember her, she was "formidable," a "female Patton" with a strong command
presence, and "demanding." Anne believed she was doing remarkable work, and looked to her
to do the same. But she was also known for her great smile, open-mindedness, and fairness.
On 14 December, DIA recognizes Anne Love by inducting her as a DIA Torch Bearer for her significant contributions in strengthening Defense Intelligence, her indisputable leadership, sustained impact and lasting contribution, and her extraordinary commitment to DIA, its mission, and its people. Anne was a standard bearer for DIA, and now enters DIA's elite as a recipient of the Torch Bearer Award. DIA applauds her for her Commitment to Excellence in Defense of the Nation.
NSA Professionals: Deployed to Carry out the MissionNSA
December 14, 2016
Supporting U.S. service members around the world is one of the National Security Agency's primary responsibilities.
Our information assurance experts make sure that military communications and data remain secure - and out of the hands of adversaries. We also provide real-time support to military operations through tactical signals intelligence activities. And this work is frequently done on the ground with our warfighters.
Since 2001, for example, there have been more than 18,000 deployments of NSA personnel to hostile areas. Our men and women volunteered to serve alongside U.S. troops in Afghanistan, Iraq, and other dangerous areas, providing them with force protection, critical intelligence, and secure communications. Many completed multiple deployments - going out again and again to assist our troops.
We never forget that our fellow Americans depend on us, stateside and abroad, to help keep them safe.
Intelligence Community Statement on Review of Foreign Influence on U.S. ElectionsODNI
December 14, 2016
Senior Administration Officials have regularly provided extensive, detailed classified and unclassified briefings to members and staff from both parties on Capitol Hill since this past summer and have continued to do so after Election Day.
Last week, the President ordered a full Intelligence Community review of foreign efforts to influence recent Presidential elections – from 2008 to present. Once the review is complete in the coming weeks, the Intelligence Community stands ready to brief Congress—and will make those findings available to the public consistent with protecting intelligence sources and methods. We will not offer any comment until the review is complete.
Faces of Defense Intelligence: Timothy H. PinkhamDIA
December 13, 2016
WASHINGTON — "In the intelligence business, if you can't defend everything you say, don't say it." - Tim Pinkham On 12 October 2005 Timothy Hull Pinkham was laid to rest in Arlington National Cemetery. The guestbook for the ceremony repeatedly highlighted the "indelible mark" he left on everyone who worked with him, that he "was one of our best senior analysts and mentors," and that he would always be "remembered as a respected, hard worker and inspiring intellectual."
Editor's note: The Faces of Defense Intelligence series highlights the accomplishments of former military and civilian intelligence personnel who exemplified the Defense Intelligence Agency creed Excellence in Defense of the Nation.
"In the intelligence business, if you can't defend everything you say, don't say it." - Tim Pinkham
On 12 October 2005 Timothy Hull Pinkham was laid to rest in Arlington National Cemetery. The guestbook for the ceremony repeatedly highlighted the "indelible mark" he left on everyone who worked with him, that he "was one of our best senior analysts and mentors," and that he would always be "remembered as a respected, hard worker and inspiring intellectual." Tim arrived at DIA as a naval lieutenant in 1971, transitioned to a DIA civilian position in 1975, and spent the next three decades making his contribution felt. Despite numerous accolades, including the National Intelligence Distinguished Service Medal, he exemplified that sometimes the most important mark a person makes is the knowledge and know-how passed on others. On 14 December, DIA recognizes Tim Pinkham by inducting him as a DIA Torch Bearer for his significant contributions in strengthening Defense Intelligence, his indisputable mentorship, sustained impact and lasting contribution, and his extraordinary commitment to DIA, its mission, and its people.
Tim Pinkham entered DIA at a time of extreme tumult in the Middle East. The Arab–Israeli War was fought by Israel and neighboring states in 1967, inflaming regional hostilities. Several coups, attempted coups, and internal instability plagued several countries. Additionally, the first Trans World Airways (TWA) hijacking occurred in 1968, followed by a surge in hijackings and other terrorist attacks committed by Palestinian groups and Hizballah against Israel, and increasingly against U.S. interests. Pinkham set to work immediately developing an expertise on regional military equipment and capabilities, and translated his analysis into meaningful products for senior clients throughout the government. He became known as the "walking Jane's Fighting Vehicle encyclopedia," and was rapidly acknowledged throughout the Intelligence Community (IC) as an authoritative voice not just on the Iraq, Iran, Arab-Israeli conflict, and North Africa, but globally.
For two decades Tim worked as a Middle-East and North Africa analyst, honing his political-military analytic skills and producing more than one-hundred products. He was instrumental in providing thorough, impartial analysis through the Iran hostage crisis, the collapse of regimes throughout the region, major conflicts like the Yemeni revolution, and the ebbs and flow of the Arab-Israeli conflict. He was a constant throughout, working in a subject matter – foundational capabilities analysis – that was often overlooked in importance by the steady stream of current intelligence requirements. However, to this date, when a conflict appears imminent, the foundational analysis on adversary capabilities is at the forefront of requirements. In 1982 he chaired a Ground Forces Analyst Working Group to develop a analytic guide and course to introduce junior analysts to the significance of military capabilities analysis. Drawing on the materials he developed, Tim then taught a ground forces capabilities analytic course four times per year to more than a thousand analysts over the course of the next decade. Many of those analysts rose to the next generation of leadership in DIA and across the Intelligence Community, sharing the foundations Tim taught them. The curriculum he developed was the precursor to the current and planned expansion of DIA's military capabilities analysis training program. He also became the first Chairman of the Military Capabilities Career Development Panel, establishing training and requirements to grow a capable and innovative analytic workforce.
Employee perspectives: The impact of Timothy Pinkham
I was attending the Defense Intelligence School in 1983, now the National Intelligence University, and working on a thesis related to North Africa. That's when I met Tim and interviewed him as an expert for the paper. Upon graduation, I was supposed to go to DIA to work the Asia problem-set, but Tim intervened and had me work for him from 1983-87. As a naval officer, one of my first projects was to conduct an assessment on whether a arms transfer in the Middle-East would alter the regional balance of power. My assessment was entirely out of line with the consensus at the time, and was apt to cause disputes in the policy world. Tim was aghast at my findings and grilled me….and grilled me….then grilled me some more on the rigor I used in my analysis. I've known seniors who, given the seriousness of the blowback likely to arise from the assessment, would not have published it or would have toned it down. But Tim was most concerned with getting it right. He fully understood the policy ramifications, but appreciated that our job was to make the call and clearly convey how we reached our conclusions. Once he was comfortable that I had done my due diligence, he stood by my analysis, which made its way to senior policymakers. Tim's manner in handling that assessment made a real mark with me. We have an obligation to be rigorous and to provide unbiased, impartial analysis, and he understood that – he gave me the top cover I needed to do my job. Tim was thorough and precise, and had high expectations. For example, although I never took one of his courses, I felt as though I took instruction from him everyday. I once used "state-of-the-art" to describe a fielded weapon system. He told me to go back and look up the definition for "state-of-the-art," which turned about to be far more advanced than what I was trying to convey. He stressed that words have meaning. The first six months working for him were tough but rewarding. On a much more personal note – my wife was diagnosed with cancer and also had a relapse during the 3 years I worked for Tim. Therefore, for more than a third of my tour she was subjected to or recovering from radiation and chemotherapy treatments. Tim was a very demanding boss when it came to analytic quality, but he also used every bit of his management prerogatives to make me as available as possible to support my wife. His kindness to my family is a major reason I have stayed at DIA. Through me and his other employees his management style has indirectly had a positive effect on thousands of DIA employees.
When I entered DIA as a line analyst in October 1996, Tim was my Senior Intelligence Officer (SIO) and would be my analytic boss for the following nine years until he retired. What I appreciated most is that Tim invested his time in me and my colleagues to help us become the best analysts we could be. When I joined the division, I was expected to give Tim a presentation on my account within two months and demontrate a thorough understanding. You have to understand, Tim was acknowledged throughout the IC for his mastery of the Middle East, so this was quite a challenge. In the briefing, he pushed and pushed to find the breaking point, then he knew where to start the teaching process. This was a great instructional tool for junior analyts. He was very effective in using the Socratic method of discussion, not only trying to draw out more information from an analyst, but driving them to consider alternatives and to think outside the box. Tim would tell us that when he was in the Navy, he would stand the watch and mentally rehearse and memorize Latin declensions and conjugation – with that experience, he drilled us to know the foundational information on our accounts without having to look up the material. That solid foundational knowledge I learned from Tim gave me confidence and credibility as I interacted as a new, young female analyst with older, more experienced male foreign military officers. He set high standards. When I sent him a draft product his feedback was almost always "fine" or "good." When I got a "fine," that meant it was adequate, but a "good" meant it was truly good, while a "good" followed by an exclamation point was truly high praise. I respected him immensely. And with his mentorship and high standards came his care for his co-workers – Tim was always positive, enthusiastic, humorous, optimistic, and believed in striking the right work-life balance for himself and his people. That's why, despite his retirement more than a decade ago, so many people in the agency still remember and think so highly of him. Tim left an indelible mark on DIA.
His dedication to training the workforce and providing mentorship to the analytic workforce earned him the DIA Directors Award and prepared him for his rise to SIO of the Mediterranean Division in 1996. In short order Tim was asked to put his leadership and analytic skills to use as global events boiled over. In April 1996, fighting in Lebanon between Israeli forces and Hezbollah killed more than 100 civilians (the Qana Massacre); Israeli, UN and U.S. officials accused Hezbollah of using civilian refugees as human shields by opening fire from positions near the UN compound. In the following months, the Iraqi army deployed into forbidden locations resulting in U.S. Operation Desert Strike (coordinated cruise missile attacks against Iraqi air defense infrastructure), and a full-scale guerilla war erupted in Algeria. According to a former co-worker, Tim was "unflappable, always maintaining his calm but authoritative demeanor and good nature" during these events, leading DIA analytic production efforts, briefing senior policymakers, and helping coordinate interagency activities. He assisted in the formation of an interagency community of interest on the Middle East peace process, formed an analytic working group focusing on another regional hot spot, and led a multi-agency effort to draft a controversial assessment produced to help mitigate a potential conflict. In a short span, his division produced more than 250 assessments in support of a range of senior military leadership and policymakers. Notably, Tim was on the front line in analytic support leading up to the 1999-2000 Shepherdstown Peace Talks between Israel and Syria. In 2001, Mr. Pinkham quickly became involved in one of the most challenging accounts in the agency, assuming a leadership role in developing analysis for impending operations in the Middle East. This analysis provided a solid foundation for contingency planning in 2003 before the initiation of Operation Iraqi Freedom. He also facilitated strong working relationships with military and interagency partners, and managed a continuous flow of unique and demanding analytic demands from a range of clients. As war neared with Iraq, Tim was a driving force on numerous national level assessments. His performance throughout this period was superb, and Director for Central Intelligence George Tenet awarded Tim the National Intelligence Distinguished Service Medal for his efforts.
For the remainder of his career, Tim took on the role of SIO for DIA's Middle East and North Africa Division, where he again instructed analysts in military order of battle analysis. As part of Tim's legacy, DIA continues military capabilities analysis training for all incoming analysts.
It is sometimes difficult to quantify the impact of a person's career. Sometimes a person is remembered for a seminal event they participated in, their heroism in combat, or a single groundbreaking article they published that changed the course of history. Although Tim proudly served in the Navy and ultimately wrote hundreds of articles, these are not what distinguished him. For three decades, Tim was the man behind the scenes for DIA covering a region rarely at peace. He never sought glory or recognition, but was counted on repeatedly to get the job done – to provide thoughtful, impartial analysis that often drove U.S. national security and operational decision-making. In addition, Tim's greatest contribution – the development of an analytic workforce – is far more difficult to quantify but no less important. In his memory, DIA dedicated the Timothy Hull Pinkham Conference Room in 2008. Now DIA acknowledges his contributions by placing him in laudatory company as a DIA Torch Bearer. Timothy Hull Pinkham exemplified DIAs motto of Excellence in Defense of the Nation.
IARPA Announces Winners of the Multi-View 3D Mapping ChallengeODNI
December 01, 2016
WASHINGTON – The Intelligence Advanced Research Projects Activity, within the Office of the Director of National Intelligence, announced that they have selected the winners of the Multi-View Stereo 3D Mapping Challenge.
At an all-day workshop in Washington D.C. on November 30, 2016, the top solvers demoed their solutions with peers and other members of the IARPA community, sharing their novel approaches to developing Multi-View Stereo 3D mapping algorithms. Solutions that were open sourced were released during this event, and will be made available to the public.
These winners developed the best algorithms to accurately produce 3D mappings from satellite photos out of a total of 34 participants who responded to the challenge. The challenge was divided into two segments: the Explorer Challenge marked the first half of the challenge, which served as a way to introduce solvers to the data-set and to prepare for the Master Challenge. In the Master Challenge, solvers had to take their Explorer Challenge experience to design the strongest possible mapping algorithm.
The finalists have all made significant contributions to fostering innovation through crowd-sourcing and together they form a collaborative community that helps advance new and better methods for building 3D point clouds. IARPA thanks all solvers for their participation and looks forward to creating more innovative solutions with community collaboration in the future.
To learn more about the Multi-View Stereo 3D Mapping Challenge, including eligibility requirements, problem details, results, findings, and the full list of winners, visit https://www.iarpa.gov/challenges/3dchallenge.html.
For updates, follow @IARPAnews on Twitter and join the conversation using #IARPA3DChallenge.
For questions, contact us at firstname.lastname@example.org.
IARPA invests in high-risk, high-payoff research programs that have the potential to provide our nation with an overwhelming intelligence advantage. Additional information on IARPA and its research may be found on www.iarpa.gov.
U.S. Senate Passes Resolution Recognizing NGA's 20th AnniversaryNGA
December 1, 2016
SPRINGFIELD, Virginia — In recognition of the National Geospatial-Intelligence Agency and its 20th anniversary, the U.S. Senate adopted Senate Resolution 607.
The resolution states that NGA provided geospatial intelligence, or GEOINT, support to United States policymakers and military commanders in war and peacetime during significant national security and natural disaster events.
The resolution states, "NGA continues to support warfighters and intelligence operators with dedicated efforts in global counterterrorism, counterproliferation, mission readiness, safety of navigation, and future weapons development."
The resolution expresses gratitude to the men and women of the agency for their continued efforts to provide timely, relevant and accurate geospatial intelligence support and deliver advantages to warfighters, defense planners and national security policymakers.
The resolution was sponsored by Sens. Roy Blunt, Mark Warner, Claire McCaskill, Richard Burr and Dianne Feinstein.
New Contract Aims to Improve NGA's Approach to Personnel ManagementNGA
November 23, 2016
SPRINGFIELD, Virginia — The National Geospatial-Intelligence Agency awarded a $63 million human resources management contract to Deloitte Consulting LLP Nov. 22.
The contract is intended to help NGA's Human Development Directorate adopt a more integrated approach of seamless human resources operations.
Human resource management, known as HRM in the industry, is a holistic approach to the processes involved with managing personnel within an organization, from recruitment to retirement and everything in between.
NSA Professionals: A Calling and An HonorNSA
November 22, 2016
We are grateful for the remarkable people who form the heart of the National Security Agency.
As the nation celebrates Thanksgiving, we give thanks for the many dedicated men and women who will continue to work, protecting our warfighters around the world. We must constantly outthink and defeat our adversaries.
In 2013, for example, NSA played a key role in dismantling a Taliban network that made improvised explosive devices (IEDs) in southern Afghanistan. This network was responsible for an IED/suicide attack that killed nine U.S. soldiers in October of that year. NSA personnel deftly analyzed data that led to the identification and successful targeting of several network leaders. A Taliban commander, sub-commander, and an IED expert in southern Afghanistan - all of whom were confirmed to have had a direct role in conducting IED attacks against U.S. soldiers - were taken off the battlefield.
NSA's workforce makes a real difference.
We never forget that our nation, allies, and fellow Americans are depending on us to help keep them safe.
IARPA Announces BBN ACCENT Release to the Research CommunityODNI
November 14, 2016
WASHINGTON – The Intelligence Advanced Research Projects Agency, within the Office of the Director of National Intelligence, today announced the public release of the Accurate Events from Natural Text technology. IARPA funded the public release of the ACCENT software to spur increased activity in the research community. ACCENT is a state-of-the-art automated event coder capable of identifying nearly 300 types of socio-political events in text (news articles, blog posts, etc.). ACCENT was developed by Raytheon BBN under multiple government contracts.
ACCENT is based on the Statistical Entity and Relation Information Finding technology developed under Defense Advanced Research Projects Agency funding. Under the Office of Naval Research's Worldwide Integrated Crisis Early Warning System program, ACCENT more than doubled the accuracy of the previously deployed solution and is now in regular use at U.S. Strategic Command in support of systems monitoring and forecasting national and international crises. IARPA funded further improvements of ACCENT under the Solutions for Event Coding seedling.
IARPA invests in high-risk, high-payoff research programs that have the potential to provide our nation with an overwhelming intelligence advantage. Additional information on IARPA and its research may be found on https://www.iarpa.gov.
In the spotlight: Army Veteran and Cyber Expert Jay BrownNSA
November 9, 2016
At the National Security Agency, our mission is an honor and a calling. We support our military to ensure that today's service members become tomorrow's veterans.
Q: How did you pick a career in cybersecurity?
A: I've always been interested in technology; I've always liked video games and things that made technology fun. I think the experience that sealed it for me was in junior high school, when a friend of mine had a freeware computer game on his family's home computer. We copied all of the files to a floppy disk so that I could take them home and play them at my house as well. His father helped him install the game and we didn't really have a good idea of how to recreate the installation. I spent quite a bit of time figuring out how all of the files related to each other and what needed to go where because I REALLY wanted to play the game!
I decided in high school that I'd be going into the Army. When it came time for me to choose a job, I told my recruiter, 'I really like computers; I'd like to do that!' That opened the door to a winding and exciting journey that has led me to where I am today.
Q: What do you do at the National Security Agency?
A: As a Technical Director within NSA, I help ensure that NSA's operational capabilities function. I also chart the future trajectory of how we use cutting-edge technology and tradecraft, as well as ensure that we have a well-trained and motivated workforce capable of rising to any challenge. NSA protects our warfighters around the world. We enable and support operations on land, in the air, at sea, and in cyberspace. We also defend national-security information systems and protect our nation's critical data no matter where it is in the world.
Q: What is the hardest thing to deliver in your role?
A: The hardest thing to deliver is the consistent level of excellence that the NSA is known for throughout the federal government. We are very good at solving hard technical problems and there is often an assumption that regardless of what it is, we'll find a way to get it done. While this is oftentimes the case, that is an incredibly high bar and standard to live up to. Even with all of that, I love my job and many of my friends who work here do, too. There is always something to do because the bad guys don't take breaks!
National Cryptologic Museum Bringing STEM to LifeNSA
November 3, 2016
STEM (science, technology, engineering, and mathematics) is coming alive at the National Cryptologic Museum (NCM) on November 10, 2016 from 6:30 p.m. to 8:30 p.m.
Children interested in trying out real life applications in STEM can come to the NCM's special evening event, "2016 STEM Fest: Bringing STEM to Life," to experience loads of hands-on educational activities designed and presented by computer scientists, engineers, researchers, mathematicians, analysts, and teachers from the National Security Agency (NSA). Designed for children 10 years and older, the event will be part of the 2016 Maryland STEM Festival and will be free and open to the public.
Some of the planned activities include:
- Cryptologic analysts looking for "patterns of chaos" in analyzing text messages.
- Cyber teachers demonstrating ciphers and error-correcting and detection codes.
- Researchers demonstrating the mathematics of juggling and the possibilities of robotics.
- Analysts showing how to find "bad guys" in radio signals.
- Mathematicians challenging kids with a crypto puzzle to stop a "cyberattack" and showing them how to make geometric shapes with mathematics.
- Engineers showing how to make computer chips.
- Docents giving tours of exhibits with an emphasis on technology in cryptology.
NSA has contributed major advancements in communication and computer technologies for more than 60 years and that work continues today with state-of-the art innovations in engineering, mathematics, and technology in support of national security. In its second year, the Maryland STEM Festival provides inspirational, educational and accessible programming in STEM fields through a week of collaborative, interactive and dynamic events throughout Maryland.
Check out museum's Facebook page or view the event flyer for more information about the Maryland STEM Festival event, "Bringing STEM to Life." You can also contact the National Cryptologic Museum using our online form or call 301-688-5849. For directions to the National Cryptologic Museum, please visit our Map and Directions page.
NGA to Host Online Discussion about eNGAge Pprogram for Industry and Academic PartnershipNGA
November 3, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency will host a webinar Nov. 7 at 10 a.m. to discuss a recently launched initiative to partner with industry and academia.
The eNGAge program launched earlier this year and encourages the growth of internal knowledge and capabilities by placing NGA employees in temporary positions within industry and academia. The program also offers to bring counterparts into the agency in order to develop new ways of problem-solving skills and improve business practices to further innovation.
"The goal of eNGAge is to create a truly collaborative GEOINT environment," said Elizabeth Hoag, eNGAge Program Manager. "This is about collecting a broad scope of experiences."
Hoag and Michael Geggus, NGA Industry Innovation Advocate, will answer questions about the program. Advanced reservations are requested, but not required. Please email your name and organization to eNGAge@nga.mil.
Join the webinar by visiting https:intelligencecareers.adobeconnect.com/engagewebinar/. Attendees can also call 866-710-7331 and enter PIN#: 360003.
For a complete list of current requirement needs and other information about eNGAge, please visit the eNGAge link on NGA.mil. For questions, solution ideas or requests for additional information, call 571-558-1800 or email eNGAge@nga.mil.
NGA Awards $50K to Disparate Data Challenge WinnersNGA
November 3, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency awarded three companies a total of $50,000 in cash awards Oct. 21 for their solutions in making data discoverable geospatially, as part of the agency's disparate data challenge.
The grand prize winner, Diffeo, received $25,000 for their solution that mixed big data search and discovery with useful tools for analysts, easily usable with common software integrations. Second place finisher Voyager Search and third place finisher Keeper Technologies received $15,000 and $10,000 respectively for their innovative solutions that are currently in use globally.
"This challenge requires breaking the molds of traditional problem solving," said U.S. Air Force Col. Marc DiPaolo, chief of mainstreaming capabilities in the NGA enterprise innovation office.
The disparate data challenge encompassed two phases. Phase 1, completed in September, asked participants to implement functioning capabilities that could demonstrate access and approvals to analyze representative datasets. Fifteen winners were selected in phase 1, with each receiving $10,000 for their submissions.
Each winner was then invited to participate in phase 2 of the challenge, a "Dem-o-thon" in the Washington D.C. area. Participants presented focused white papers and videos, and ultimately a live demonstration of their solutions in front of a panel of judges.
"This challenge is about more than disparate data, it's about working with businesses and individuals we haven't traditionally partnered with," said DiPaolo. "Engaging non-traditional partners in this challenge has exposed us to new ideas and approaches we haven't seen before."
Future NGA challenges will be accessible through challenge.gov.
Eight New Institutions Designated to NSA/DHS National Centers of Academic Excellence in Cyber DefenseNSA
November 2, 2016
The National Security Agency (NSA), in conjunction with the Department of Homeland Security (DHS), jointly announce the designations of the following eight new institutions as NSA/DHS National Centers of Academic Excellence in Cyber Defense: Augusta University, Embry-Riddle Aeronautical University, Florida International University, Middle Georgia State University, University of Delaware, Clark State Community College, Lake Superior College, and Red Rocks Community College.
Through the President's Cybersecurity National Action Plan, the National Centers of Academic Excellence in Cybersecurity Program is charged to raise the level of cybersecurity capabilities across the nation. NSA and DHS partner with academic institutions to enhance cybersecurity education nationwide and to develop the next generation of cybersecurity experts.
The nation looks forward to the graduates of these programs leading our cybersecurity efforts and keeping our digital infrastructure secure through positions in industry, academia, and government, both civilian and military.
With support from the National Initiative for Cybersecurity Education (NICE) at the National Institute for Standards and Technology, these institutions are recognized during the NICE 2016 Conference, with presentations by Diane M. Janosek, Deputy Commandant of the National Cryptologic School/National Security Agency, and Daniel Stein, Cybersecurity Education and Awareness Branch/Department of Homeland Security.
For additional information on the NSA/DHS National Centers of Academic Excellence in Cyber Defense, please visit: https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/index.shtml.
DNI Clapper Announces New National Intelligence Council Chair Amy McAuliffeODNI
Oct. 28, 2016
I am pleased to announce that I have selected Amy McAuliffe to serve as the next chair of the National Intelligence Council (NIC).
Amy is a career CIA officer with more than 20 years of leadership and management of high performing analytic production organizations, including CIA's Office of Middle East and North African Analysis and ODNI's President's Daily Brief Staff. Amy holds degrees from the University of Notre Dame, American University and the Marine Corps University.
The IC will continue to rely heavily on Amy and the entire National Intelligence Council to provide the President, senior policy makers and military commanders with the timely, relevant and accurate intelligence necessary to shape critical national security decisions.
I would also like to thank Dr. Gregory Treverton for his service to the IC and the nation during his tenure at the helm of the NIC these past two-and-a-half years. Greg will be returning to academia where he will continue to pursue his passion for international relations and matters relating to the IC.
The NIC and the nation are indeed fortunate to have such exceptional leaders as Amy and Greg who are willing to serve at this critical period in America's history.
James R. Clapper, Director of National Intelligence
DNI Releases Budget Figure for 2016 National Intelligence ProgramODNI
October 28, 2016
Consistent with 50 U.S.C. 3306(b), the Director of National Intelligence is disclosing to the public, not later than 30 days after the end of the fiscal year, the aggregate amount of funds appropriated by Congress to the National Intelligence Program for Fiscal Year 2016.
The aggregate amount appropriated to the NIP for Fiscal Year 2016 was $53.0 billion, which includes funding to support overseas contingency operations.
Any and all subsidiary information concerning the NIP budget, whether the information concerns particular intelligence agencies or particular intelligence programs, will not be disclosed. Beyond the disclosure of the NIP top-line figure, there will be no other disclosures of currently classified NIP budget information because such disclosures could harm national security. The only exceptions to the foregoing are for unclassified appropriations, primarily for the Community Management Account.
Faces of Defense Intelligence: Virginia Hall - The "Limping Lady"DIA
October 27, 2016
WASHINGTON — Read about Virginia Hall, a U.S. citizen who collected critical intelligence against Germany in France during WWII as the first British female agent inserted into France, codenamed Germaine.
The Faces of Defense Intelligence series highlights the accomplishments of former military and civilian intelligence personnel who exemplified DIA's creed: excellence in defense of the nation. DIA would like to thank the Military Intelligence Corps Hall of Fame for their support in providing materials for this article.
President Harry Truman received a memorandum offering the opportunity to present the Distinguished Service Cross (DSC) to Virginia Hall, May 12, 1945. She was the first civilian woman to win the award. Ten days earlier Hall was preparing to enter Austria to recruit partisans to fight against the Germans – as she had successfully done for four years in France on behalf of the British Special Operations Executive (SOE) and the U.S. Office of Strategic Services (OSS). During a two-month period in mid-1944, Hall sent 37 intelligence reports, oversaw 27 parachute drops of material for the French resistance, coordinated the efforts of 1,500 resistance fighters, oversaw innumerable attacks resulting in more than 170 Germans killed and 800 captured, managed dozens of acts of sabotage that disrupted German logistics and reinforcements, and integrated a joint SOE-OSS operational team into her area of operations. At one point in the war, regional Gestapo Chief Klaus Barbie (the "Butcher of Lyon") identified her as the most dangerous of Allied spies, noting "we must find her and destroy her."
In May 1945, Hall chose to receive the DSC with only her mother and OSS Chief MG William Donovan present in order to protect her cover for future clandestine work. In addition to the DSC, Hall was made an honorary Member of the Order of the British Empire in 1943, awarded the French Croix de Guerre avec Palme, and was inducted into the innaugural class of the Military Intelligence Corps Hall of Fame in 1988. She allowed nothing, including discrimination and the loss of a leg, to inhibit her goal of defeating the Nazi's.
Hall, born in Baltimore, Maryland, in 1906, demonstrated her intelligence and boldness at an early age. She attended Radcliffe (Harvard University's college for women), Barnard (Columbia University's college for women), and graduate school at the American University in Washington, D.C., where she specialized in French, Italian and German languages. Breaking gender norms of the time, she travelled to Europe and studied in France (Ecole des Sciences Politiques in Paris), Austria (Konsularakademie in Vienna) and Germany. Following graduate studies, she accepted a clerk position at the U.S. Embassy in Warsaw, and then transferred to Izmir, Turkey. While in Turkey, Hall lost her left leg below the knee in a hunting accident. She was fitted with a prosthetic leg she lovingly named "Cuthbert." Although the loss of her leg didn't dampen her sprits, it did play a profound role in her future. She wanted a position as a Foreign Service officer, of which only six of the 1,500 were women. However, her amputation eliminated the possibility. Her rejection note highlighted that applicants must be "able-bodied." After a stint in Estonia, Hall quit her position in May 1939 and went to Paris. Four months later, France and Germany were at war.
With a German invasion seemingly imminent, Hall joined the French ambulance corps and aided the French until their defeat. Seeking to continue the struggle, she fled France to England. A travel companion on the train recognized her value and provided contacts in London to Section D, the Irregular Warfare Office of the British Army. Section D transitioned to SOE, known as the "Baker Street Irregulars" in July 1940. The qualities that kept Hall from the Foreign Service – being a woman with a disability – were considered assetts to the British. Women could move more freely and draw less attention in wartime Europe than a man; as an American, Hall also had the immediate advantage of citizenship from a non-combatant nation and the corresponding freedom of movement. Upon her recruitement, she was re-inserted into France to collect intelligence on German operations, and organize and arm the French resistance.
Hall learned clandestine tradecraft, morse code, hand-to-hand combat, explosives, map reading, canoeing, bomber signalling, weapons and operational planning. Over the course of several stages of training, all but one other woman failed, and she was the only female graduate of her class. She became the first British female agent inserted into France, codenamed Germaine.
Hall entered France in August 1941 under the auspices of a New York Post reporter from Lyon to the Vichy government. By November, she published three articles, recruited a network of loyal French citizens (codenamed HECKLER), assisted in the escape of several downed British pilots and introduced several new SOE operatives into France. Quickly moving into the German counterintelligence radar, Germany's declaration of war on the U.S. forced Hall to end her role as a reporter. In early 1942, she became involved in resistance operations in Marseille and was intimately involved in planning the successful escape of several SOE operatives (codenamed CORSICA) from prison. She offered her apartment as a safehouse for downed RAF pilots, resistance operatives, and SOE agents, and she also provided routine intelligence reports to London. As risk grew, so did her consideration of operational security, changing her nom de guerre to Maria Monn (codename Philomene). However, in August 1942, the regional German Gestapo attempted to insert an operative – Abbe Ackuin (codenamed Bishop) – into her network. Although she denied Abbe access, he was able to insert himself into a SOE network nearby, where he obtained radio codenames for Hall and members of HECKLER. The Gestapo began a concerted focus on Lyon, where they noted a spike in escaped prisoners, sabotage efforts, and disappearrances of downed pilots, much associated with the "Limping Lady." The Gestapo was closing in on her, desparately seeking a "Canadian" woman fitting Hall's description. Barbie captured many of the HECKLER operatives in the ensuing months, Hall escaped the country in the knick of time. Many HECKLER agents in Lyon were among the estimated 14,000 people killed by Barbie during the war, while others were tortured and sent to camps in Germany.
SOE, which limited operatives to six-months in place before calling them back to Britain, requested Hall to return to London; she was in her 13th month of continuous operations in France. She deferred despite the risk to her safety. However, Nov. 7, the U.S. conulate notified her of the imminent U.S. invasion of North Africa, and their estimate that German forces would occupy Vichy France in large numbers. She began her trek through the Pyrenees Mountains to Spain with a guide Nov. 11. Just when she thought she was safe, Hall was arrested at a train station in Spain for illegal immigration and detained in the Miranda del Elbro Prison for 20 days before her release to the U.S. consulate. By late December, Hall was in London and pressing for a return to France, but SOE considered her cover blown. For a time she was sent to Spain undercover as a journalist for the Chicago Times, but all her plans were scrutinized and vetoed by the SOE Iberian section chief. She returned to London after several unrewarding months. For many, the reward awaiting Virginia in London would be the peak of a career – she was notified that she was being awarded the Most Excellent Order of the British Empire and would have an audience with the King. Instead, Hall, who believed she joined SOE to participate in operations and not gain accolades, turned down the audience and sought to get back the field. However, SOE wasn't prepared to risk her life and continued to limit her to training for potential operations.
In March, 1944, Hall found relief. With the U.S. fully engaged in the war, OSS – a military organization under the authorities of the Joint Staff – sought skilled operatives to lay the groundwork for the eventual invasion. SOE endorsed Hall to the OSS and provided background on her activities. She transferred March 10 and boarded Motor Gunboat 502 at Devonshire Royal Navy Base for insertion into France 10 days later. Hall disguised herself as a plump, elderly woman with a limp, changed her walk to a shuffle, and had the fillings of her teeth re-done to match French dentistry.
Hall took up the persona of Mlle Marcelle Montagne, a farmhand in a the small village of Crozant in central France where she tended cows, made cheese and assisted the farm owner. While appearing to be a local peasant, she collected vital intelligence about German troop movements, established contacts with the resistance and radioed London. She also sold cheese to soldiers as a cover for collection. Despite her operational security and solid cover, she was interrogated and several local farmers were killed—their heads splaced on spikes as a demonstration of what would happen if they were found collaborating with the enemy. Seeing the increased risk of being discovered, Hall radioed London that "the wolves are at the door," and fled to the town of Cosne, near Paris. Once there, she realized Cosne was a valuable operating base leading up to and after D-Day and set to work immediately.
In the weeks preceding D-Day, Hall established the Cosne resistance, overcoming their reluctance to work for a woman. Breaking the organization into four groups of 25 men, she tasked each toward specific acts of sabotage and plots against local German units. Overseeing the coordination of airdrops that provided explosives, weapons, and other forms of support equipment, the resistence set about destroying railroad lines, bridges and disrupting communications. This escalated after D-Day, June 4, 1944, when Hall's force grew to more than 1,500 men. Hall reported almost daily to London on the state of operations and German troop movments, and identified locations for attacks. She also planned ambushes and directed sabotage efforts, which are just some of the acts OSS highlighted in her nomination for the DSC.
When the defeated Germans retreated out of the Cosne area of operations, Hall and her men realized they were no longer in a position to provide a viable contribution to the fight. Searching for the next mission, Hall transferred to the Central Section of OSS and deployed to Italy in December 1944. Her fluency in Italian and German proved useful, as was her experience in establishing resistance networks. OSS tasked her to establish contact with the Austrian underground in the Innsbruck region and act as a radio operator, codename Camille, for transferring intelligence. However, by the time she was prepared to make the trip through enemy lines at the beginning of May, OSS cancelled the mission as an unnecessary risk. The war in Europe ended May 7.
Hall returned to Lyon, France, to see the members of the original HECKLER network, only to find that many were tortured, killed, or sent to concentration camps in late 1941. She then sought new assignments in OSS, but many of the biases and discriminatory practices resurfaced in the post-war environment; she wasn't permitted to deploy in an overseas operational capacity. Although Hall received a job with CIA when it formed, she was relegated to office and analytic work for the remainder of her career. She retired from CIA in 1966. Despite these setbacks, Hall was never bitter about the fact that her career hadn't begun or ended as she would have liked.
Hall died at the age of 77 in July 1982. She committed to the cause, placed the mission above accolades, practiced sound operational security and effectively used the resources available. Hall routinely overcame hurdles, often in the face of life threatening circumstances.
NGA Introductory Contract with Planet to Utilize Small Satellite ImageryNGA
October 24, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency will have access to a global imagery refresh every 15 days of most of Earth's landmass through a new contract with Planet, a commercial imagery provider operating the largest constellation of Earth-imaging satellites.
This feed, known as the Planet Feed, will be utilized across the National System for Geospatial Intelligence and select members of the civil federal community. The NSG is the operating framework supported by producers, consumers or influencers of geospatial intelligence, or GEOINT.
"Improving our profession means further committing to the use of innovative capabilities being developed and deployed by commercial data providers and analytic companies for mission accomplishment," said NGA Director Robert Cardillo at the May 2016 GEOINT Symposium in Washington, D.C. "Our commercial space partners will provide meaningful, higher revisit capabilities this year and we look forward to turning their exciting potential into our mission reality."
The introductory contract includes a seven-month period of performance, beginning Sept. 15 and valued at $20 million.
The Planet Feed includes multispectral imagery from constellations at 3-5 meter and 6.7 meter resolutions. The imagery products will include unrectified and orthorectified images and orthomosaic single-pass tiles. The global scope of coverage and high temporal frequency of collection from Planet provides NGA with new data sources to support the agency's many missions including foundation GEOINT, humanitarian assistance, disaster response and intelligence.
"Planet's mission to provide timely, global imagery to empower informed, deliberate and meaningful stewardship of the planet is directly in line with our mission," said John Charles, NGA commercial imagery lead. "We're no longer simply admiring the potential of small satellites and their persistent capabilities, we're harnessing that potential."
Planet designs, builds, and operates a constellation of Earth imaging nano-satellites. The global scope of coverage and high temporal frequency of collection from Planet will provide NGA with new data sources to use for geospatial intelligence analysis.
NGA Awards $10K to 15 Challenge Winners for Discovering, Analyzing Disparate DataNGA
October 19, 2016
SPRINGFIELD, Va. – The National Geospatial-Intelligence Agency awarded 15 challenge.gov participants with $10K at the conclusion of the first phase of the Disparate Data Challenge, and all cash winners and one non-cash awardee were invited to the second phase.
NGA launched the disparate data challenge using www.challenge.gov, seeking intuitive and innovative capabilities to discover, retrieve and analyze data in wildly disparate formats, schemas, interfaces and locations. Phase 1 of the challenge asked participants to implement functioning capabilities that could demonstrate access and retrieval to analyze representative datasets.
"This challenge is part of a greater strategy to engage with innovators and problem solvers we haven't typically worked with," said Col. Mark DiPaolo, mainstreaming innovation branch chief. "With technology evolving so fast, the challenge allows us to post the problem and let all actors in the market provide functioning innovations.
Of the 32 teams that responded to the challenge, including small businesses, universities and private citizens, 25 entities who had not previously worked with the agency presented working capabilities.
The submissions included capabilities for data discovery of disparate data. Some capabilities delivered strong user experience and visualization, while others presented innovative ways to rapidly condition, index, retrieve and manipulate disparate data sets.
The 15 cash winners and one non-cash awardee include:
- Blue Zoo
- App Symphony
- Meta DDC
- Pyxis (non-cash awardee)
In addition to a cash prize, each winner received an invitation to a follow on Demo-thon in the D.C. area scheduled for Oct. 20-21. During the next stage of the challenge, participants will have an opportunity to demonstrate their solutions and earn an additional monetary reward. The first place winner will receive $25,000, second place $15,000 and third place $10,000.
Three Pioneers Inducted into the NSA/CSS Cryptologic Hall of HonorNSA
October 18, 2016
FORT MEADE, MD—Three cryptologic pioneers were inducted into the NSA/CSS Cryptologic Hall of Honor today at the National Security Agency. ADM Michael S. Rogers, USN, Commander, U.S. Cyber Command, Director, National Security Agency/Chief, Central Security Service, presided over the ceremony and highlighted the achievements of each of the distinguished inductees:
- Mr. Gerald Hale: His visionary leadership was a critical element in the Agency's transformation from a predominantly strategic support organization to one proficient in real-time intelligence support to the war fighter.
- Captain Leonard T. Jones, USCG: A pioneer in the development of clandestine radio intelligence for the U.S. Coast Guard in the 1930s and 1940s, his expertise in cryptology laid the foundation for the impressive successes Coast Guard cryptologists achieved against the Prohibition-era "Rumrunners" and against Germany during World War II.
- Command Sergeant Major Odell Williams, USA: An exceptionally talented educator and manager, he coordinated the development of courses in Operational Electronic Intelligence and Fusion Intelligence, instituting "first of its kind" virtual/online training at the Naval Technical Training Center.
The NSA/CSS Cryptologic Hall of Honor was created in 1999 to pay tribute to the pioneers and heroes who have made significant and enduring contributions to American cryptology. Visit our Cryptologic Hall of Honor section for more information about these cryptologic greats.
To learn more about these cryptologic greats, visit the National Cryptologic Museum at the intersection of Maryland Route 32 and the Baltimore-Washington Parkway (I-295), adjacent to the headquarters of the National Security Agency. Hours of operation are 9:00 a.m. to 4:00 p.m. Monday through Friday (except federal holidays), and 10:00 a.m. to 2:00 p.m. on the 1st and 3rd Saturdays of each month. Admission and parking are free. For more information about the museum, please visit our National Cryptologic Museum section. You can also follow the National Cryptologic Museum on Facebook.
Search Opens for National Intelligence University PresidentDIA
October 18, 2016
WASHINGTON – National Intelligence University (NIU) announced today that the search for a new president has begun. The current president, Dr. David Ellison, who has led the university since 2009, plans to retire in August 2017.
The presidential search comes as the university prepares for the move of its main campus from Joint Base Anacostia-Bolling in southeast Washington, D.C., to a newly refurbished facility in Bethesda, Md., in the coming months.
National Intelligence University seeks an individual who can embrace the university's vision of serving as the center of academic life for the intelligence community and accelerate its trajectory. Due to the unique nature of National Intelligence University in providing a service of common concern for the entire Intelligence Community, finalists for this position will be interviewed by one or more heads of major intelligence agencies before the selection is made.
A vacancy announcement is posted in the Chronicle for Higher Education. Formal applications should be submitted to the vacancy announcement published on USAJOBS (NIU-108264-SEMO).
NIU is an accredited federal degree-granting institution whose main campus is located in Washington, D.C. Its alumni are past, present and future leaders in the intelligence and national security communities, and in the private sector. Notable alumni include a former director of national intelligence; former directors of CIA, NSA, DIA and NGA; current and former heads of military intelligence; and a growing number of senior government executives and corporate leaders. For more information, visit http://www.ni-u.edu.
Joint DHS and ODNI Election Security StatementODNI
Oct. 7, 2016
Joint Statement from the Department of Homeland Security and Office of the Director of National Intelligence on Election Security:
The U.S. Intelligence Community (USIC) is confident that the Russian government directed the recent compromises of e-mails from U.S. persons and institutions, including U.S. political organizations.
The recent disclosures of alleged hacked emails on sites like DCLeaks.com and WikiLeaks, and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the U.S. election process. Such activity is not new to Moscow – the Russians have used similar tactics and techniques across Europe and Eurasia, for example, to influence public opinion there. We believe, based on the scope and sensitivity of these efforts, that only Russia's senior-most officials could have authorized these activities.
Some states have also recently seen scanning and probing of their election-related systems, which in most cases originated from servers operated by a Russian company. However, we are not now in a position to attribute this activity to the Russian government. The USIC and the Department of Homeland Security (DHS) assess that it would be extremely difficult for someone, including a nation-state actor, to alter actual ballot counts or election results by cyberattack or intrusion. This assessment is based on the decentralized nature of our election system in this country and the number of protections state and local election officials have in place. States ensure that voting machines are not connected to the Internet, and there are numerous checks and balances, as well as extensive oversight at multiple levels built into our election process.
Nevertheless, DHS continues to urge state and local election officials to be vigilant and seek cybersecurity assistance from DHS. A number of states have already done so. DHS is providing several services to state and local election officials to assist with their cybersecurity. These services include cyber "hygiene" scans of Internet-facing systems, risk and vulnerability assessments, information sharing about cyber incidents, and best practices for securing voter registration databases and addressing potential cyber threats. DHS has convened an Election Infrastructure Cybersecurity Working Group with experts across all levels of government to raise awareness of cybersecurity risks potentially affecting election infrastructure and the elections process. Secretary Johnson and DHS officials are working directly with the National Association of Secretaries of State to offer assistance, share information and provide additional resources to state and local officials.
DIA Awards Three Additional E-SITE Task OrdersDIA
October 5, 2016
WASHINGTON, D.C. – Booz Allen Hamilton of McLean, Virginia, was awarded a five-year time and materials Enterprise Platform Services (EPS) task order (HHM402-15-D-0014/0003) with a maximum ceiling value of $143,931,988.
The task order will support Directorate for Information Management and Chief Information Officer Operations and Management functions. This action was solicited via the previously awarded (July 2015) Enhanced Solutions for the Information Technology Enterprise (E-SITE) multiple award, indefinite-delivery indefinite-quantity contract vehicle. Three proposals were received. Work will be performed primarily in the National Capital Region. The potential Task Order end date is September 28, 2021, if all options are exercised. The Virginia Contracting Activity, Washington, District of Columbia, is the contracting activity.
Cyberspace Solutions, LLC of Reston, Va., was awarded a five-year time and materials task order (HHM402-15-D-0042/0002) with a maximum ceiling value of $51,537,221. The task order will support the Intelligence Community Security Coordination Center (ICSCC) in the Division of Cyber and Enterprise Operations. This action was solicited via the previously awarded (July 2015) Enhanced Solutions for the Information Technology Enterprise (E-SITE) multiple award, indefinite-delivery indefinite-quantity contract vehicle. Ten proposals were received. Work will be performed in the National Capital Region. The potential Task Order end date is May 31, 2021 if all options are exercised. The Virginia Contracting Activity, Washington, District of Columbia, is the contracting activity.
Intrepid Solutions and Services, Inc. of Sterling, Virginia, was awarded a five-year time and materials Information Technology Management Services (ITMSS) task order (HHM402-15-D-0047/0003) with a maximum ceiling value of $35,106,772. The task order will support the Division for Facilities Services, the Office of Corporate Communications, and the Directorate of Intelligence, Joint Staff (J2). This action was solicited via the previously awarded (July 2015) Enhanced Solutions for the Information Technology Enterprise (E-SITE) multiple award, indefinite-delivery indefinite-quantity contract vehicle. Seven proposals were received. Work will be performed in the National Capital Region. The potential Task Order end date is September 29, 2021, if all options are exercised. The Virginia Contracting Activity, Washington, District of Columbia, is the contracting activity.
Former Leaders, Female Geospatial Pioneers Inducted into 2016 Geospatial Intelligence Hall of FameNGA
October 5, 2016
SPRINGFIELD, Va. – The National Geospatial-Intelligence Agency inducted the Geospatial Intelligence Hall of Fame Class of 2016 during a ceremony at NGA headquarters in Springfield, Virginia, Oct. 4.
The Hall of Fame induction ceremony was part of the agency's 20th anniversary celebration.
"For those who have been inducted, this is truly the pinnacle of achievement and recognition for anyone who has served in the geospatial intelligence enterprise," said Robert Cardillo, NGA director. "We're in the presence of a truly exclusive group of Americans and allies – the innovators, explorers and trailblazers who've defined our past and shaped our future."
The Geospatial Intelligence Hall of Fame recognizes those who have profoundly affected the geospatial intelligence tradecraft and have made significant and transformative contributions to the GEOINT tradecraft. NGA honors and inducts Hall of Fame members each year.
This year the inductees are retired National Oceanic and Atmospheric Administration Rear Adm. Christian Andreasen; retired Navy Rear Adm. and former National Imagery and Mapping Agency director Joseph J. Dantone Jr.; B. Louis Decker; Joanne Isham; John A. Oswald; and two distinct groups of women that comprise the "female geospatial pioneers of World War II."
Andreasen, who served as chief hydrographer for NGA's predecessor agency NIMA, is recognized for a legacy of leadership, contributions to an array of technological and analytical innovations, and exceptional service to the agency, and defense, intelligence and civil mission partners.
Former NIMA Director Dantone spearheaded the transformation and creation of NIMA and enhanced the World Geodetic System to better assist the Department of Defense and the Federal Emergency Management Agency during natural disasters.
Decker, a leader in the development, mathematical definition and publication of the WGS-84, the predecessor to the Global Positioning System – helped develop new techniques that improved the accuracy of the Doppler radar. Decker was instrumental in putting WGS-84 data to work for both DoD and the commercial world.
Isham, a former NIMA deputy director, is being recognized for her outstanding leadership, and for her efforts in promoting and developing GEOINT. Isham was also fundamental in integrating the cartographic and imagery communities. In response to the 9/11 terrorist attacks, Isham collaborated with former NIMA Director James Clapper to redefine NIMA's mission and structure.
Oswald helped transform the analysis tradecraft from single-source photo interpretation to an advanced analytical effort with expanded content while at NGA's predecessor organization, the National Photographic Interpretation Center. A former NGA-Denver director, Oswald established professional certifications and standards for a program of analysis and has mentored NGA employees at agency locations across the U.S.
The two groups include the Army Map Service women cartographers, also known as the Military Mapping Maidens, and the Medmenham, United Kingdom, female photo interpreters. They are recognized for their cartography, geodesy and photo analysis accomplishments.
NGA Launches Public Website for Hurricane Matthew Response EffortsNGA
October 5, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency launched a new public website Oct. 5 to host unclassified geospatial intelligence data, products and services to assist U.S. government response efforts for Hurricane Matthew.
The site provides a single location for consolidated tools and situational awareness to assist in understanding the extent of damage caused by Hurricane Matthew and provides ready-to-use information and products for emergency responders.
The unclassified website is open to the public and requires no passwords. It brings together information from multiple agencies and organizations, and is located at http://nga.maps.arcgis.com.
As the situation develops, damage and flood assessments will also be available, including information about road closures, damaged structures and bridges, landslides, potential locations for helicopter landing zones, and additional information used in response and recovery efforts.
NGA's Hurricane Matthew portal is the latest public website hosted by NGA. Other live portals include the Combating Wildlife Trafficking and Arctic support sites. The sites use Esri's ArcGIS online platform hosted by Amazon Web Services, both publicly available services.
DIA Awards Three E-SITE Task OrdersDIA
October 4, 2016
General Dynamics Information Technology of Fairfax, Virginia, was awarded a five-year time and materials Enterprise Communications Services 2 (ECS-2) task order (HHM402-15-D-0020/0004) with a maximum ceiling value of $154,714,691.
The task order will support Directorate for Information Management and Chief Information Officer Operations and Management functions. This action was solicited via the previously awarded (July 2015) Enhanced Solutions for the Information Technology Enterprise (E-SITE) multiple award, indefinite-delivery indefinite-quantity contract vehicle. Three proposals were received. Work will be performed primarily in the National Capital Region. The five-year ordering period is expected to expire September 28, 2021. The Virginia Contracting Activity, Washington, District of Columbia, is the contracting activity.
22nd Century Technologies, Inc. of McLean, Va., was awarded a three-year time and materials task order (HHM402-15-D-0035/0002) with a maximum ceiling value of $12,600,000. The task order will support Directorate information technology requirements for the Defense Intelligence Agency's National Media Exploitation Center. This action was solicited via the previously awarded (July 2015) Enhanced Solutions for the Information Technology Enterprise (E-SITE) multiple award, indefinite-delivery indefinite-quantity contract vehicle. Thirteen proposals were received. Work will be performed in the National Capital Region. The potential Task Order end date is February 8, 2020 if all options are exercised. The Virginia Contracting Activity, Washington, District of Columbia, is the contracting activity.
Berico Technologies, Inc. of Reston, Va., was awarded a five-year time and materials task order (HHM402-15-D-0038/0002) with a maximum ceiling value of $38,900,000. The task order will support Directorate information technology requirements for the Defense Intelligence Agency's National Media Exploitation Center. This action was solicited via the previously awarded (July 2015) Enhanced Solutions for the Information Technology Enterprise (E-SITE) multiple award, indefinite-delivery indefinite-quantity contract vehicle. Eight proposals were received. Work will be performed in the National Capital Region. The potential Task Order end date is February 22, 2022 if all options are exercised. The Virginia Contracting Activity, Washington, District of Columbia, is the contracting activity.
Cybersecurity Awareness MonthNSA
October 3, 2016
Statement from Admiral Michael S. Rogers, Admiral, U.S. Navy; Commander, U.S. Cyber Command; Director, NSA
As we observe the 13th National Cyber Security Awareness Month, it is important not only to reflect on how much progress we have made, but also to remember there is much more work to be done to protect cyberspace and increase cybersecurity awareness.
NSA21 is enabling NSA to prepare for potential threats to cybersecurity over the coming decade and to successfully continue its mission to defend and protect national security networks. We will remain postured to anticipate potential threats and to thwart active attacks.
NSA, along with the rest of the U.S. government, including our partners at the Department of Homeland Security (DHS) and the Federal Bureau of Investigation, is committed to working regularly with our allies, academia and industry to raise cybersecurity awareness while protecting individuals' privacy and civil liberties. Cybersecurity is one of the nation's critical national security priorities, and everyone must play a role. Throughout October, there will be multiple opportunities to learn about cyber hygiene, participate in events and acquire tips you can share with friends and family. Activities are organized by the following weekly themes:
- Week 1 - Everyday Steps Toward Online Safety with Stop. Think. Connect.™
- Week 2 - Cyber from the Break Room to the Board Room
- Week 3 - Recognizing and Combating Cybercrime
- Week 4 - Our Continuously Connected Lives: What's your 'App'-titude?
- Week 5 - Building Resilience in Critical Infrastructure
For more information visit the DHS website.Michael S. Rogers
Admiral, U.S. Navy
Commander, U.S. Cyber Command
President Barack Obama Recognizes DIA's 55th AnniversaryDIA
September 30, 2016
Statement from President Barack Obama:
THE WHITE HOUSE – I am honored to recognize the Defense Intelligence Agency (DIA) for 55 years of outstanding service to our nation.
From its creation in the midst of a long Cold War through the emergence of new challenges and opportunities, and into our young century, DIA's work has been advanced by the expertise and dedication of men and women committed to protecting our country. In times of war and peace alike, the support you provide to military personnel and civilian leadership has been a critical component of our national defense. By continuing to demonstrate the fullest measure of adaptability and resolve, you are helping ensure our country remains at the forefront of progress when it comes to our collective security.
Thank you for your extraordinary devotion to the safety of the American people. As you mark this occasion, you have my very best.
Status Report on the Implementation of Executive Order 13698 Hostage Recovery ActivitiesODNI
September 30, 2016
To ensure accountability for the reforms mandated by the E.O. and PPD-30, the E.O. directed that within one year, NCTC, in consultation with the Secretary of State, Secretary of Defense, Attorney General and the Director of the Federal Bureau of Investigation (FBI), provide a status report to the Assistant to the President for Homeland Security and Counterterrorism on the implementation of the E.O.
The E.O. directed that the status report will be informed by consultation with stakeholders outside of the USG, including former hostages and hostages' families, and will, to the extent possible, be made available to the public. This status report responds to those requirements.
DIA Awards Contract for ATLAS ServicesDIA
September 29, 2016
WASHINGTON, D.C. – Integrity Applications of Chantilly, Va., was awarded a multiple year, cost-plus-fixed-fee contract (HMM402-16-C-0106) with a maximum ceiling value of $50,899,933. The contract will provide non-personal acquisition, technical, logistical, and administrative support (ATLAS) services to the Defense Intelligence Agency.
Work will be performed in the National Capital Region. The acquisition was solicited on the basis of full and open competition, and two proposals were received. This award includes a 12-month base period and four 12-month option periods. Estimated completion of the contract is Sept. 27, 2021. The Virginia Contracting Activity, Washington, District of Columbia, is the contracting activity.
DIA Awards Contract for Scientific Computing SupportDIA
September 29, 2016
WASHINGTON, D.C. – COLSA Inc., Huntsville, Ala., was awarded an indefinite-delivery/indefinite-quantity contract (HHM402-16-D-0025) with an estimated contract ceiling of $103,000,000 over a five-year ordering period.
The contract will provide scientific computing for analysis technical support to support the Defense Intelligence Agency's Missile and Space Intelligence Center (MSIC). MSIC, located in Huntsville, Ala., responds to the technical intelligence requirements of Department of Defense planners and decision makers. This requirement is for analytical network, modeling and simulation computationally-intensive computer systems operations, High Performance Computer System operations (HPCS), and HPCS hardware and software maintenance.
Performance of this small business contract will primarily take place in Alabama. The acquisition was solicited on the basis of full and open competition, and three proposals were received. To determine the contract award, a best value source selection was conducted in accordance with Federal Acquisition Regulation 15.3, source selection, and as supplemented by the Defense Federal Acquisition Regulation Supplement. Estimated completion of the contract is Sept. 27, 2021. The Virginia Contracting Activity, Washington, District of Columbia, is the contracting activity.
NGA Awards Management Contracts to 6 Small BusinessesNGA
September 27, 2016
SPRINGFIELD, Va. – The National Geospatial-Intelligence Agency awarded six Base Indefinite Delivery, Indefinite Quantity, or IDIQ, contracts Sept. 23 as part of the agency's small business set-aside initiative.
The contracts support EMERALD, an agency-wide program that provides total life cycle acquisition management, strategic financial management and strategic business management support services.
The following small businesses were awarded contracts:
- New River Systems Corporation, Ashburn, Va.
- St. Michaels Inc., Woodbridge, Va.
- WiSC Enterprises, LLC, Chantilly, Va.
- S2 Analytical Solutions, LLC, Herndon, Va.
- Agile Support Alliance Joint Venture, Marshall, Va.
- Knowledge Link, Inc., Herndon, Va.
Each contract has a total period of performance of five years. The maximum program award is $849 million. The minimum guarantee per contract is $10,000.
DIA Awards E-SITE Time and Materials Task OrderDIA
September 21, 2016
WASHINGTON, D.C. – The Defense Intelligence Agency today awarded Booz Allen Hamilton Inc., McLean, Va., a five-year time and materials task order with a maximum ceiling value of $268,000,000 if all options are exercised. The task order is incrementally funded, with $796,000 funded in fiscal 2016.
The task order will provide infrastructure engineering and operation services to support Defense Intelligence Agency and Intelligence Community information technology requirements under the previously awarded Enhanced Solutions for the Information Technology Enterprise (E-SITE), multiple award, indefinite-delivery indefinite-quantity contract vehicle. Work will be performed in the National Capital Region and other locations worldwide.
The task order was solicited via the E-SITE contract vehicle, and six proposals were received. The five-year ordering period is expected to expire in September 2021. The Virginia Contracting Activity, Washington, District of Columbia, is the contracting activity.
Implications for U.S. National Security of Anticipated Climate changeODNI
September 21, 2016
Climate change is projected to produce more intense and frequent extreme weather events, multiple weather disturbances, along with broader climatological effects, such as sea level rise.
These are almost certain to have significant direct and indirect social, economic, political and security implications during the next 20 years. These effects will be especially pronounced as populations continue to concentrate in climate-vulnerable locales such as coastal areas, water-stressed regions, and ever-growing cities. These effects are likely to pose significant national security challenges for the United States over the next two decades, though models forecast the most dramatic effects further into the future.
Global Implications of Illegal, Unreported and Unregulated (IUU) FishingODNI
September 19, 2016
Global fisheries face an existential threat in the decades ahead from surging worldwide demand, declining ocean health, and continued illegal, unreported, and unregulated (IUU) fishing.
IUU fishing also harms legitimate fishing activities and livelihoods, jeopardizes food and economic security, benefits transnational crime, distorts markets, contributes to human trafficking, and undermines ongoing efforts to implement sustainable fisheries policies. It can also heighten tensions within and between countries and encourage piracy. The illicit nature of IUU fishing means that the size of the problem and its negative consequences can only be roughly estimated.
Summary of the Reengagement of Detainees Formerly Held at Guantanamo Bay, CubaODNI
September 14, 2016
The DNI submits this summary consistent with direction in the FY2012 Intelligence Authorization Act, Section 307. Click to Download the PDF Report
* The report is available for use with Adobe Acrobat Reader. The latest, free version of Acrobat Reader is available for download at Adobe.
Ready, Set, ChallengeNSA
September 12, 2016
It's time once again for NSA's annual Codebreaker Challenge. Through this annual event, NSA offers college undergraduate and graduate students an opportunity to see the kinds of problems NSA faces on a daily basis and then replicate the process NSA uses to devise a solution.
Current cybersecurity students are able to mimic a common problem that NSA addresses regularly and determine if they have what it takes to work at the agency.
This year, the scenario will revolve around finding an improvised explosive device (IED) and having the students figure out how to reverse engineer and then disarm the IED. The 2016 scenario differs from previous challenges in that it provides insight into both offensive and defensive missions of the agency. Previous challenges had focused heavily on only the offensive mission.
Andrew, NSA Codebreaker Challenge project manager, said, "We wanted a scenario that reflects all the work we do to support the military, not just one aspect. Plus, this challenge will capture both our signals intelligence and information assurance missions to give students a full view of the work we do."
The challenge always includes multiple tiers of increasing difficulty and intensity. This year, the NSA Codebreaker Challenge team decided to expand the challenge based on feedback from participants and professors. "Professors told us that they hoped to pique interest of more freshmen level students with little computer experience. So we added a really basic task for those new to computer security. We also noticed that some students completed the most difficult tier in less than 24 hours in 2015, so we decided to create another final tier with increased difficulty for 2016," said Andrew. In addition, they built in more disciplines such as network traffic analysis to broaden the scope of the project.
Throughout the challenge, NSA Security Education Academic Liaisons (SEALs) interact regularly with participants to ensure that they are on the right track. This includes visits to some of the participating colleges and universities to provide guidance on how to solve the problem, discuss the work performed at NSA, and detail employment and internship opportunities at the agency. Last year, NSA SEALs gave on-campus briefings at 15 schools. This year, in an effort to reach a broader audience, NSA will host a virtual technical talk online via Adobe Connect, and allow students to ask questions about the 2015 and 2016 challenges. Students can sign up through the Codebreaker Challenge website.
In 2015, NSA launched a website that allowed students to download the Challenge problem and track progress through a leaderboard, which will be continued into 2016. The leaderboards will show the number of student participants per school and their ranking by tasks solved.
If you think you are up for the challenge, visit https://codebreaker.ltsnet.net to sign up.
DNI Clapper's As Delivered Remarks at the 2016 INSA & AFCEA Intelligence & National Security SummitODNI
September 8, 2016
View speech from INSA & AFCEA Intelligence & National Security Summit...
Remarks as delivered byThe Honorable James R. Clapper
Director of National Intelligence
"U.S. Intelligence as a Pillar of Stability During Transition"
INSA & AFCEA Intelligence & National Security Summit
Wednesday, Sept.7, 2016
Walter E. Washington Convention Center - Washington, DC
When I was president of SASA, the predecessor to INSA in the 1990s, I tried to promote a combined symposium with AFCEA, but I could never pull it off. This event now marks the third year in a row for this joint summit. So I want to congratulate everyone who is involved in both organizations, AFCEA and INSA, in putting these things on, and now they're becoming a custom. So it proves that over time, things do change. But I think we can safely say it's an idea whose time has really come and that you've made it stick.
This has also been, for me, a very useful forum to convey messages and roll out IC-wide initiatives. At the first AFCEA-INSA summit two years ago, I rolled out the 2014 National Intelligence Strategy, which included our principles of professional ethics for the Intelligence Community. And last year, I rolled out the principles of intelligence transparency, our IC transparency working group which is now a permanent council, and a number of community-wide transparency initiatives.
So this year, I realize about the only thing we'll be rolling out the door in the next four months, is me. [LAUGHTER] So I thought this morning, I'd talk about what seems to be on everyone's mind, which is the forthcoming transition of our Presidential administration and IC leadership. In about two months, 62 days to be exact, we'll know who the next President will be, hopefully. And many of the faces and names at the top of the national security structure will probably accordingly change.
Now, any Presidential transition is a very vulnerable time for the country. During President Obama's inauguration in 2009, I had a unique opportunity to see this, experience this first-hand. Just like for the State of the Union speeches, during inaugurations when everyone who's anyone is on the D.C. Mall, the administration picks a designated survivor, a Cabinet official or Cabinet-level official to stay in an undisclosed location away from Washington, D.C., so that in case something terrible happens, that person could assume the duties of the President.
Now, during the 2009 inauguration, that person was Bob Gates, not me. As secretary of defense, Bob was, I think, the only holdover Cabinet official from President Bush's administration. And at the time, I was the undersecretary of defense for intelligence. So I got to be the acting SECDEF for Bob while he was playing designated survivor. So I spent the inauguration in a cave at Fort Ritchie, Maryland.
The experience definitely drove home the vulnerability that we experience during a transition, and particularly the exact moment when the baton is passed from one President to the next. This upcoming transition will happen at a particularly, I think, difficult time as we're facing the most complex and diverse array of global threats that I've seen in my 53 years or so in the intelligence business.
So we are living in what I've come to call a world of unpredictable instability, in which two-thirds of the nations around the world are at some risk of instability in the next few years. Let me illustrate with some perspectives just on Africa.
Africa is enormous; over 11 million square miles with more than 1.1 billion people. And just between the years 2010 and 2015, 52 Presidential elections were held on the continent, contributing to the constant political change. More than 1,130 armed conflict events occurred, resulting in conservatively over 50,000 fatalities.
And there are two key factors driving the scope and complexity of unrest which span political, economic, security, cultural and ethnic sectors, and resulting clashes between varying factions, massive humanitarian crises and perpetual regional instability. And so that led to some interventions from the U.S. and other nation states, as well as multinational organizations.
So Africa is just one region of the world where such turmoil is present. Nearly everywhere, the IC can point out the potential for failures or collapses. We certainly can't anticipate the specifics, the when, where and how for our policymakers. This unpredictable instability has been a constant for certainly this administration and will be, I think, for the next one too no matter who our President is.
In the coming decades, an underlying meta-driver of unpredictable instability will be, I believe, climate change. Major population centers will compete for ever-diminishing food and water resources and governments will have an increasingly difficult time controlling their territories. And so because of all of these factors, after ISIL's gone, we can expect some other terrorist entity to arise and a cycle of extremism which will continue to control us for the foreseeable future. And by the way, our more traditional adversaries like Russia and China and Iran and North Korea will continue to challenge us.
And of course, technology will continue to be disruptive. Just think about the fact that Uber is the biggest taxi company in the world and they don't own any cars. Airbnb is the biggest hotel company and they don't own any properties. It is difficult to predict how technology will affect national security. Tech areas like artificial intelligence, healthcare and agricultural, self-driving cars and 3-D printing have the potential to revolutionize our lives for the better or they could present vulnerabilities that are very hard to predict.
So with all this as a back drop, I think it makes a lot of people nervous that with an election cycle that's been sportier than we're used to, we'll drop a new President with new national security leaders into this situation – in 135 days, but who's counting?
I know a lot of people of been feeling uncertainty about what will happen with this Presidential transition. Been a lot of catastrophizing, if I can use that term, in the 24-hour news cycle, and of course, on social media. So I'm here with a message. It'll be OK.
About two weeks ago, I participated in a meeting at the White House led by the White House Chief of Staff Dennis McDonough in which was the first formal meeting between the current administration and the two transition teams. And I was struck by how sober and professional and courteous and civil the conversation was.
When you pass on an inkling to whomever succeeds this administration some insight into the magnitude, complexity and the gravity of what it is to lead the U.S. government. Our nation has a great legacy of orderly transition and power, going back to George Washington retiring in 1797, when he turned the presidency over to John Adams. I remember it well. [LAUGHTER]
Because of our mission and our professionalism, today's IC I think represents a pillar of stability during such a transition. In contrast to the rapid technology advances and the unpredictable instability of the world and any uncertainty surrounding an election and transition to the next administration, one constant in national security is the people of the Intelligence Community.
Over the past few years, our nation has held a very public conversation about our work and how we should conduct it as an Intelligence Community. I believe a lot of what has been lost in the public debate about how we conduct intelligence is why we even do it in the first place. Why does any nation state conduct intelligence?
I spent a little time and thought on that question, and I think we conduct intelligence, maybe at its most basic level, to reduce uncertainty for our decision-makers. And that could be the President in the Oval Office or it can be a war fighter, if I can stretch the metaphor, in an oval-shaped foxhole. We can't eliminate uncertainty for any decision-maker, whether in the Oval Office or the foxhole, but we can provide insight and analysis to help their understanding and to make uncertainty at least manageable so that our national security decision-makers can make educated decisions with an understanding of the risk involved, so that we, our friends and allies, can operate on a shared understanding of the facts of the situation.
That's why we're already briefing the candidates to help reduce uncertainty for our next President, whoever it is, so that he or she will step into the Oval Office with as good an understanding of our complex and uncertain world as we can help provide.
And I've thought a lot about our work through sort of a historical lens, and maybe that's because I've lived through a lot of history. Although despite what I said before, I really wasn't there when Washington turned the presidency over to Adams. [LAUGHTER] I was deployed at the time, so I missed the ceremony. [LAUGHTER] Only kidding.
So today, considering the press of public interest in what the IC is doing during this Presidential transition, which is unlike anything we've seen before, I want to shed a little light on what we're doing.
First off, to dispel a myth; we're not giving President Obama's PDB, or any PDB product, to the candidates. In fact, the tradition of giving candidates classified briefings predates the existence of the PDB. In 1952, President Truman offered the first candidate briefings to General Eisenhower and Governor Stevenson, and the newly-formed CIA conducted these briefings. Truman felt an obligation to do that because of his experience and how woefully uninformed he felt on his first day in office as President when he succeeded President Roosevelt.
In fact, he hadn't known of the existence of the Manhattan Project until 12 days after he was sworn in as President, and he had been Roosevelt's Vice President. So he wanted his successor to be a little better prepared based on the nomination to be President, not on any clearance the candidate held or had held. That precedent has carried over for every election since then – since 1952. The CIA handled those briefings until 2008, when the Office of Director of National Intelligence assumed the responsibility.
As a point of trivia, there have only been three elections in which briefings were offered to candidates from both major parties: 1952, 2008, and now this year, 2016. Those are the only years in which one of the candidates wasn't already receiving intelligence briefings as the incumbent President or Vice President.
So just to be clear, one team produces and delivers the PDB, as we always do, and a completely separate team produces and coordinates the cross-agency effort to brief the candidates. And in fact, in our effort to try to make sure that there's no political influence on the briefings, the candidate briefing team does not coordinate with the White House and only career intelligence officers give the briefings, not political appointees like me.
Similar to prior elections, we set ground rules months before the briefings started, which the White House concurred with, on June 22nd. And the IC has essentially been operating independently since then. We have a list of topics that we offer to each candidate. They can ask for briefings on any or all of them. They can also ask for briefings on new topics. If we give briefs on new topics, we'll make sure both candidates have a chance to get those same briefs. Otherwise we don't tell either campaign or the public what happens in those briefings: not what topics each candidate shows interest in or gets briefed on, not how either candidate reacts and not what questions get asked.
And we take that confidentiality so seriously that I am still sworn to secrecy about what happened when I briefed General Eisenhower and Governor Stevenson. [LAUGHTER] Another geezer joke there. [LAUGHTER] But I'll make a serious point. People all around the world, not just opposing parties, want to know what the candidates are thinking. That's why we've seen attempted cyber intrusions against parties and candidates going back more than one election cycle.
We've certainly seen it this year with the network intrusion against the Democratic National Party. The President said last week, and I quote, "Experts have attributed this to the Russians." So I won't get out ahead of the President on this, particularly while the FBI is still conducting an investigation, but I can reiterate his other point. The Russians hack our systems all the time, not just government, but also corporate and personal systems. And so do the Chinese and others, including non-state actors. The point is, cyber will continue to be a huge problem for the next Presidential administration, as it has been a challenge for this one.
But back to the IC's role in this orderly transition. On the day after the election, the briefing process I described changes. The new President-elect will receive his or her first PDB briefing, and it will be essentially identical to that which President Obama receives. Later this month, I'll send over proposed ground rules to the White House about how we'll make all that happen. And later, my office will also provide support to prepare the next DNI and next generation of IC leaders.
This whole process is built on the precedent set by Harry Truman back in 1952. And I'm really glad, as a citizen, that he made that generous decision to better prepare his successor. I talked about the uncertainty of our world and the diversity of threats we face. I believe, I know, it's crucial for our next President to step into office on Jan. 20 as informed and prepared as possible to face that uncertain world.
President Johnson once said, "The President's hardest task is not to do what is right, but to know what is right." And having worked closely with and for our current President, I can absolutely attest, that statement by President Johnson still holds true. Knowing what is right is the President's hardest task. The IC can't make that decision for him. We wouldn't want to. When it comes to national security, it's our job to give him the intelligence he needs to decide what's right.
So our work means a great deal to the person we call, "Intelligence Customer Number One." I believe that in this time of change, when we don't know today who our next intelligence customer number one will be, what our national priorities will be or what challenges we'll face next, I'm confident that our unique accesses and insight will continue to help our national leaders manage this inevitable uncertainty, for a long time to come.
So let me wrap up with a story from about 54 years ago, in 1962, about a year before I actually started in the intelligence profession. I was an Air Force ROTC cadet at Otis Air Force Base in Massachusetts, when I briefly met President Kennedy. He'd flown into the base, to Otis, en route to a family vacation at their residence -- the family residence in Hyannis Port. And so they "fell out" all the ROTC cadets to greet him when he got off the plane.
And somehow, I ended up in the front row of the rope line when he got off Air Force One. There were maybe a dozen of us right up against the rope and the President came through and shook our hands. And each of my fellow cadets gave the President his name - that's what we were instructed to do - and told him which aircraft they wanted to fly in the Air Force. And when he got to me, I gave him my name and he asked me what I wanted to do when I joined the Air Force. And I told him I wanted to be an intelligence officer.
He paused, looked at me a bit askance, he said "Good, we need more like you," and then continued down the rope line. I'm sure President Kennedy never gave that little exchange another thought. I, on the other hand, never forgot it.
That's the impact our work has at the highest levels of government, something I learned as a 19-year-old -- 20-year-old ROTC cadet. And at the time, I certainly never would have dreamed in my wildest imagination that I'd close my intelligence career in a job in which I'd have the privilege of briefing the President.
And there's simply no way you could have told me in 1962 that I'd spend six-plus years briefing our nation's first African-American President. That's something my parents would have been astounded by, my father certainly, and my mother would have been very proud of.
I look back over my half century in the intelligence business and can see the evolution of our IC. We are better, much, much better now than we were 53 years ago when I first took my oath of office as a young second lieutenant. We're better, more capable than we were 15 years ago, on Sept.11th, 2001. And I believe we're better, or like to think we are more integrated than we were six years ago when Vice President Biden swore me in as the DNI; although I'm going to leave it for somebody else to grade my term paper.
The reason we keep evolving and keep getting better is because of the people, the people in this room, the people in the IC and their instinct to serve. The nation continues to be a bedrock constant, just as it was when I started. Yes, the world changes, the threats evolve, the technology mushrooms, but our people, our IC will be a steady constant of vigilance and stability as it will be through this transition.
I couldn't be prouder to serve in this great community. And that's something that you'll keep hearing from me for another 135 days - but who's counting?
So thanks very much.
NGA Capitalizes on SpaceNet's EffortsNGA
September 7, 2016
SPRINGFIELD, Va. – The volume of available overhead imagery is increasing at a rate that is impossible for humans to keep up with and manage effectively.
To fully leverage this abundance of imagery, the National Geospatial-Intelligence Agency constantly seeks innovative ways to automate its imagery analysis to better support national security efforts.
Enter SpaceNet, a recently launched collaboration between DigitalGlobe, In-Q-Tel's CosmiQ Works, NVIDIA, and Amazon Web Services. SpaceNet offers an opportunity to build on the work of others in the pursuit of enhanced automation for geospatial intelligence.
NGA will participate with the SpaceNet initiative, demonstrating the agency's commitment to fostering, developing and deploying innovative technology to further the NGA mission and our customers' success, said Robert Cardillo, NGA director.
"We know that what got us here, won't get us to where we need to be in the future," said Cardillo. "These new actors in our mission space are alive with energy and ideas that enhance our collective contribution to our national security. NGA cannot do it all by itself. We must rely on our partners in science, academia and industry to help us stay ahead of technology trends."
SpaceNet offers an online repository of commercial satellite imagery and labeled training data available at no cost to the public via Amazon Web Services.
The SpaceNet open innovation initiative is aligned with the White House Strategy on American Innovation. NGA anticipates that tapping into the creativity and experience of the public through its participation with SpaceNet will accelerate the automation for NGA's space-based image analyses, said Cardillo.
NGA, NSF Release 3-D Elevation Models of Alaska for White House Arctic InitiativeNGA
September 1, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency and the National Science Foundation publicly released new 3-D topographic maps of Alaska Sept. 1 in support of a White House Arctic initiative to inform better decision-making in the Arctic.
The 3-D digital elevation models, or DEMs, are the first to come from the ArcticDEM project, which was created after a January 2015 executive order calling for enhanced coordination of national efforts in the Arctic.
"To help Alaskans better plan for sustainable development, the National Geospatial Intelligence Agency and the National Science Foundation are leading a public-private collaboration to create the first-ever publicly available, high-resolution, satellite-based elevation map of Alaska by next year and the entire Arctic by the year after that," said President Barack Obama in his Sept. 3, 2015 remarks at Kotzebue High School.
Models of the entire Arctic are scheduled for release in 2017.
The models are based on 2-meter resolution images captured by Digital Globe commercial satellites. This technology is significant in polar mapping because it allows for more thorough coverage of the Arctic than did traditional imagery collection by aircraft, which is limited in the inhospitable and remote polar region.
"The models will play an important role in informing policy and national security decisions," said Robert Cardillo, NGA director. "They may also provide critical data and context for decisions related to climate resilience, land management, sustainable development, safe recreation and scientific research."
The release of high-resolution elevation mapping marks a huge step forward in our ability to deal with the changing Arctic, said Ambassador Mark Brzezinski, Executive Director of the Arctic Executive Steering Committee at the White House.
"The Arctic region is experiencing some of the most rapid and profound changes in the world," said Brzezinski. "These changes impact communities, as well as the ecosystems upon which they depend. Yet, much of Alaska and the Arctic lack even basic modern and reliable maps to help Arctic communities understand and manage these risks. The DEMs will address this gap."
The project brings together a unique set of national assets, including the White House Office of Science and Technology Policy, NGA, NSF, the Polar Geospatial Center at the University of Minnesota, University of Illinois, Ohio State University and Cornell University.
Teams from NGA and NSF worked with these partners to launch an unclassified, open Arctic portal where the DEMs and emerging information is available to the public. Esri, a geographic information system provider, hosts the site at nga.maps.arcgis.com. The public website hosts Webmaps, map viewers, other DEM exploratory tools, nautical charts, sailing directions and infographics, and a downloadable Pan-Arctic map with mission-specific data layers.
The U.S. serves as the chair of the Arctic Council through Spring 2017 when the position rotates to Finland for two years.
The White House Arctic Initiative supports efforts to understand the Arctic, engage with residents, and develop tools, products and services that improve federal, state and local activities in the Arctic.
For more information, view the White House's Medium post, "New elevation map details Alaska like never before"
A digital elevation model of Anchorage, Alaska, shows planes parked off the runway of Ted Stevens International Airport. Better elevation maps can be used to quantify changes in sea level and monitor coastal erosion in order to identify buildings and critical infrastructure -- like airports -- at high risk of storm-surge damage, and to identify safe places to shelter when storms come.
This Arctic digital elevation model image centers on Kodiak Benny Benson State Airport, a public and military airport located five miles southwest of the city of Kodiak. The image highlights the rugged relief surrounding the three runways of the airport and clearly depicts vegetation, buildings, coastal features and the drainage network of the area.
Wolverine Glacier is a valley glacier in the coastal mountains of south-central Alaska's Kenai Peninsula. For climate change monitoring, satellite imagery can be collected and DEMs produced at regular intervals—weekly, monthly or annually —to observe and document changes as they occur.
The winding Koyukuk River in Western Alaska is a 425 mile-long tributary of the Yukon River. The digital elevation models show the unique boreal forest vegetation patterns that surround the river region in greater detail than ever before, bringing the unique Arctic landscape into focus.
The Gulkana Glacier and river valley region is one of three long-term U.S. Geological Survey glacial monitoring sites. These new digital elevation model images will help anticipate future landscape-level changes, due to, for instance, erosion, extreme events, or climate change.
Grassroots Women's Coding Initiative Launches at NGANGA
August 30, 2016
Eliza Bradley, Ph.D., a spectral imagery scientist and Sarah Vahlkamp, a workforce analyst, saw the benefits of developing a familiarity with different technologies — including coding languages — as part of the first iteration of the agency's GEOINT Pathfinder initiative.
"Coding ability among the team members ranged from very experienced to very new," said Vahlkamp. "The whole team saw the benefit of sharing resources and knowledge to increase everyone's abilities."
After the project's conclusion, the two women brainstormed ways to better support women in coding; especially those who are not in work roles that require it, but still invested in boosting their computational literacy, said Bradley.
Enter Women Enriching Coding, or #WECODE, a grassroots effort to support women who code at any level.
"#WECODE offers the opportunity to create accessibility to coding at all levels of experience," said Vahlkamp. "Beginners can find guidance or suggestions from more experienced coders. And, the very experienced get the different perspective gained from teaching new learners."
This kind of women-focused coding initiative reflects similar efforts outside the Intelligence Community, where groups such as Girl Develop It, PyLadies, Women Coding Collective and Girls Who Code have received national recognition.
The goals of #WECODE go beyond simply increasing coding ability. Bradley and Vahlkamp hope to make it second nature to share and discover ideas related to coding across the IC. "With #WECODE, we're hoping to build a robust network to promote coding and development skills to all who are interested, encouraging community-wide collaboration and providing an open environment for discovery and innovation," said Bradley.
Next steps include identifying a senior champion for the effort, planning future events and getting 100 women to sign-up by the middle of October, which shouldn't be too hard of a feat since the group already boasts a membership of more than 70 throughout the IC, including the U.S. Department of Treasury, Department of Energy, the Office of Naval Intelligence, the National Reconnaissance Office, Central Intelligence Agency, National Security Agency and Defense Intelligence Agency.
"As technological capability grows in the IC, the community as a whole will benefit," said Bradley. "With this effort we hope to enable people to innovate and experiment on their own, potentially discovering new solutions for evolving needs."
NGA Challenge Offers Up to $200K for Disparate Data SolutionsNGA
August 30, 2016
SPRINGFIELD, Va. – The National Geospatial-Intelligence Agency is offering up to $200,000 in prizes for solutions to the agency's disparate data challenges via Challenge.gov, a technical hub for federal incentive prize and challenge competitions.
This goal of this competition is unified access to data that is distinct in its formats, schemas, interfaces and locations, so that it may be available for search, business metrics and data and information analytics.
This is a direct result of the task to create "coherence from chaos" that NGA Director Robert Cardillo issued at this year's GEOINT Symposium in Orlando, Florida.
"We must have tools and techniques to allow us to quickly make sense of big data then visualize and disseminate that clarity to our customers," said Cardillo. "We don't just need pixels. Offer us subscriptions that will provide us alerts, observations and insights that we'll meld with our own to drive deeper analysis of all that incoming data and lead to more meaningful conclusions."
The first stage of the competition will award fifteen cash prizes of $10,000 each to solutions that successfully implement functioning code that can access and retrieve either part or all of the provided representative datasets.
"We're not just looking for white papers, but working code," said Air Force Col. Marc DiPaolo, chief of mainstreaming capabilities in NGA's Enterprise Innovation Office.
Award winners from the first stage will progress to the second part of the competition, a "Dem-o-thon" in the Washington, D.C. area, where a panel of NGA judges will test drive the winning solutions. There will be three cash prizes of $25,000, $15,000 and $10,000 awarded for the first, second and third place winners, respectively.
"Geospatial intelligence is so much more than just pictures from a satellite," said DiPaolo. "We want ideas on how to seamlessly pull together these wildly disparate data sources – everything from imagery, social media, documents, video, et cetera – to create robust products for our customers."
This is the agency's second Challenge.gov competition. The first competition, which concluded this summer, sought code technical support to track changes to a story in a dynamic, fast and aesthetic way as it is being developed, creating a "living story."
For more information on the Disparate Data Challenge, visit NGA on Challenge.gov.
Now Accepting 2017 Summer Internship ApplicationsDIA
August 30, 2016
Applications are now available for the Defense Intelligence Agency's 2017 Summer Internship Program. This program provides current college students and recent graduates the opportunity to gain practical work experience through research, report writing, briefing development and delivery, policy writing, and intelligence analysis. Interns will gain valuable on-the-job experience while providing support to DIA's mission. They are also exposed to the broader Intelligence Community through field trips, information sessions, and panel discussions. Interns will be appointed for a 10-12 week period from June through Aug. 2017.
DIA provides military intelligence to warfighters, defense policymakers and force planners in the Department of Defense and the Intelligence Community in support of U.S. military planning, operations and acquisition. We plan, manage, and execute intelligence operations during peacetime, crisis, and war.
The Summer Internship Program is open to incoming college seniors who will graduate no later than December 2017, law school students who will have completed two semesters of coursework, post graduate students who are enrolled in the last year of their degree program, and recent graduates who have completed a qualifying Bachelors or Master's degree from an accredited U.S. institution within the last two years. Applicants must possess a minimum cumulative grade point average of 3.0 on a 4.0 scale at the time of application and at the time of employment. All applicants must be a U.S. citizen at the time of application and are subject to a thorough background inquiry. All interns must be granted a security clearance and successfully pass a drug screening test prior to being made a final offer.
To apply for the program, see the vacancy announcements at https://www.diajobs.dia.mil, or go the DIA webpage (www.dia.mil) and select "Search Vacancies" under the DIA Careers page for these fields:
Finance and Acquisition: Acquisition Program Management; Budget; Contracting & Procurement Analysis; Finance & Accounting; Purchasing; Requirements Manager/Contracting Officer Representative; and Strategy Engagement & Evaluation
Human Services and Office Management and Infrastructure: Human Services (Behavioral Health; Equal Employment; Faculty; Human Resources; and Training and Development) and Office Management and Infrastructure (Facilities; Information Services; Logistics; and Office Operations)
Information Technology: Cyber Security; IT Data Specialist; IT Engineer; IT Mission Support; and IT Specialists
Intelligence: Analysis, Counterintelligence, Human Intelligence, and Mission Management (Collection Management; Information Sharing; Intelligence Operations Management; Joint Capability Development and Intelligence Support to Acquisition; Joint Intelligence Planning; Policy and Strategy; and Joint Target Intelligence)
Security: Security Specialist; Police & Security Services; Insider Threat; and Criminal Investigator
Science and Technology: Computational Social Science; Research & Development; Technical Collection; Technical Exploitation; and Technical Operations
The majority of summer intern positions will be in the Washington D.C. metropolitan area, though limited opportunities are available at other locations. Due to the large number of applications received in response to internship opportunities, this vacancy announcement will be closed when a limited (depending on career field) number of applications are received, but no later than Sept.23, 2016. Complete applications must include an unofficial transcript and veterans are required to attach their DD 214.
Have questions? Email NEDIAC_TAPStudents_lntems@dodiis.mil
Vote Now to bring NGA to South by SouthwestNGA
August 29, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency has the opportunity to participate in the South by Southwest Interactive Festival scheduled for March 10-18 in Austin, Texas.
South by Southwest (SXSW) is the premiere event in the country for introducing and discussing new ideas and creative technologies. Hosted each year in Austin, Texas, SXSW has included speakers such as President Obama, Biz Stone (co-founder of Twitter and Medium), and Kevin Plank (Under Armor CEO). This year, NGA has submitted two panels to South by Southwest, open to voting until Sept.2.
The two nominated panels are:
Next Gen National Security
The way we protect our nation is changing every day, in every way. One of those changes affects every company: the people behind the scenes. All great organizations want to attract – and keep – the best and brightest. Instead of focusing on larger salaries, companies are beginning to focus on other factors such as flexibility, fulfillment, and job security. The national security community focuses on the mission of keeping our nation safe, and provides employees the opportunity to work with the coolest technology on Earth. In this panel, we share the secrets of how national security organizations are changing to attract digital talent – and what they think matters to early-career employees. Vote for this panel.
Government and Industry: Not So Different After All
Governments and the private sector: turns out they're not so different. Whether you're the USPS or GE, everyone is striving to understand how to deliver products and services, satisfy customers, and leverage emerging technologies. In fact, the national security space continually engages with private companies to share knowledge and find inspiration. Whether working with a media company to understand how to deliver content to customers, or discussing SEO with a tech company, the IC and private companies collaborate on some of the important topics facing us today. Join us to discuss what they've learned – and find out why government and private sector companies partner to solve challenges. Vote for this panel.
The SXSW Panel Picker allows the community to browse, leave comments, and vote for what they think are the best fit for the March event. In order to vote, users must create an account or login using their Facebook credentials. Voting ends Sept. 4, 2015. Visit the SXSW FAQ for more information.
NGA Deploys Team to Louisiana to Assist in Aftermath of Severe FloodingNGA
August 19, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency deployed a disaster support team Aug. 18 to assist the Federal Emergency Management Agency with damage assessments of flooded areas in Louisiana.
Severe flooding has occurred along portions of the Amite, Vermillion, Mermentau and Calcasieu Rivers and flood conditions are likely to persist for several days.
To support recovery efforts, NGA is providing geospatial data and products for search and rescue teams working in the Ascension Parish and other areas affected by the flooding. The deployed team is helping emergency personnel navigate affected areas to provide response and recovery assistance.
"Our deployed team in Louisiana is supporting FEMA with geospatial expertise for ongoing emergency response and recovery efforts," said Todd Noel, chief of disaster analysis and domestic support at NGA.
NGA's visualization products and web services show location and damage-specific information to county emergency officials, local law enforcement and FEMA urban search and rescue teams for ongoing recovery operations.
One of NGA's mission sets is providing accurate and timely geospatial information to first responders in the wake of natural disasters. NGA supports humanitarian and disaster relief efforts by working directly with the lead federal agencies responding to fires, flood, earthquakes, landslides, hurricanes or other natural or manmade disasters.
The National Geospatial-Intelligence Agency is providng data and gridded overviews to the Federal Emergency Management Agency as a part of efforts to assist search and rescue teams in Ascension Parish, Louisiana, and surrounding areas.
DIA Staff Rides Detail Practical Lessons LearnedDIA
August 17, 2016
"What has occurred in this case must never recur in similar cases. Human nature will not change. In any future great national trial, compared with the men of this, we shall have as weak and as strong, as silly and as wise, as bad and as good. Let us therefore study the incidents of this as philosophy, to learn wisdom from, and none of them as wrongs to be revenged." -President Abraham Lincoln
"It is painless and faster to learn from the failures of others than from your own….that is why we study history." -Paul Hemphill in Gettysburg Lessons in the Digital Age.
According to noted intelligence historian Christopher Andrew, the Intelligence Community is suffering from Historical Attention Span Deficit Disorder (HASDD), or a reluctance to look at the past to inform our understanding of the present and assist in forecasting the future. At DIA, analysts have been working to prevent HASDD from setting in. Since 2008, DIA has sponsored dozens of battlefield staff rides for Department of Defense and Intelligence Community personnel examining lessons learned from the past for application today. This year, DIA conducted trips to the Civil War battlefields of Bull Run, Monocacy, Gettysburg, and has trips to Antietam and Second Bull Run remaining. The trips provide individuals an out-of-office environment to consider important factors impacting military operations, such as planning, intelligence, technology, leadership, communications, logistics, unit cohesion, adversary strengths and weaknesses, and external factors like topography and weather. The instruction provides real-world case studies for the development of analytical frameworks for military analysis and encourages the study of military history.
A key concept examined in DIA's staff ride program is unity of effort – concentrating resources to address an objective. Achieving unity requires an understanding of the desired end state and – equally important – a vision on how to achieve the mission. All too often, leaders are unclear on their mission, lack the vision to unite their resources to achieve the mission, or fail to clearly articulate the objective to subordinates.
At the April 16 staff ride to Gettysburg, participants spent time considering whether or not General Robert E. Lee achieved unity of effort in his 1863 invasion of Pennsylvania. Lee was faced with a daunting strategic situation for the Confederacy: Union General Ulysses S. Grant surrounded one Confederate army at Vicksburg, Miss. and central Tennessee faced a threat from another Union army. If the Confederacy were to win the war, Lee believed it would need to do so in the eastern theater under his command. His Army of Northern Virginia, fresh off two victories on Southern soil, could not remain on the defensive – time, resources, and the strategic situation were not advantageous. In developing an offensive strategy, Lee demonstrated his understanding of national strategy and his own mission. Lee's vision involved an invasion of the North, which would take the war out of Virginia, allow his forces to live off the land, potentially lead to international recognition of the Confederacy, and – most importantly – reclaim the strategic initiative for the South. He could judge the environment and enemy dispositions to determine the right time and place to initiate a decisive battle of his choosing. Lee failed, however, in effectively articulating his vision to key subordinates and communicating roles and objectives. As a result, his invasion ultimately failed.
Preceding the Battle of Gettysburg (July 1-3, 1863), the Army of Northern Virginia reorganized from two corps to three as a result of the death of Second Corps commander Lt. Gen. Thomas "Stonewall" Jackson at the Battle of Chancellorsville. Lee promoted two division commanders – Lieutenant Generals A.P. Hill and Richard Ewell – to corps commands to join First Corps commander Lt. Gen. James Longstreet. While Lee did not have the same relationship with Hill and Ewell as he did with Jackson, he seemingly assumed they would understand his vision just as well. Lee was entering what he believed to be the most important campaign of the war with a new command structure, two new commanders with no corps leadership experience and little previous command interaction with Lee, and made no provisions for managing this change. Furthermore, Lee recognized that subordinate commanders were better postured to appreciate the tactical environment and therefore needed discretion to exploit opportunities. This often resulted in Lee giving open-ended, vague orders. This proved fruitful with subordinates who understood Lee, such as Longstreet who had fought in four major battles as a chief subordinate. However, Lee's loose leadership style proved disastrous with his other subordinates during the Gettysburg campaign. Lee provided poorly worded discretionary orders to cavalry chief Maj. Gen. J.E.B. Stuart in late June, which Stuart used to take his forces on a mission away from the main army. With the cavalry away, the Army of Northern Virginia lost virtually all intelligence and counterintelligence capabilities, screening and reconnaissance forces, and forced infantry to conduct missions typically conducted by cavalry during key junctures at Gettysburg. Lee also provided three sets of ambiguous discretionary orders to Ewell, who misinterpreted Lee's intentions and failed to take key high-ground on the first day of fighting.
Finally, Lee's vision was not communicated down the chain of command, resulting in a lack of understanding by subordinate commanders. On two occasions on the first day of Gettysburg, corps and division-level subordinates exceeded Lee's unusually direct orders not to bring on a general engagement with Union forces. This resulted in Lee reacting to Union movements rather initiating a fight at a time and place of his choosing. This resulted in Lee facing Union forces holding the high ground, utilizing superior interior lines, and maintaining a greater force-to-space ratio against his own inferior numbers.
At Gettysburg, Lee failed to achieve unity of effort. The lessons learned remain applicable today: understand the mission, have a vision, effectively communicate the mission and the vision to the command, and ensure that all the appropriate resources are being effectively utilized to achieve the desired end.
While DIA's staff rides place attention on the roles of resources, leadership, technology, environment, and other operational factors in military affairs, lessons derived from the role of intelligence are always a key theme. Intelligence is an enabler in achieving unity of mission. Understanding the mission and communicating it effectively only goes so far – the adversary and environment play a role as well. Knowing the enemy enables a commander to choose when and where to take the initiative, what resources to deploy, and how to manage the conflict. There are few examples in military history where this was more evident than Gettysburg. In his presentation to staff ride participants, DIA analyst Greg Elder stresses the operational impact of an army equipped with exceptional intelligence and another rendered virtually blind. During the Civil War, the Union established the first modern all-source intelligence unit in history – the Bureau of Military Information (BMI) –to address consistent misestimates of enemy strength by more than 100 percent. In April of 1863, the BMI compiled an assessment of Confederate forces that was within 2 percent of actual Confederate forces under Lee. On July 1, as the Battle of Gettysburg raged, a BMI assessment noted an enemy force of 92,000 with 6,000-8,000 cavalry and 270 cannon based on information available, which proved remarkably accurate.
Further, BMI information proved critical in the Union decision to stay and fight at Gettysburg after the second day, articulating enemy strength, dispositions, and the likely avenue of attack. With this information at hand, Union commanders knew the most advantageous location to concentrate their forces for success. Conversely, operating in enemy territory without Stuart's cavalry, Lee was compelled to make decisions devoid of intelligence on enemy strengths and dispositions. Additionally, Lee's options for maneuver were limited by the lack of accurate maps and scouting reports on avenues to exploit. Lee noted in his after action report, "[T]he movements of the army preceding the battle of Gettysburg had been much embarrassed by the absence of cavalry," and that "the advance of the enemy to Gettysburg was unknown." Regarding Lee's choice to stay and fight at Gettysburg, Civil War historian and former National Security Agency analyst Edwin Fishel noted in his seminal work The Secret War for the Union, "Lee was making a military decision utterly divorced from reality." While Union intelligence prepared the battlespace for the third day of the battle, enabling the concentration of superior forces at precisely the right location, Fishel notes, "[P]erhaps the most noteworthy aspect of Lee's battle plan for day three, as he conceived it that Thursday evening, is how barren and uninformed it was."
DIA staff rides also consider other lessons learned applicable to today. At the July 9 Gettysburg staff ride, conducted jointly between Elder and noted Civil War author Mike Priest, several additional vignettes were presented:
Character wins!: Today, the U.S. Army has 23 traits associated with character in leadership: assertiveness, bearing, candor, commitment, competence, confidence, courage, creativity, empathy/compassion, flexibility, integrity, decisiveness, humility, justice, endurance, tact, initiative, coolness, maturity, improvement, self-discipline, sense of humor, and will. At several key junctures in the battle, Union forces neared defeat but – often at the cost of their lives – held firm because of the inherent trust in the character of their commanders. Throughout 1862 the Army of Potomac command structure suffered from politicization of its command and promotion system, but changes in early 1863 paid dividends. By Gettysburg, many brigade and division commanders were demonstrably more effective in leading their men.
Yesterday's tactics make todays defeat: At the end of the first day of battle, Union forces held high ground – Culp's Hill – on their right flank. Believing that the Confederates would assault the flank, Brig. Gen. George Sears Greene, a West Point graduate and an experienced civil engineer, instructed his men to dig trenches and fell trees to bolster the earthworks. Defensive positions of this nature were perceived as detrimental to the offensive spirit of fighting, and Greene's division and corps commanders did not share his opinion; they only grudgingly let Greene proceed with construction of the fortifications. Late on July 2, a large Confederate assault was initiated against the Union left flank requiring units to be stripped from other points along the line, which left Greene's lone brigade of 1,350 men to defend a front covered earlier three brigades. Greene's men continued the construction of defenses and dispersed along the unoccupied line. At dusk, when it appeared that the Union right was safe, roughly 4,700 Confederates attacked. Today, visitors to Gettysburg flock to Little Round Top on the Union left to see where Col. Strong Vincent's brigade, which included Col. Joshua Chamberlain's 20th Maine and faced only slightly great odds, while avoiding the Union right on Culp's Hill. Greene's men fought against successive assaults for four hours, using the fortifications to their advantage, inflicting horrendous casualties on the Confederates. When the fight concluded later that evening, Greene's brigade suffered slightly more than 300 casualties while inflicting more than 2,400 by Greene's estimate. One solider noted, "[H]ad the breastworks not been built, and had there only been the thin line of our unprotected brigade, that line must have been swept us away like leaves before the wind, by the oncoming of so heavy a mass of troops by the enemy." Greene thought outside the box, considered the mission against the resources at his disposal, the technology and capabilities of his adversary, and how best to achieve his mission while limiting casualties to his own forces – and did so against the doctrinal tactics of the past. Following Gettysburg, the use of trenches became standard operating procedures for both Union and Confederate forces. It was not until the introduction of the tank that another generation learned the lesson yesterday's tactics make today's defeat!
Impulsiveness clouds judgment: On several occasions during the battle, Confederate leaders acted impulsively, placing their men and the mission in jeopardy. A notable example was Maj. Gen. Robert Rodes' attack on the first day of battle. Rodes division approached Gettysburg from the north and found itself on the exposed flank of Union forces. Ewell ordered them to attack against the direct orders of Lee, who wished to avoid a general engagement. As Rodes got his 8,100 men into battle formation, Union forces rushed 2,600 men to defend their right flank. Despite the potential weight of forces at his disposal, Rodes' brigades were impulsive in their assaults, failing to coordinate and attacking piecemeal. The first attack, executed in haste, was conducted with less than one brigade and rapidly collapsed. The second assault, carried out by a lone brigade commanded by Brig. Gen. Iverson, moved forward without any knowledge of the location of the enemy or terrain. Expecting to see Union forces to their right, they marched into an ambush from behind a stone wall to their left. Iverson, who failed to advance with his troops, watched as his brigade lost nearly 1,000 men in a matter of minutes. The next assault failed as a 2,300-man brigade was split with three of the five regiments moving to support Iverson, and two attacking the portion of the Union line as ordered. Rodes ultimately recommitted his forces and helped drive the Union from his area of operations, but the piecemeal attacks bought the Union two hours of vital time to prepare stronger defenses on better ground while simultaneously committing the Confederates to a general battle. Impulsiveness by Ewell to exploit an opportunity against Lee's direct orders, Rodes deployment of forces before coordination could occur, and the brigade commanders' haste to engage their forces all impacted the outcome at Gettysburg. Each failed to strike the appropriate balance between initiative and impulsive leadership.
DIA's staff ride program will continue to offer valuable insights from the past in defense of the future. Mark Twain was reported to have said, "History doesn't repeat itself, but it does rhyme." In this spirit, DIA will continue studying these historical battles and learn from them to advance our current missions.
Andrew, Christopher. "Intelligence Analysis Needs to Look Backwards Before Looking Forward." History and Policy. 1 June 2004. Found at: http://historyandpolicy.org/papers/policy-paper-23.html
Elder, Greg. 20-part Lectures on Intelligence in the Civil War. Defense Intelligence Agency.
Fishel, Edwin C. The Secret War for the Union: The Untold Story of Military Intelligence
Hemphill, Paul. Gettysburg Lessons in the Digital Age. One Bond Press, 2013.
NGA Seeks Applications for Centers of Academic ExcellenceNGA
August 16, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency, in partnership with the U.S. Geological Survey, is seeking applications through Feb. 15 from schools and universities interested in become partners in the Centers for Academic Excellence in Geospatial Sciences program.
The NGA/USGS Centers of Academic Excellence in Geospatial Sciences program is an alliance between the two agencies to help build long-term partnerships with America's academic community to support the nation's geospatial science needs and challenges.
NGA and USGS recognize the inherent value of investing in the future geospatial workforce and the CAE Geospatial Sciences program supports that goal.
"The CAE Geospatial Sciences Program is a new way of cultivating relationships and partnerships across America's universities," said Lenora Peters Gant, Ph.D, NGA senior executive for academic outreach and science, technology, engineering and math initiatives.
"This program is one of the best strategic and systemic approaches to shape the geospatial intelligence workforce of the future," said Gant.
The CAE Geospatial Sciences Program provides NGA and USGS the ability to assess universities' geospatial science curricula, research and development, and related capabilities that align with the agencies' mission needs. With these partnerships, the agencies can attract a broader array of geospatial intelligence expertise, research and development, and talent sources for current and emerging critical mission challenges.
For more information about the NGA/USGS Centers of Academic Excellence in Geospatial Sciences program and to apply, visit the All Partners Access Network and download the 2017 NGA/USGS CAE GS application form and associated documents.
NGA Awards IT Enterprise and Cyber Security ContractNGA
August 15, 2016
SPRINGFIELD, Va. —The National Geospatial-Intelligence Agency (NGA) recently awarded an information technology services contract to operate and maintain the NGA enterprise and cyber security environment. The contract was awarded to ManTech Advanced Systems International, Inc. of Fairfax, Va.
The contract includes a one-year $65.6 million base period and four one-year option periods for a total period of performance of 5 years. The total value of the contract, including options, is $322 million, and begins Aug. 23.
DIA Said Thank You to Deputy Director Doug Wise at a Farewell CeremonyDIA
August 12, 2016
Stewart presented Wise with the DIA Director's Award in recognition of his exceptional service. Additionally, colleagues from across the intelligence community and leaders from DIA's directorates for Operations, Mission Services and Analysis presented tokens of appreciation to Wise and shared memories from their time working with the man who many referred to simply as "a legend."
"What he did was quintessential to what you want in a deputy," Stewart said, adding that the deputy and director are like dance partners that have to be perfectly in-step.
After Wise said a few words and extended thanks to the people who have impacted his career, Stewart swore in DIA's next deputy director, Melissa Drisko. Drisko, who has been with DIA since 2004, mostly recently served as the director of Science and Technology and director of the agency's Rank-in-Person implementation initiative.
"There's none more qualified to lead the women and men of this remarkable agency," Wise said of his successor. "She possesses an extraordinary and relevant career – a track record within DIA as an extraordinary practitioner and leader with success in both. She's a consummate collaborator. She's a team builder, and she's highly respected inside and outside of this agency."
New Video Highlights Foreign Risks to Private Sector Supply ChainsODNI
August 11, 2016
Video is latest effort to inform government and industry about supply chain threats
The Office of the Director of National Intelligence's National Counterintelligence and Security Center has publicly released a video highlighting the threats foreign entities pose to the private sector's supply chain and to the public sector organizations that utilize private sector goods and services. The video, which debuted last month at a Supply Chain Risk Management conference that included senior U.S. telecommunications officials, coincides with other NCSC efforts to help government and industry address supply chain risks.
NCSC leads the integration of the U.S. government's counterintelligence and security activities for the common purpose of countering foreign intelligence threats to information and assets critical to our nation's security. NCSC provides counterintelligence outreach to U.S. government and private sector entities, as well as issues public warnings regarding intelligence threats to the U.S.
The video raises awareness of increased risk to supply chains due to the evolving dependence on globally sourced commercial information and technologies for mission critical systems and services. The risks are passed to end users through products and services that may contain defective, counterfeit or otherwise tainted components—such as compromised telecommunications equipment.
"Our adversaries are trying to figure out what U.S. industry—whether telecom or defense—will be doing three years from now," said Bill Evanina, Director of NCSC. That is why NCSC and the ODNI are trying to find creative ways to help U.S. industry protect its supply chain and thereby help protect America."
In addition to the video, NCSC will help federal agencies and industry through several other
• Providing threat briefings to government partners and eventually to industry;
• Developing a SCRM blueprint for executive branch agencies, which can also apply to any organization that acquires goods and services; and
• Developing a SCRM publicly available on-line training course that will introduce government partners and interested industry to SCRM and the elementary efforts they can use to protect their acquisition processes against supply chain subversion.
To see the video, please see the following link: Supply Chain Risk Management
For additional information on supply chain issues and NCSC and ODNI, go to ncsc.gov and odni.gov.
Please also see Bloomberg's article on supply chain issues.
NSA Research Sponsors Special Award for Young Scientists and EngineersNSA
August 9, 2016
For the second consecutive year, the NSA Research Directorate sponsored a special award at the Intel International Science and Engineering Fair (ISEF). The ISEF is the world's largest high school science fair with approximately 1,700 young scientists, 22 categories, 600 awarded finalists, 75 countries represented and $4 million worth of prizes.
Of approximately 100 projects that were cybersecurity relevant, 24 were chosen for interviews with NSA award judges. The Research Directorate-sponsored awards were judged on their demonstrated advancement in the science to secure and safeguard cyberspace. Winners received a $3,000 first prize award and two $1,000 runner-up prizes. The awards are funded by the agency's Science of Security initiative.
In addition to the monetary prizes, NSA awarded the winners with a two-day visit to NSA headquarters. During their visit, the awardees presented their work to NSA researchers, received overviews of the agency's mission and toured various operations centers and the National Cryptologic Museum.
Dr. Adam Tagert, Technical Director of the Science of Security initiative, described NSA's motivation for sponsorship at Intel ISEF, "By creating a special award at ISEF recognizing scientific cybersecurity research, we hoped to create an incentive for students to contribute to this important field and inspire continued pursuit of cyber education. All three winning students did a great job on their research. Their projects advance the cybersecurity field and I hope they continue following these interests and do great things."
Charles Noyes, 17, of Villa Park, Calif., won the special award for his project, "Efficient Blockchain-Driven Multiparty Computation Markets at Scale." His project addressed a long-standing search within the intersecting fields of computer science, cryptography and game theory for faster, more efficient secure multiparty computation (sMPC). He developed a novel scheme that combines blockchains, data structures that serve as the backbone for secure banking applications such as Bitcoin, with homomorphic computations, which allow computations on encrypted data such as search, and with verification schemes, which guarantee authenticity. Regarding his visit to NSA, Noyes remarked, "It has been fantastic. Throughout the entire visit, I was surprised by the things being done at the agency. I thought it was exclusively digital defense, but I didn't realize there was 3-D printing or carpentry."
Karthik Yegnesh, 16, of Eagleville, Pa., received a runner-up award for his project, "Cosheaf Theoretical Constructions in Networks and Persistent Homology." He applied persistent homology, an algebraic method for measuring the topological feature of shapes and functions, to analyze the data flow in financial, social and biological networks. Since August 2015, Yegnesh has been working on his project, which could facilitate smooth transmission of data. After touring the agency and meeting employees, he admitted that he didn't know much about NSA, "I was so impressed by the goals of the organization. And how human it was. Regular people work here with regular des"
Rucha Joshi, 16, of Austin, Texas, also received a runner-up award for her project, "Determining Network Robustness Using Region Based Connectivity." Joshi developed a method to test a network's resilience using region-based connectivity rather than the traditional node and edge connectivity. Typically, in real world scenarios, a node failure is due to a regional issue, such as natural or man-made disasters, and not just a single point. She was inspired by her aunt's 20-hour drive from Houston to Austin before Hurricane Katrina, "I wanted to find alternate paths so something like that doesn't happen again." Joshi has been entering science fairs for years, but only knew about NSA from what she learned in school. "I was excited to learn that I won the award from NSA. It has been a great two days," she said.
Dr. Deborah Frincke, NSA Director of Research, greeted each of the winners and presented them with a Director of Research coin as a small token of appreciation. "You represent the future and you will go far. Thank you for sharing your work with us. It was a pleasure to hear about your research and you are skilled at presenting. I am amazed at how rigorous and well-researched your work was. And hopefully, you can see a little of how we solve complex problems here at the agency."
In addition to ISEF's major awards, organizations such as NSA can sponsor special award prizes in more than 60 categories. Special awards range from educational scholarships, cash awards and summer internships to scientific field trips and grants. NSA's participation is part of an effort to encourage more high school students to pursue cybersecurity education, research and careers.
NSA Staffer Talks Cybersecurity with Teen Math PhenomsNSA
August 4, 2016
Stuffing their brains with an endless series of math problems is not the secret to captivating the attention of most high school math whizzes. Many have tried that approach and failed.
Instead, Mervin Bierman, an information assurance professional at the National Security Agency, has found the secret to success in theatrics, which he pours on thick when he engages with bright students in the Rutgers Young Scholars Program in Discrete Mathematics. This intensive, residential, four-week summer initiative provides mathematically talented high school students with exciting content and encourages them to consider careers in the mathematical sciences.
Bierman, ever a showman, made his third consecutive appearance in July as part of the agency's STEM Education Outreach Program to strengthen science, technology, engineering and mathematics (STEM) instruction – and to raise awareness of STEM career paths. For nearly a decade, NSA has sent speakers to Rutgers for this initiative and offered related support.
Wearing a dark polo bearing the NSA seal, Bierman morphed into various characters and cracked jokes as he blended theatrical stagecraft with cybersecurity principles to educate students about information security in cyberspace. He called it a journey through his "Defense Against the Dark Arts" course. Most of the nearly two dozen students initially seemed hesitant to go along for the ride – even after having spent several hours immersed in number theory and probability. The few "Harry Potter" fans in the room quickly realized these "dark arts" did not involve magic or a flick of the wrist. These were all about computers and cyber hygiene.
"I want you all to look very closely. This is what a degree in computer science looks like," said Bierman, pointing to himself and garnering a few chuckles. "Are you afraid yet? You should be."
Now he had their attention.
Bierman went on to explain basic cyber tools used to defend against bad actors in cyberspace, emphasizing the importance of strong passwords to start. "Once I have your password, I have the key to the rest of your accounts," he said, discussing why cyber criminals work hard to steal them.
Listed on a projector were the most common passwords used last year in the United States, which included "abc123, superman, batman, and justinbieber."
"Oh my gosh! Justin Bieber is my password!" one student exclaimed.
It's better to use "passphrases" instead of passwords, Bierman said, and to include special characters or to create a personal system in which you'd change letters to corresponding numbers. "You are the best defense against bad actors on this planet," he said.
Software and firewall options were also explored during the presentation, which Dr. Joseph Rosenstein, a Rutgers University mathematics professor and director of the program, described as a perfect introduction to students' subsequent course on coding and cryptography.
The Rutgers Young Scholars Program in Discrete Mathematics, now entering its 26th year, allows students who have an affinity for the subject "to meet other kids who are just like them," Dr. Rosenstein said, characterizing it as a "great experience." The professor also pointed out that, for the first time in many years, girls made up half of the participants.
Bierman said such academic outreach is an important part of NSA's contributions to the nation.
The opportunity for agency employees to "educate youth on NSA principles like cyber safety and cryptography" is invaluable, he said.
Read more information about NSA's STEM Education Outreach Program.
The Washington Wong Building: A Legacy to Be RememberedNSA
July 27, 2016
In recognition of Mr. Washington Wong and his legacy to the National Security Agency (NSA), the NSA-Hawaii (NSAH) facility, also referred to as "the Tunnel," was dedicated as the Washington Wong Building on July 13, 2016. NSA Deputy Director, Mr. Richard Ledgett, and NSAH Commander, CAPT Cliff Bean, USN, presided over the ceremony.
Mr. Wong was a career NSA civilian language analyst and a national treasure.
Mr. Wong, who was born in Hawaii to parents of Chinese and Japanese descent, grew up speaking both Chinese and Japanese fluently. During the Korean War, Mr. Wong was drafted and served in the United States Army. Due to his excellent language skills, he was recruited specifically to work for the Army Security Agency's intelligence branch, NSA's predecessor. After the war, Mr. Wong joined NSA and served as a language expert specializing in the collection of information against China.
"We (NSAH senior leadership) found Mr. Wong's story and legacy to be the best fit for the building dedication," said CAPT Bean. "He was a true multiplier and made everyone around him better. He epitomized what it means to be an NSA language analyst and more than that, what it means to mentor the next generation."
Friends and coworkers fondly remember Mr. Wong, who preferred to be called "Wash," as a national treasure. Wash was a man of great ability in language, but was best known for his mentorship of linguists. Wash's training was in such high demand that many recall the sign-up sheet on his desk where coworkers who required help with translations of difficult language passages could ask for his assistance. He made time for every individual on the sign-up sheet. No matter the question, he treated everyone with kindness and respect. One coworker, a former mentee, recalled that Wash "… not only taught me the tradecraft to be an effective voice language analyst, but also how to be a decent human being."
Wash was a giving person. He was always ready to lend a helping hand and to offer calming guidance. He was always full of humor and stories, a gentleman who loved his family, his country and his work. It is appropriate that the NSAH facility, a hub for training, be named after such an inspirational example.
In his remarks, Mr. Ledgett noted that Washington Wong will not be forgotten. "His personal and professional legacy will have a lasting effect on NSA and its mission."
May his legacy indeed live on.
For more information about Washington Wong, please visit the Hall of Honor website to read his full bio.
Happy Accidents, Shared Connections and the Beauty of MathNSA
July 27, 2016
A few years ago, Glenn Lilly, Director of the National Security Agency's (NSA) Mathematics Research Group, wound his way through a cavernous conference center searching for his designated location.
Once he arrived, a soft voice asked, "Do you know about Navajo Math Circles?" He responded that he did not, and that simple question began a great relationship between two groups, NSA and the Navajo Math Circles project, each with a profound love of math.
On Monday, June 6, NSA hosted the owner of that soft voice, Dr. Tatiana Shubin, co-founder/co-director of the Navajo Nation Math Circles Project (NNMC). Dr. Shubin, a professor at San Jose State University, was accompanied by NNMCP co-director Dr. Robert Klein of Ohio University, film producer/director George Csicsery, and six students/film subjects from NNMCP math camps. The occasion was an event featuring a sneak peek of the film Navajo Math Circles, a documentary of the project. Prior to the film screening, NSA briefed the directors and students on the agency's contributions to the nation's security.
Math has a strong connection with Navajo culture, influencing everything from the beauty of textile patterns to how homes are constructed. The Navajo love of beauty and the students' view of the beauty of math are core themes of the film. In Navajo Nation Math Circles, Navajo traditions of visual and tactile learning are used to solve math problems.
NSA stands as one of the chief contributors to NNMCP, established in 2012. Under the project, hundreds of Navajo students and teachers have found themselves at the center of a lively collaboration with mathematicians from around the world. Students stay late after school and assemble over the summer to study mathematics, using a model called math circles. NNMCP has served 2,000 students and 250 teachers throughout its existence. Additionally, the program boasts 40 mathematicians, including NSA employees, who volunteer regularly to work with participants.
Marcus, an NSA employee who visited a NNMCP summer camp, joked, "I have a degree in mathematics and I didn't correctly solve some of the problems the students were given."
As Dr. Shubin stated in the film, "Our hope is that all the kids on the reservation will believe and see that math is cool."
During the panel discussion after the screening, the students addressed the link between mastering math and navigating life. "Math helps you learn to solve problems on your own, which helps with school," said NNMCP student Natanii.
Another student, Briana, noted, "Math is an everyday thing."
"And math is the foundation of anything that you want to do," echoed Charmayne.
For NSA, the reward for cultivating projects such as NNMCP is simple. As Mel, a retired NSA employee and advocate for the project, stated, "We want math to be accessible to everyone."
Through agency support of this project, NSA continues its mission to foster diversity, by building a community of NSA mathematicians and the Navajo Nation. Dr. Klein eloquently summarized, "As NSA well knows, Native Americans helped tremendously during World War II and the future security of this nation could rest with the Navajo Nation. So we leave them behind at our own peril."
Faces of Defense Intelligence: John T. HughesDIA
July 22, 2016
WASHINGTON -- The Faces of Defense Intelligence series is intended to highlight the accomplishments of former military and civilian intelligence personnel who exemplified the Defense Intelligence Agency creed Excellence in Defense of the Nation.
To be forewarned is to be forearmed, and all intelligence analysts are, first and foremost, warning analysts; they are key enablers in assisting decision-makers in identifying and mitigating threats. However, the clandestine nature of intelligence often limits visibility into the role analysts play in the decision-making process. Such was not the case for "Jumping Jack" John Hughes, a DIA analyst who was not only instrumental during the Cuban Missile Crisis, but was called on to provide an intelligence report after the crisis to a national television audience. Later, as it became clear what a seminal event the Cuban Missile Crisis was and how important Hughes' role was in averting a nuclear disaster, Secretary of Defense James Schlesinger awarded him a second Department of Defense Distinguished Civilian Service Award in 1975. This award was followed by others for operational support in Vietnam, estimates of Soviet support to Nicaragua, and high level interaction with seniors across the government regarding Soviet military capabilities.
A cartographer by training and junior officer in the Army, Hughes was transferred to the Pentagon in 1953 to begin work as a photo-intelligence officer; he found his niche and was enthralled by a sense of discovery not uncommon to intelligence analysts. In 1957 he retired his military commission to become a civilian analyst with Army Intelligence, and then moved to the newly established DIA in 1961. Hughes joined the agency as a special assistant to DIA Director Lt. Gen. Joseph Carroll and stayed at DIA until his retirement as the deputy director for intelligence and external affairs in 1984.
During Hughes' first months on the job, tensions between the U.S. and Soviet Union escalated and Soviet military support to Cuba was a critical concern. As a photo-analyst, he saw imagery of Cuba taken from U-2 flights, which included the likely new deployments of SA-2 SAM systems, and worked closely with the National Photographic Interpretation Center (NPIC) to develop collection requirements. A U-2 flight photographed a convoy of medium-range ballistic missiles (MRBMs) Oct. 14, 1962. Within hours, NPIC's deputy director reached out to Hughes, who went directly to Carroll's home with the intelligence - so started the Cuban Missile Crisis. The next morning Carroll and Hughes briefed Secretary of Defense Robert McNamara, who tasked an immediate and unprecedented increase of intelligence collection against Cuba.
Hughes arrived at NPIC early each morning, reviewing the new intelligence and collection requirements, and then briefing McNamara and the Joint Staff with Carroll. In the next few days, NPIC identified the first of 42 Soviet IL-28/BEAGLE bombers being uncrated in Cuba and longer range and newer SS-5 IRBMs being deployed. Hughes briefed the Joint Staff Oct. 22 that two MRBM sites were already operational, and another four would be operational within seven days; on the 27th he reported that five of the six were operational. War appeared imminent as an Executive Committee presented President Kennedy with alternatives. The next day however, the Soviet Union responded positively to a negotiated settlement to withdraw the missiles, and eventually the bombers, from Cuba.
Hughes continued his work with the NPIC to validate that the Soviets were living up to the agreement. On Nov. 2 intelligence revealed the beginning of the missile disassembly efforts, and the bombers were crated for return to the Soviet Union by Nov. 27. However, facing political criticism for being weak and having to defend his administration's position that the missiles were no longer in Cuba, President John Kennedy called on DIA to provide a nationally televised briefing about the state of Soviet offensive capability in Cuba. Hughes was selected as the presenter. At 34 years old, he provided a twenty-eight minute, captivating presentation using a makeshift pointer he crafted from two fishing poles just minutes before going on TV. The presentation did much to allay public fears and won the praise of the president.
Hughes continued his superb analytic support efforts throughout the Vietnam conflict, particularly in enabling DIA's support to combat operations. Notably, he was promoted to the deputy director for intelligence collection and played vital imagery analytic roles in the Son Tay Raid, an effort to free American prisoners of war, and in the Mayaguez raid to free crewmen being held by the Cambodian Khmer Rouge.
For the remainder of his career, Hughes became one of the preeminent Soviet military capabilities analysts, addressing the USSR's expansion in both capability and support abroad. He was awarded the Distinguished Federal Civilian Service Award in 1981 for "[H]is innovative accomplishments in intelligence collection management and brilliant presentations to United States and Allied leaders that have had significant, positive impact on intelligence support to our military forces overseas and to the viability of NATO preparedness."
Hughes was called on to use his renowned briefing skills in 1982 to convey to Congress and the American public the significant role the Soviet Union was playing in building up Nicaragua's military and supporting revolutionary activities throughout Latin America. A year later Hughes became the first member of the intelligence community to provide a top secret, code word briefing on the House floor before Congress, where he assessed the state of Soviet military capability. This briefing proved instrumental in debates on President Ronald Reagan's proposed defense budget. His presentation, which he also gave to numerous policymakers across the government, was supplemented by DIA's unclassified Soviet Military Power series, which he assisted in producing.
Hughes eventually succumbed to Parkinson's disease and diabetes, but not before making one last contribution. In 1992, he co-authored an insider perspective on the Cuban Missile Crisis, "The San Cristobal Trapezoid." Shortly after its publication, Hughes attended an anniversary of the crisis at CIA and received a standing ovation from members of the intelligence community. Today, DIA remembers Hughes and also applauds his contributions to defense intelligence, and his excellence in defense of the nation.
Lisa Monaco, Assistant to the President for Homeland Security and Counterterrorism, Visits ODNI and Tours CTIICODNI
July 20, 2016
Lisa Monaco, assistant to the president for Homeland Security and Counterterrorism, visited the Office of the Director of National Intelligence at their Liberty Crossing complex, McLean, Va., July 19.
During her visit, Monaco met with Director of National Intelligence James Clapper before receiving a briefing and tour of the Cyber Threat Intelligence Integration Center from Tonya Ugoretz, CTIIC's director.
Monaco, who advises the president on all aspects of counterterrorism policy and strategy as well as the coordination of all homeland security-related activities throughout the Executive Branch, was pleased to meet with members of the workforce during her first visit to CTIIC.
"I wanted to make sure I had an opportunity to thank everyone here at CTIIC for all of the hard work they have done," Monaco said. "The center plays an important role in our nation's security, making sure policymakers have an integrated picture of the cyber threats facing our nation."
CTIIC builds understanding of foreign cyber threats to U.S. national interests to inform decision-making by federal cyber centers, departments and agencies, and policymakers.
When Monaco delivered a keynote speech during the "Strengthening our Nation's Cyber Defenses" event in Washington, D.C., last year, she explained why CTIIC was created.
"Currently, no single government entity is responsible for producing coordinated cyber threat assessments, ensuring that information is shared rapidly among existing cyber centers and other elements within the government, and supporting the work of operators and policy makers with timely intelligence about the latest cyber threats and threat actors," Monaco said. "The CTIIC is intended to fill these gaps."
"The CTIIC will not collect intelligence—it will analyze and integrate information already collected under existing authorities," she added at the time.
Director Tonya Ugoretz said, "We appreciated the opportunity to update Ms. Monaco on how CTIIC, with its multiagency workforce, is building relationships with the federal cyber community to provide integrated assessments that set our adversaries' cyber activity in a broader context."
In 2015, President Barack Obama signed a presidential memorandum directing the DNI to establish
CTIIC, which received congressional authorization and funding in the December omnibus bill. The
center's five responsibilities outlined in the presidential memorandum are:
• Provide integrated all-source analysis of intelligence related to foreign cyber threats or related to cyber incidents affecting U.S. national interests.
• Support the National Cybersecurity and Communications Integration Center, the National Cyber Investigative Joint Task Force, U.S. Cyber Command, and other relevant U.S. government entities by providing access to intelligence necessary to carry out their respective missions.
• Oversee the development and implementation of intelligence sharing capabilities (including systems, programs, policies and standards) to enhance shared situational awareness of intelligence related to foreign cyber threats or related to cyber incidents affecting U.S. national interests.
• Ensure that indicators of malicious cyber activity and, as appropriate, related threat reporting contained in intelligence channels are downgraded to the lowest classification possible for distribution to both U.S. government and private sector entities through the mechanism described in section 4 of Executive Order 13636 of February 12, 2013 (Improving Critical Infrastructure Cybersecurity).
• Facilitate and support interagency efforts to develop and implement coordinated plans to counter foreign cyber threats to U.S. national interests using all instruments of national power, including diplomatic, economic, military, intelligence, homeland security, and law enforcement activities.
NGA Assists Response to West Virginia FloodingNGA
July 1, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency is providing geospatial expertise and damage assessments to the Federal Emergency Management Agency for flooded areas in West Virginia.
NGA is providing first responders with geospatial data, highlighting severe flooding areas. As of July 1, NGA identified floodplains in 10 populated areas in the counties of Greenbrier, Fayette, Webster, Kanawha and Nicholas, and supplied FEMA with indications of 570 damaged structures, eight impassable roads and two damaged bridges. This allows response officials to more efficiently navigate affected areas to provide recovery assistance to West Virginia residents.
"NGA enables FEMA, and state and local emergency responders to efficiently respond and assist American citizens during the readiness, response and recovery phases of natural disasters," said Brian Cameron, NGA disaster analysis and domestic support branch team lead and FEMA liaison. "The damage assessments that NGA provides help first responders determine valuable personnel and resources for specific affected areas in a timely, responsive manner."
Through FEMA, NGA is providing visualization products and Web services that provide location and damage-specific information to county emergency officials, local law enforcement, urban search and rescue teams and the Rhode Island National Guard.
"We're coordinating daily with FEMA and regional emergency officials to adjust commercial satellite collection over affected areas," said Cameron.
One of NGA's core mission sets is providing accurate and timely geospatial intelligence to first responders in the wake of natural disasters. NGA supports humanitarian and disaster relief efforts by working directly with the lead federal agencies responding to fires, floods, earthquakes, landslides, hurricanes or other natural or manmade disasters.
Faces of Defense Intelligence: Lt. Gen. Alva R. FitchDIA
June 13, 2016
Editor's note: The Faces of Defense Intelligence series is intended to highlight the accomplishments of former military and civilian intelligence personnel who exemplified the Defense Intelligence Agency creed "Excellence in Defense of the Nation."
DIA would like to thank the Military Intelligence Corps Hall of Fame at the U.S. Army Intelligence Center of Excellence, Fort Huachuca, for providing research materials on Lt. Gen. Alva Fitch that made this article feasible. For further information on the Military Intelligence Corps Hall of Fame please visit its website.
During a lifetime demonstrating the hallmarks of a servant leader, Lt. Gen. Alva Fitch became the first Eagle Scout in the state of Nebraska, won the Distinguished Service Cross, Silver Star, Bronze Star, Legion of Merit, Purple Heart, Grand Officier de L'Ordre Grand-Ducal de la Couronne de Chene of Luxembourg, Orden de Vasco Nunez de Balboa of Panama, and was a distinguished member and selectee to the first Military Intelligence Corps Hall of Fame class.
A 1930 graduate of the United States Military Academy, Fitch attended and taught at the Command and Staff General College, and completed instruction at both the Army War College and Strategic Intelligence School. He survived capture by the Japanese in the Philippines and the rigors of the Bataan Death March, the sinking of two Japanese prisoner-of-war ships while a passenger, and was one of 350 survivors of 1,619 men at his prisoner-of-war camp; following World War II, he spent nearly two years on medical leave recovering from issues arising from his time as a prisoner of war. A commander of Elvis Presley and Colin Powell, he also served as an aide-de-camp to Maj. Gen. Leslie McNair and regularly worked alongside numerous historical figures such as Gen. Curtis LeMay, Secretary of Defense Robert McNamara and President Eisenhower. He also participated, as a soldier and senior leader, in some of the most trying and momentous periods in U.S. history.
A 1930 graduate of the United States Military Academy, Fitch attended and taught at the Command and Staff General College, and completed instruction at both the Army War College and Strategic Intelligence School. He survived capture by the Japanese in the Philippines and the rigors of the Bataan Death March, the sinking of two Japanese prisoner-of-war ships while a passenger, and was one of 350 survivors of 1,619 men at his prisoner-of-war camp; following World War II, he spent nearly two years on medical leave recovering from issues arising from his time as a prisoner of war. A commander of Elvis Presley and Colin Powell, he also served as an aide-de-camp to Maj. Gen. Leslie McNair and regularly worked alongside numerous historical figures such as Gen. Curtis LeMay, Secretary of Defense Robert McNamara and President Eisenhower. He also participated, as a soldier and senior leader, in some of the most trying and momentous periods in U.S. history.
At his memorial service in 1989, it was noted that, "He played the hand he had been dealt with style. There was never any doubt that his job and the men came first." Lt. Gen. Alva Fitch embodied excellence in defense of the nation.
Fitch began his intelligence career after attending the Strategic Intelligence School before serving as the military attaché and ambassador to El Salvador in 1948. After a fellow attaché was discharged from his position in Guatemala, Fitch took over most military duties for Central America. Although a short rotation, he represented the U.S. through revolutions and attempted coups in several countries. Following his attaché service, he worked as the chief of the Latin American Section of the Department of the Army Intelligence (G2) prior to the Korean War. Upon the outbreak of the war, Fitch deployed to Korea as the executive officer of the IX Corps artillery and took part in the Battles of White Horse Mountain, Triangle Hill and 1953 Chinese offensive.
After tours in Korea and Europe, Fitch established his mark on intelligence when filling the positions of deputy and assistant chief of staff, intelligence (ACSI), for the Army from 1959 through January 1964. During this time, Fitch managed Army intelligence requirements and collection activities through a critical period of the Cold War, which included the Bay of Pigs Invasion, Cuban Missile Crisis, Checkpoint Charlie flare-up, construction of the Berlin Wall and the escalating conflict in Vietnam. Fitch emphasized the need for additional aerial collection, increasing the Army's airborne collection assets, realigned human intelligence resources to address the loss of refugee-related intelligence collected upon construction of the Berlin Wall, and merged intelligence and counterintelligence field operations to exploit collection opportunities.
Fitch had long complained the Army had no career intelligence field and was staffed predominantly by reservists or individuals on rotation from other fields, which meant the Army consistently lost its most experienced and capable officers just when they were most able to contribute. As the ACSI in 1961, he finally had the seniority to establish the Intelligence and Security Branch under General Order 38, which, for the first time in U.S. history, established intelligence as a military career field. Fitch's effort led to the creation of recruitment standards and professionalization of intelligence, yielding better collection, analysis and warfighter support.
"[I]ntelligence went from being the Army's orphaned stepchild to becoming a branch of considerable importance," Fitch said during a 1984 interview. "And, it is a branch that commands a good quality of officer. When the Intelligence Branch was new, I was invited up to West Point to explain it to the first or senior class. The first class is the one that would graduate that year. And, I did a good job. In fact, I did too good of a job; they would never let me come back. But, that year the intelligence vacancies were the first ones filled by the first classmen. The first man in the class gets his choice of branch and then so on, down the line, with the seniors filling vacancies as they go. This was a blow to the Engineer Corps, which in the past had always been filled first. We've got good men in the Intelligence Branch now."
Fitch transformed Army intelligence and, despite some opposition, made his initial mark on the creation of DIA. When holding the deputy ACSI position, the vice chief of staff of the Army tasked Fitch to write a paper for the Joint Chiefs of Staff to establish an agency intended to consolidate many of the roles spread across the service, to provide a unified Department of Defense (DoD) position and contact, and increase information sharing.
"The paper got to the Joint Staff and I was called up to defend it, and I defended it," Fitch said. "Curtis LeMay was vice chief of air staff at that time; he may have been the chief, I have forgotten now which he was. Anyhow, he wholeheartedly bought my story. He said, 'That's great. Why are we troubled with this?' His staff got a hold of him afterward and made him eat his words. They took my paper, but they modified it to give collection and evaluation to DIA."
At the completion of his time as the ACSI, Fitch was slated to move to CIA as the chief military liaison, but McNamara thought such a respected officer should stay in the DoD, so Fitch was assigned to be the second DIA deputy director beginning in January 1964. During his time at DIA, China tested its first three atomic weapons, the U.S. invaded the Dominican Republic; India and Pakistan fought a major conflict, and the U.S. commitment in Vietnam multiplied following the Gulf of Tonkin incident. In some cases, such as the threat in Vietnam, Fitch and his representation of DIA analysis in this period was instrumental in decision-making at the national level.
"By the spring of 1964, it had reached the point that the only way you could go from one city to another was by air," Fitch said. "John McCone was director of the CIA at the time, and I was the deputy director of DIA and the acting director, since the director was off in Asia someplace. We looked at the Vietnam situation in some detail. We decided that the situation was a lot worse than was generally recognized … We formally estimated that unless something was done, it was only a matter of weeks until our position would become untenable. Well, this hit the Joint Chiefs of Staff just like turning a fire hose on them. They called me in and worked me over. 'Look at this body count. Look at all the weapons we've been capturing,' I said. 'And look how you go from one place to another. How much of the land do you control? How much of a perimeter around these cities have you got? How much food do you get into the cities without paying a tax to the Viet Cong?' They kept me up there in the "tank" for two days, grilling me on this estimate before they finally accepted it. I think that led to a great expansion of our forces in Vietnam. Maybe it would have been better if we just had gotten the hell out at the time, just write it off. But, there's no way you could do that as far as I could see."
As the deputy director, Fitch also assisted in the development of DIA, often hindered by those who objected to its formation. With fewer than 3,000 employees, the agency was inundated with expanding intelligence requirements and missions. In April 1964, DIA assumed joint management with the National Security Agency for the DoD Special Missile and Astronautics Center (later known as DEFSMAC) to collect and disseminate intelligence on space and missile activities. Then, in March 1965, DIA took over responsibility for the Defense Attaché System, consolidating the activities from the military services and designed to provide an efficient system for collection of information and improved sharing. DIA also, to address an analytic shortfall, established the Technical Intelligence Directorate, and formed a joint DIA-CIA working group to address the threat of Soviet military forces. Fitch proved instrumental in transitioning DIA from a fledgling intelligence organization to a national-level agency committed to Excellence in Defense of the Nation.
ODNI Releases First Public Report on Intelligence Community Workforce Demographics, Seeking Diverse Talent PoolODNI
June 10, 2016
The Office of the Director of National Intelligence today releases its first public report on Intelligence Community workforce demographics, the latest in a series of steps shedding light on the IC's struggle to recruit talented officers who mirror the diverse country they serve.
The report, the Annual Demographic Report: Hiring and Retention of Minorities, Women, and Persons with Disabilities in the United States Intelligence Community Fiscal Year 2015, provides an in-depth examination of IC diversity as of Sept. 30, 2015. The report is required by Congress and has been provided to oversight bodies annually since 2005 but never publicly released.
While the percentage of minorities in the IC increased from nearly 21% in FY 2011 to approximately 25% in FY 2015, the minority makeup of the IC workforce falls short in comparison to the rest of the federal workforce, which is 35%. In addition, only 12% of the IC workforce at the senior pay levels are minorities.
"While we have made progress, the data indicates greater work needs to be done to create a more diverse workforce," said Rita Sampson, Chief of the ODNI's Equal Employment Opportunity & Diversity office, which coordinates inclusion efforts across the IC.
Releasing these figures to the public is an important step but by itself will not improve minority representation in the IC. Despite significant efforts, the IC has not substantially increased the number of minority employees over time. Over the next few weeks, DNI Clapper will be briefed on the recommendations from a recent EEOD Leadership Summit where he challenged participants to bring him actionable ideas within 90 days to overcome diversity obstacles, charging them to "think big."
"It is through leveraging diverse perspectives that we draw strength, increase engagement, unleash creativity and solve difficult challenges inherent to the IC's mission," DNI Clapper said.
NGA Announces New Director of OperationsNGA
June 9, 2016
SPRINGFIELD, Va. — U.S. Air Force Maj. Gen. Linda R. Urrutia-Varhall has been selected to serve as director of operations at the National Geospatial-Intelligence Agency, responsible for NGA's worldwide operational support and the execution of the agency's mission across the Intelligence Community and Department of Defense.
Urrutia-Varhall will transition to NGA from her position as the assistant deputy chief of staff, intelligence, surveillance and reconnaissance at the Pentagon.
"I'm eager to add UV [Urrutia-Varhall] to NGA's leadership team," said NGA Director Robert Cardillo in a message to the workforce. "I have worked with UV before and know she brings remarkable skill and experience to this important position. She knows the Intelligence Community and intelligence, surveillance and reconnaissance operations from the flight line to the Pentagon."
Earlier in her career, she served at key intelligence positions to include the director of intelligence at U.S. Southern Command, the senior executive officer to Director of National Intelligence James Clapper, and earlier, as Director Clapper's senior military assistant when he served as the undersecretary of defense, intelligence. She also served in Air Force command and staff positions in Korea and Europe.
Urrutia-Varhall graduated from the U.S. Air Force Academy with a Bachelor of Science degree in civil engineering and was a distinguished graduate from the Defense Intelligence College. She also spent a year as a defense fellow at Georgetown University.
DNI Clapper, FBI Director Comey and DIA Director Stewart To Salute #LGBT Spies at #2016ICPride SummitODNI
June 8, 2016
Director of National Intelligence James Clapper, FBI Director James Comey and DIA Director Vincent Stewart today will address the Fifth Annual Intelligence Community Pride Summit, entitled "Count on Your Community."
The trio -- who rarely together address one assembly outside the houses of Congress -- will applaud LGBTA -- A for Allies -- officers for sharing their authentic selves at work each day, empowering the mission of each of the 17 elements of the Intelligence Community.
DNI Clapper -- a self-proclaimed "intelligence geezer" whose own professional experience parallels Americans' changing attitudes toward the LGBTA community -- is expected to reflect on the evolution toward equality in the military and the Intelligence Community.
"When I spoke at this summit two years ago, I mentioned that I was serving in the Air Force when 'Don't Ask, Don't Tell' was enacted ... I am thankful that -- as a nation -- we have put that policy behind us... I won't dwell on the issue of Transgender rights ... I know our nation is currently engaged in a complex conversation ... with strong feelings on both sides. But here in the IC, we have the chance to lead by example ... So I'll say without equivocation... in IC facilities... you can use whatever restroom you feel comfortable and safe in."
Marine Corps Lieutenant General Vincent Stewart -- who leads the Defense Intelligence Agency, host to this year's gathering -- yesterday said, "This summit isn't about a complicated, abstract idea. It's about treating others as we would like to be treated: with dignity, respect and kindness."
After the three keynote speakers, roughly 1,000 summit participants -- in-person and via video teleconference from posts around the world -- will take part in 'breakout sessions" on five topics: "Seniors [senior officers] Helping Drive Change," "LGBT Ally Training," "Extended Enterprise Management: Getting Inclusive," "Boots to Rainbow Suits: Successfully Transitioning from Military to Civilian Life" and "Building Trans Inclusivity."
NSA Officer and IC Pride member Chris reflected on the significance of the summit, "Before joining the IC, I worked in the private sector and was proudly out. More than a decade ago, when I first joined the IC, the culture was still very conservative. I made a personal decision -- driven mostly by fear -- to go back into the closet. Since then, there has been incredible and tremendous positive change for LGBT employees in the IC -- so much so, in fact, that it inspired me to 'come out' again a few years ago and become a change agent myself, continuing the work of those who pioneered such transformation before me."
Chris' decision to lead from within reflects the evolution of the environment within the IC. FBI Director Comey said yesterday in advance of the summit, "Diversity enriches not just the FBI, not just the Intelligence Community, but our country as a whole. We must foster an environment where all of our employees are respected, are encouraged to be who they are, and are afforded every opportunity to thrive."
To learn more about America's LGBT Spies, whose authentic leadership helps them thrive as public servants, see coverage of the IC's panel at South by Southwest, "America's LGBT Spies: Secret Agents of Change."
NGA Joins Challenge.gov, Offers $10k Prize for Technical Support to 'Living Stories'NGA
June 6, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency today listed its first submission to Challenge.gov, a technical hub for federal incentive prize and challenge competitions.
Challenge.gov's listing includes technical, scientific, ideation and creative competitions to aid the U.S. government in achieving innovative solutions for mission-centric problems using the best ideas and talent from the public.
NGA's Living Stories challenge seeks an easy-to-use time slider or other simple mechanism to track changes to a story in a dynamic, fast and aesthetic way as it is being developed using WordPress, a popular open source Web-based publishing platform.
The winning submission will be awarded a $10,000 prize. The challenge is organized by the agency's GEOINT Pathfinder initiative, which focuses on developing open source solutions to national security issues.
With this challenge, the GEOINT Pathfinder team is looking to strike the balance between "ephemeral and evergreen content," by building a simple, customer-facing, version-control tracker, said NGA's public software development lead Chris Rasmussen.
"The idea is to reduce the number of headlines and products that we're pushing out to our customers by building a very simple, visually pleasing way to track changes in a story," said Rasmussen. "That sets the standard that a story will always be up-to-date."
The submission period runs June 6 to July 15, and the winner will be announced Aug. 1. Submissions will be evaluated on criteria including user experience, quality and required features.
Beyond tangible, functional code, Rasmussen hopes the agency's involvement with Challenge.gov will help put a focus on short-term, practical goals.
"It focuses things on more immediate time horizons," said Rasmussen. "And the delivery back to us is functional code. So we'll have our answer and we'll see the talent coming back in a very practical way. It focuses things much more realistically."
Since 2010, Challenge.gov has seen more than a quarter of a million participants contributing to more than 640 competitions that awarded over $220 million in prizes.
NGA joins other Intelligence Community components, including the National Security Agency and the Office of the Director of National Intelligence's Intelligence Advanced Research Projects Activity on Challenge.gov.
NSA Releases Thousands of WWII-era Documents to National ArchivesNSA
May 31, 2016
More than 29,000 pages of declassified material related to the World War II-era Target Intelligence Committee (TICOM) are now publicly available following a recent transfer from the National Security Agency to the National Archives and Records Administration, NSA announced May 23.
It was NSA's final transfer of its material related to TICOM, a joint project that began in 1944 between the United States and the United Kingdom. The now-famous "Monuments Men" searched for precious works of art that had been looted by the Nazis with the goal of returning items to their rightful owners. In contrast, TICOM teams followed Allied armies into occupied areas of Western Europe to seize material and equipment Axis powers used for code-breaking and code-making, including the German Enigma cipher. The teams also tried to determine how successful the Germans had been in breaking Allied codes.
Through these efforts, the United States and the United Kingdom aimed to read more of the encrypted communications of retreating Nazi armies and better protect their own information from German eavesdropping.
The declassified material is housed at the Archives II facility in College Park, MD. More information about how to locate records held by the National Archives is available at https://catalog.archives.gov/id/5957379.
DNI Clapper Addresses First IC Leadership Summit on Building an African-American and Hispanic Recruitment PipelineODNI
May 26, 2016
Top Spy Announces IC Will Release Its Workforce Demographics and Challenges Participants to Bring Actionable Ideas to Overcome Diversity Obstacles Within 90 Days, Advocating that Attendees "Think Big"
The Office of the Director of National Intelligence hosted an intelligence community Leadership Summit yesterday that brought together Equal Employment Opportunity & Diversity professionals and members of the IC workforce to discuss how to build an African-American and Hispanic recruitment pipeline within the IC. The summit, sponsored by ODNI's EEOD office, comes in advance of the release of ODNI's Annual Demographic Report, which starting this year, will be unclassified. The report has been delivered to both IC oversight committees on Capitol Hill and within the next two weeks will be released online to the public for the first time.
While the percentage of minorities hired into the IC increased from nearly 21% in FY 2011 to almost 25% in FY 2015, DNI Clapper was unambiguous in his direction that much more work needs to be done. The IC workforce is only about 25% minority compared to the rest of the federal workforce at 35%. In addition, only 12% of the IC workforce at the senior pay level are minorities. "Going public with our demographics is a significant step, but by itself it's not going to improve minority representation in the Intelligence Community," DNI Clapper said. "I've got 240 days left in my tenure. I expect the outcome of today's summit will include bringing something to me that I can act on, something I can take to the Intelligence Community component directors, something we can implement within 90 days."
"If you need permission to think big or to think differently, I'm giving it to you right now," Clapper said. Acting on the DNI's call for developing a plan that can be implemented within 90 days, the summit's workshops focused on three key areas: Outreach and Recruitment, Employee Resource Groups and Career Development and Advancement.
Other senior IC leaders at the summit echoed the DNI and recognized the importance of diversity to the success of the IC and the need for greater representation from minority populations. "Currently, the IC is not a reflection of the United States, therefore, that pipeline of diversity can't be built in the last mile, it has to be built at the ground level," said Bill Evanina, director of the ODNI's National Counterintelligence and Security Center.
Principal Deputy Director of National Intelligence Wins 2016 Leadership Award from Women in TechnologyODNI
May 25, 2016
Principal Deputy Director of National Intelligence Stephanie O'Sullivan was honored by Women in Technology this past Thursday with the 2016 Women in Technology Leadership Award in the Government Service category. WIT's Annual Leadership Awards celebrate innovative women in the technology industry who are advancing diversity and inclusion within their sphere of influence.
Upon her selection, Ms. O'Sullivan said, "It is a true honor to be considered among this distinguished group of professionals and leaders. Diversity in all forms is absolutely paramount for the technology industry and for our work in the intelligence community." This year's awards were the 17th annual recognition of the pioneering work done by women across corporate, government and entrepreneurial sectors.
Women in Technology is a non-profit organization that advocates for the advancement of women in technology. In addition, WIT provides "leadership development, networking, mentoring and technology education."
To learn more about America's Number Two Spy, see Trajectory Magazine's recent profile on PDDNI Stephanie O'Sullivan, who answered a vague job ad for an ocean engineer and "never looked back" upon learning she was actually joining the intelligence community.
NSA Celebrates Armed Forces Week with a Look at a U.S. Coast Guard Cryptologic AchievementNSA
May 20, 2016
During World War II, USCG Unit 387 (later OP-20-G) was augmented as part of the Navy, which happens during wartime, and served as a major cryptologic contributor to the nation. The unit worked to break Japanese merchant vessel codes to assist intelligence activities.
NSA Celebrates Armed Forces Week with a Look at a U.S. Air Force Cryptologic AchievementNSA
May 19, 2016
Since 1948, the Air Force has conducted cryptologic missions. From Airborne Radio Direction Finding in the Vietnam War to a continuous 25-year plus airborne Intelligence Surveillance and Reconnaissance (ISR) presence in Southwest Asia, the Air Force has had a cryptologic presence in every major conflict in its history. As a permanent fixture in the armed forces intelligence organization, our motto "Freedom Through Vigilance," epitomizes why ISR is a leading USAF core mission.
NSA Celebrates Armed Forces Week with a Look at a U.S. Navy Cryptologic AchievementNSA
May 18, 2016
During WWII, nearly 10,000 naval cryptologists deployed worldwide supporting every major campaign. The Battle of Midway in particular was pivotal:
Due to the Navy's cryptologic endeavors, Admiral Nimitz knew that the Japanese attack on Midway would commence on 3 June. Armed with this crucial information, he was able to get his outgunned but determined force in position in time. On 4 June, the battled was finally joined. General George Marshall, the U.S. Army Chief of Staff, in his comments on the victory, perhaps said it best: "… as a result of Cryptanalysis we were able to concentrate our limited forces to meet their naval advance on Midway when we otherwise would have been 3,000 miles out of place."
NSA GenCyber Camps Triple In OfferingsNSA
May 18, 2016
After the success of 2015's 43 GenCyber summer camps, opportunities for 2016 have greatly expanded, with plans in the works for 133 summer camps across the nation, more than triple the number in 2015.
The camps will be held in 35 states, Washington D.C. and Puerto Rico — up from 18 states last year. Also new this year will be camps hosted by non-profit organizations as well as K-12 school systems, rather than solely by universities as in previous years.
GenCyber was developed to help grow and develop the cybersecurity workforce of the future. The program launched in 2014 and is funded by a partnership between the National Security Agency and the National Science Foundation. The camps, some of which are overnight, are free to participants because of funding contributions from the federal partnership. While most camps focus on educating the cybersecurity workforce of the future, some are devoted to providing cybersecurity training to today's educators.
Cyber threats are continuously growing, and improving defenses to better protect the nation is a necessity in this digital area. The nation is experiencing a significant demand for qualified cybersecurity professionals. This need makes educating the next generation of cybersecurity experts a priority for leaders in both the public and private sectors.
"Cyber threats are real, constant, and always changing," said Tina Ladabouche, NSA's GenCyber Program Manager. "We are committed to helping the nation enhance cybersecurity education —providing opportunities for both teachers and students to learn more about an issue that affects all of us and will continue to do so in the future."
Developing U.S. cybersecurity professionals is important, as well, to the academic community, which continues to play a crucial role in the success of GenCyber. Many of the universities that host GenCyber camps are Centers of Academic Excellence — a separate initiative that NSA and the U.S. Department of Homeland Security oversee for more than 190 U.S. institutions of higher learning.
The GenCyber program is dedicated to providing no-cost, invaluable, hands-on education to the next generation of cybersecurity experts and the K-12 teachers leading them. The goal is to expand the program to 200 camps by 2020. With the program over halfway there, that goal will likely be reached much sooner.
For more information about GenCyber, including links to camp websites, visit the official website at www.gen-cyber.info.
NSA Celebrates Armed Forces Week with a Look at a U.S. Marine Corps Cryptologic AchievementNSA
May 17, 2016
In May 1942, the Marines took over the work of code talkers, first recruiting 29 Native Americans. Ultimately, the Marine Corps settled on the Navajo language as they felt it would be more secure. In campaigns against the enemy on the many fronts, the Native American Code Talkers never made a mistake in transmission, nor were their codes ever broken.
NSA Celebrates Armed Forces Week with a Look at a U.S. Army Cryptologic AchievementNSA
May 16, 2016
In the years immediately preceding America's entry into World War I, the Army took its first steps into the world of cryptology.
A young Army officer, Captain Parker Hitt, became interested in the subject while attending school at Fort Leavenworth, Kansas. After identifying issues within the Signal Corps cipher desk, he turned his attention to code solution. He later published the Manual for Solution of Military Ciphers, the first book devoted to cryptology ever published in the U.S.
DNI Clapper Signs New Policy on Social Media for Federal Background Investigations for Security ClearancesODNI
May 13, 2016
Director of National Intelligence James Clapper yesterday signed Security Executive Agent Directive Five, codifying federal background investigative authority to incorporate publicly available social-media information in the security clearance process.
The new policy comes into effect after a long, deliberative process recognizing the ubiquity of social media and the importance of maintaining privacy and civil liberties. The policy does not require security investigations consider social media information. Instead, it permits the collection of publicly available social-media information if an agency head determines it is an appropriate investigative tool.
"Social media has become an integral—and very public—part of the fabric of most American's daily lives," said Bill Evanina, director of ODNI's National Counterintelligence and Security Center. "We cannot afford to ignore this important open source in our effort to safeguard our secrets—and our nation's security."
This policy places important restrictions that limit the federal government's reach into the private lives of clearance applicants and holders. Absent a national security concern, or criminal reporting requirement, information pertaining to individuals other than the individual being investigated —even information collected inadvertently — will not be pursued. In addition, investigators may not request —or require — individuals to provide social media passwords, log into a private account or take any action that would disclose non-publicly available social media information.
Security clearance holders undergo intense scrutiny before obtaining — and while maintaining — a clearance. This includes reporting interactions with foreign nationals, obtaining permission to travel abroad, and undergoing extensive background investigations and re-investigations.
This is as it should be, Evanina said. These requirements, along with considering an applicant's public social media presence, "are a small price to pay to protect our nation's secrets and ensure the trust the American people have placed in us."
Celebrate Armed Forces Day and National Police Week at the National Cryptologic MuseumNSA
May 12, 2016
On Saturday, May 21, we celebrate Armed Forces Day and National Police Week. The National Cryptologic Museum invites everyone to come honor the men and women serving in our nation's Armed Forces and law enforcement from 10 a.m. to 4 p.m.
This year's theme is "Honor Those Who Answer the Call to Serve," and the planned festivities promise to be a day of fun and education for the entire family. The celebration will include indoor and outdoor activities for both kids and grown-ups. U.S. service members will serve grilled hot dogs and drinks, and ice cream will be available for a sweet treat. In celebration of National Police Week, the NSA Police will be on hand to demonstrate equipment and you will have a chance to meet some of the furriest members of the NSA Police.
During your visit you can:
- Hear the smooth sounds of the U.S. Army Field Band Ambassadors Jazztet from 11 a.m. to noon and from 1 to 2 p.m.
- Talk to ham radio users around the country, with the help of local ham radio operators
- Witness NSA Police demonstrations of the K-9 unit, the SWAT armored vehicle, all-terrain vehicles and the hazmat suit
- Brush up on your knot tying skills with the U.S. Naval Sea Cadets
- Enjoy special museum tours throughout the day
- Take advantage of photo opportunities of life-size photo cutouts of military uniforms from different eras throughout U.S. history
- Get your face painted and bounce in an inflatable castle
- Earn free ice cream (while supplies last) from games and contests (children only, please)
- Listen to the National Cryptologic Museum's curator's presentation on key historical events
- Hear our veterans' perspectives about their service and how they used their cryptologic skills to protect the nation
Updates about the Armed Forces Day and National Police Week celebration are available at www.Facebook.com/NationalCryptologicMuseum.
The National Cryptologic Museum is located on Colony Seven Road off Rt. 32, exit 10A, adjacent to Fort George G. Meade, Md. For more information, visit www.nsa.gov or call (301) 688-5849.
GIS Fair Supports Area Students' Blossoming Interest in STEMNGA
May 9, 2016
More than 100 students from Washington, D.C.-area high schools presented their geospatial information systems projects during the National Geospatial-Intelligence Agency's GIS Fair, April 6, at the agency's Springfield, Va., headquarters.
The NGA GIS Fair is part of the agency's Partners in Education program and provides an opportunity for students at Robert E. Lee High School and South Lakes High School to gain mentorship and feedback from GIS professionals.
During the NGA GIS Fair, the young geospatial innovators' final projects were "judged" by NGA employees, who provided feedback on purpose, design and methodology, execution, creativity and presentation.
The students use their own tools and the Esri ArcGIS online tool to find, collect and digitize data, said Charles Sabatier, science specialist from Fairfax County public schools. The fair is a valuable way for students to present their projects in front of a professional audience and get feedback.
Student projects covered a variety of GIS topics, including population change, correlation in crime rates and state political preferences, mapping cholera, and discovering flood risks in Virginia's James River watershed.
"It was energizing to see how these high school students are using data-rich spatial analysis to explore phenomena like obesity and public safety," said Jon Breece, NGA geospatial intelligence analyst and GIS fair judge. "Projects that I reviewed relied on finding, structuring and exploring diverse datasets to reach evidenced-based conclusions."
"I loved being a part of this [NGA GIS Fair] because of the enthusiasm and talent of the students," said Eliza Bradley, NGA spectral imagery scientist.
Bradley was inspired by the range of topics, and the opportunity to provide constructive feedback and encouragement, she said.
"It was a great chance to hear directly from students about what NGA could do to encourage them to work here and to see NGA's commitment to our community and future workforce," said Bradley. "With GEOINT Pathfinder 2 and other programs, it makes me feel that we are making progress toward addressing the needs and interests of this next generation. We need to create an environment that unlocks this potential."
The NGA GIS Fair is essential to NGA's relationship with the community and the future of science, technology, engineering and mathematics, or STEM, education, said Brittany Beverly, NGA PIE program lead.
"STEM education is the key to our tomorrow," said Beverly, whose favorite part of the annual fair is seeing NGA volunteers display their "world class talent" while planting seeds of interest into the broad world of GEOINT.
Beverly encourages all NGA employees to participate in at least one PIE event a year.
"It's such a rewarding experience to influence a student, classroom or to show your child how cool you are to their classmates," said Beverly.
Beverly also enjoyed seeing the work the students put into their projects and how, when they first arrive, they're timid and nervous, and by the end of the day, they've become confident and excited.
"The passion students find in participating in these activities often lasts a lifetime and results in a more enthusiastic and successful workforce," said Michelle Sandersfeld, NGA spectral scientist and GIS fair judge.
"Get a technical degree – do anything you want," said NGA Deputy Director Sue Gordon, while urging the students to not limit themselves. "You are leading us to our future," said Gordon.
DIA Awards Enterprise Management Services ContractDIA
May 5, 2016
The Defense Intelligence Agency today awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract to Booz Allen Hamilton Inc., McLean, Va. The contract has a maximum ceiling value of $400 million.
The contract supports enterprise management services for the Defense Intelligence Agency chief information officer and other Intelligence Community/Department of Defense elements and provides help desk support for community-wide Intelligence Community Information Technology Enterprise Desktop Environment implementation.
Work will be performed in the National Capital Region and additional locations worldwide. This contract was solicited on the basis of a full and open competition, and five proposals were received. Funding will be obligated on fixed-price and cost-type task orders. The five-year ordering period is expected to expire on May 3, 2021. The Virginia Contracting Activity, Washington, D.C., is the contracting activity.
What is the Most Rewarding or the Best Aspect about Working in Government Service?NSA
May 5, 2016
This year for Public Service Recognition Week, we put that question to a few employees at the National Security Agency.
"Many would probably say the best thing about working here is the mission, and that truly is great–but I would say the best thing about working here is the people. We have some of the most talented, resourceful employees who can move mission forward even in the face of adversity."--Deanna
"The best thing about working here is constant exposure to new things, ideas, technology and people."--Raven
"The most rewarding aspect of working for the government and NSA over my two-decade career has been the fulfilling and gratifying feeling of knowing how very impactful the work of NSA employees is toward the security of our nation."--Beverly
"I love working for NSA because of the pride it gives me knowing that I'm helping to provide safety to the free world, even though I am not wearing a uniform, and being part of a team effort."--Steven
"Working with the military has increased my awareness of our men and women in uniform, as well as their outstanding work and contributions to the mission. I have never been as grateful to them for their service as I am now."--Coralie
"The most rewarding aspect of working in the government are the multiple opportunities that are available to government employees to develop themselves either by formal education programs, certifications, agency classes, or peer-to-peer training. There are many opportunities available to government employees to develop themselves that range from the development of technical skills to leadership skills that can be used beyond the workplace."--Lymari
"The best part about working in public service / government is having the privilege to work with great people from all walks of life, all now marching toward common goals. I've met and worked with amazing people through the years, many of whom have inspired me in a variety of areas, personally and professionally."--J Clarke
"Outside of our amazing mission, work/life balance and programs such as the Nursing Mothers program show that the agency truly cares about the workforce. In a previous job, I had to pump in the supply closet. You can imagine how uncomfortable that was. The fact that the agency has rooms and supplies to help working moms shows the value that we add to the workforce, which has not gone unnoticed."--Ty
"There are two things that are great about working here: the people and the opportunities. I work with the most incredible people, day in and day out at NSA, and always have. I can't believe all the wonderful opportunities I've had at NSA, in terms of responsibility, impact, and development."--Beth
"From time to time, I enjoy reflecting on the fact that I WORK FOR NSA! That is cool and is something I probably wouldn't have believed possible when I was in college and graduate school."--Sarah
"Every day I get to put on my uniform and come to work knowing that I am surrounded by others like me who are willing to make big sacrifices on behalf of our country. I take pride in knowing that I am able to help advance the mission and am able to serve as mentor and leader for those who will take my place in the future."--Melanie
"The best thing about working for NSA is manyfold—satisfaction, opportunities, and flexibility. I have worked full time and part time. I bring dogs to the office, work on really hard problems, and have worked and continue to work with and for talented, smart, and dedicated professionals. I can't imagine a better career."--Sharon
"Aside from the great benefits NSA has to offer, one of the best things about working here back when I was hired in 2011 was the fact that this agency recognizes and provided same sex married couple benefits. The agency not only provided me with an overseas experience, but also made sure that my spouse could also work at the field site. Besides serving our country, I knew I was in the right place."--Maria
DIA CIO Participates in 'CIO Fireside Chat' on InnovationDIA
May 3, 2016
Speaking to a crowd of more than 250 attendees, Ms. Janice Glover-Jones, DIA's chief information officer (CIO) participated in a "CIO Fireside Chat" at the FedScoop Public Sector Innovation Summit on April 26, 2016. Participants of the panel also included the Department of Homeland Security chief technology officer, the deputy CIO for the Army and industry representatives from IBM and VMware.
Panel members discussed a wide range of topics impacting both the federal government and commercial industry to include: cybersecurity, cloud technology and workforce development and innovation.
Cybersecurity – "Just Enough Privileges"
In the area of cybersecurity, Glover-Jones focused her comments on data tagging and system administrator privileges. Data tagging was discussed as a way to couple identity access management with data tags, which are cryptographically bound to the data, to mediate access to the data. Secondly, she discussed providing "Just Enough Privileges," "Just-in-Time" to allow system administrators to do their job without having or maintaining access to data for an extended period. This reduces the risk and helps prevent a future insider threat data breach. Other panel members discussed the asymmetric nature of the cyber threat and noted that, although more money is being directed toward cybersecurity, our strategies have gone unchanged.
Cloud Computing – Agility and Speed to Market
Several panel members noted that the key benefit of moving to a cloud infrastructure is the agility and speed to which services are delivered to their diverse users. A secondary benefit is cost savings. Glover-Jones's comments focused on how the Intelligence Community IT Enterprise (IC ITE) Cloud is increasing information sharing, information security and data analytics across the entire IC.
Innovation – Occurring at all Levels of the Organization
Glover-Jones stated that innovation can no longer rely on purchasing new technology. She defines true innovation as, "coming up with a new, better way to connect-the-dots to yield a different outcome while using your existing resources." To foster innovation at all levels of the organization, she noted that CIO has initiated organizations and events that are designed to provide the workforce with the knowledge and forums necessary to think about new approaches to old problems and have methods to communicate those ideas up and across the organization. Examples include the Culture Club, Innovation PODS, Mission Awareness Briefings for IT Professionals, a CIO Boot Camp briefing and an Industry Speaker Series.
ODNI Releases Third Annual Statistical Transparency Report Regarding Use of National Security AuthoritiesODNI
May 2, 2016
In June 2013, President Obama directed the Intelligence Community to declassify and make public as much information as possible about certain sensitive U.S. government surveillance programs while protecting sensitive classified intelligence and national security information.
Since then, the Director of National Intelligence has declassified and authorized the public release of thousands of pages of documents relating to the use of critical national security authorities, including the Foreign Intelligence Surveillance Act. In addition to declassifying and publicly releasing these documents, the Intelligence Community has published several reports regarding these authorities, including the Statistical Transparency Report Regarding use of National Security Authorities (hereafter the DNI's annual transparency report), presenting metrics related to the use of certain authorities for calendar years 2013 and 2014.
On June 2, 2015, the USA FREEDOM Act was enacted, codifying many of the statistics reported in the DNI's annual transparency reports. The Act also expanded the scope of the information included in the reports by requiring the DNI to report information concerning United States person search terms and queries of certain unminimized, FISA-acquired information, as well as information concerning unique identifiers used to communicate information collected pursuant to certain FISA orders. The IC implemented the USA Freedom Act on Nov. 30, 2015.
Today, consistent with the USA FREEDOM Act and the IC's Principles of Intelligence Transparency, we are releasing our third annual transparency report presenting statistics on how often the government uses certain national security authorities. The DNI has declassified and directed the release of the applicable statistics covering calendar year 2015.
This information is available at the website of the Office of the Director of National Intelligence; and ODNI's public website dedicated to fostering greater public visibility into the intelligence activities of the government, icontherecord.tumblr.com.
NGA Damage Assessments Assist Recovery from Worst Houston Flood Event Since Hurricane AllisonNGA
May 2, 2016
SPRINGFIELD, Va. – Earlier this month, the National Geospatial-Intelligence Agency was called upon to produce flood extents and damage assessments for areas around the Houston, Texas, metropolitan area at the request of the Federal Emergency Management Agency.
From April 19-22, NGA assessed 28,180 acres of inundated land, 134 non-residential structures, 43 homes and 18 impassable roads. NGA worked closely with FEMA headquarters, FEMA Region VI, Texas Department of Public Safety and Emergency Management and the National Oceanic and Atmospheric Administration's liaison to FEMA throughout the event to identify the hardest hit areas, said Brian Cameron, NGA disaster analysis and domestic support branch team lead and FEMA liaison.
"Our remote sensing support enabled federal, state and local emergency officials to focus resources and efficiently support the citizens of Houston during the worst flood event since Hurricane Allison in 2001," said Cameron. NGA concluded its support on April 25.
One of NGA's core mission sets is providing accurate and timely geospatial intelligence to first responders in the wake of natural disasters. NGA supports humanitarian and disaster relief efforts by working directly with the lead federal agencies responding to fires, floods, earthquakes, landslides, hurricanes or other natural or manmade disasters.
DIA Welcomes New Senior Enlisted LeaderDIA
April 28, 2016
CMSgt Arleen Heath, DIA's 19th senior enlisted leader (SEL), welcomed the agency's new senior enlisted leader, MGySgt Scott Stalker, during a change of responsibility ceremony at DIA Headquarters April 19.
DIA Director Lt. Gen. Vincent Stewart spoke of the great contributions Heath has made over the course of her career, especially during her 16-month tenure with him. He spoke highly of Heath's work ethic and her passion about the workforce's professional and personal lives. Stewart went on to thank Heath for her partnership and making the agency better, adding that she has done so with grace, passion and energy.
During her remarks, Heath highlighted that she would not be here if it was not for her sister pushing her to join the military, a career that allowed her to be a part of the DIA family.
"I've had a fantastic time here," Heath said. "Anything that happens here in this agency is done by you — the professionals, officers, the professionals' family. Everyone matters. Everyone has value."
Heath praised the "magic" the junior enlisted make happen through their creativity and diverse thought, and thanked her senior enlisted peers for shaping her. "Continue to grow and develop our future leaders," Heath said to her peers. "Civilians and contractors, your service is no different from uniformed. Thank you for staying patient and making things better."
Stalker opened by thanking his family. He said he never pictured himself in this role because master gunnery sergeants traditionally serve in more technical roles. Stalker takes his cues from Sgt. Maj. Ron Kirby, who said, "Leadership is not a job; it's an action and an example."
As the new SEL, he doesn't plan to make many changes, but promised to be passionate and compassionate, and to think outside the box and about DIA's global workforce.
Heath will officially retire from the Air Force on Friday, April 29. DIA thanks her for her long career of service to the United States and for her outstanding leadership at the agency.
ANZAC Day: Lest We ForgetDIA
April 27, 2016
On the clear, brisk morning of April 25, several hundred individuals gathered at the Korean War Memorial on the National Mall to remember and honor all Australians and New Zealanders who served and died in all wars, conflicts, and peacekeeping operations, and to honor the contribution and suffering of all those who have served in uniform .
The annual dawn service begins at 5:45 a.m. to represent the time frame the first troops of the Australia-New Zealand Army Corps (ANZAC) landed at Gallipoli, Turkey. The Returned and Services League (RSL) of Australia provided attendees with the traditional sprig of rosemary and a red poppy; the rosemary grew wild at Gallipoli, and the red flower is emblematic of The Great War of 1914-1918.
Several commonwealth officials attended the event, including the Australian ambassador to the U.S.; the Australian, New Zealand and Turkish defense attachés; and the director general chaplaincy of the Australian Army. During the service, a representative from the Embassy of Turkey recited founding President Kemal Ataturk's moving tribute to the ANZAC soldiers, nothing that those who lost their lives are "now lying in the soil of a friendly country, therefore rest in peace."
ANZAC Day marks the anniversary of the first campaign that led to major casualties for Australian and New Zealand forces during World War I, and remains one of the most important national occasions of both Australia and New Zealand.
In 1915, Australian and New Zealand soldiers joined an Allied mission set out to capture the Gallipoli Peninsula, to open a second front and, in reaching the Black Sea, open an aid route to ally Imperial Russia. The ANZAC force that landed at Gallipoli April 25 met fierce resistance from the Ottoman Turks defending the heights. The Australian Army's nickname, the Diggers, comes from expedition commander Gen. Ian Hamilton's exhortation upon landing to "dig, dig, dig until you are safe." By the end of 1915, the Allied forces evacuated after both sides had suffered heavy casualties.
The Allied casualties included 21,255 from the United Kingdom – 4,000 of which were Irish soldiers from the Royal Irish Fusiliers; an estimated 10,000 from France; 8,709 from Australia; 2,721 from New Zealand; and 1,358 from British India. News of the landing at Gallipoli made a profound impact on Australians and New Zealanders at home, and April 25 became the day on which they remember the sacrifice of those who died in the war.
Though the Gallipoli campaign failed to knock the Ottoman Empire out of the war, the heroism of the Australian and New Zealand troops during the campaign left a powerful legacy. The people of Australia and New Zealand link AZNAC Day to their national identities, commemorating the values of courage, endurance, sacrifice and mateship.
Top Two U.S. Intelligence Officials, ODNI Officer Honored with Speechwriting AwardsODNI
April 26, 2016
Two speeches written for the Director of National Intelligence and his Principal Deputy won in three categories of the preeminent international speechwriting competition, announced April 19 by Vital Speeches of the Day.
Both speeches were written by Trey Brown, who has been writing for Director James Clapper and Principal Deputy Director Stephanie O'Sullivan since October 2011.
The prestigious Cicero Speechwriting Awards, presented annually, recognize the work of speechwriters whose craft empowers leaders in every sector of business, politics and society. Vital Speeches of the Day was founded in 1934 as a monthly collection of the best speeches in the world. The mission of the Cicero Awards is to honor speechwriters for their contributions to public conversation as well as to celebrate all aspects of an unforgettable speech: style, substance, coherence and humanity.
In the category of "Controversial or Highly Politicized Topics," Director Clapper's speech from January 2015 took top prize. Director Clapper delivered the speech— "National Intelligence, North Korea, and the National Cyber Discussion"—at Fordham University. "Taking the Diversity Challenge" given by PDDNI O'Sullivan in May 2015 at the IC Pride LGBTA Summit won in both the "Diversity" and "Government" categories.
Expressing his appreciation to his speechwriter, DNI Clapper wrote in an email, "This recognition has nothing to do with [the DNI or PDDNI] … it has everything to do with the richly-deserved recognition of you. You are the master of your profession." DNI Clapper continued, "We execute what you create. We are exceedingly proud of you." PDDNI O'Sullivan added, "These awards are an amazing recognition to an amazingly talented officer."
Asked about his thoughts on the win Trey said, "I'm very fortunate to write for two leaders who both have the courage to share their thoughts, feelings and stories in deeply personal ways that audiences can relate to, and who don't leave unsaid the things that need to be said. It's all a speechwriter could ask for, and it's why I love what I get to do every day."
Trey is a graduate of the U.S. Naval Academy and St. John's College, Annapolis, Md.
Harriet Tubman — Intelligence OperativeDIA
April 22, 2016
On April 18, the Treasury Department announced that Harriet Tubman will be honored with the placement of her picture on the new $20 bill.
A slave, cook, maid, field hand and nurse, Tubman was also a leader of the Underground Railroad for nearly a decade and – over the course of her life – helped hundreds of slaves make their way to freedom, earning the title "the Moses of her people." Beyond these endeavors, DIA would like to recognize Harriet Tubman's excellence in defense of the nation through her efforts as a spy, recruiter, handler, scout, operational planner and combat leader during the American Civil War. Tubman, who died in 1913, at the age of 92, received full military honors and was acknowledged by the Smithsonian Institution in 1982 as "the only American woman to plan and lead a military raid."
Harriet Tubman began her clandestine work in 1849 after fleeing Maryland in the abolitionist-led Underground Railroad to avoid being sold. Rather than seeking a normal life in the North, Tubman instead advanced to the position of conductor in the Underground Railroad, returning to Maryland more than a dozen times to rescue family and other slaves. Using disguises, codes and secret routes, she escorted nearly 100 slaves to their freedom.
An activist in the Boston-based Freedman's Aid Society recalled of Tubman, "[S]he has needed disguises so often that she seems to have command over her face, and can banish all expression from her features, and look so stupid that nobody would suspect her of knowing enough to be dangerous; but her eyes flash with intelligence and power when she is roused." Her exploits eventually resulted in rewards in the South for her capture amounting to $40,000. During this time working with the Underground Railroad, she developed the skills that would benefit her greatly as an operative during the war. She also developed relationships with key abolitionist benefactors.
Several months after the Civil War began in 1861, Gov. Andrew of Massachusetts – a passionate abolitionist – recruited Tubman to join with Union forces occupying Beaufort, S.C., to provide support as a spy and scout. Upon her arrival, she was provided a military pass, access to Secret Service funds, established relationships with local slaves for the collection of information, and rapidly recruited a team of scouts who knew the region intimately. She was tasked in 1862 - 1863 with mapping the region and identifying Confederate outposts and vulnerabilities, which bore fruit when a black unit of Union soldiers, using intelligence provided by Tubman, conducted successful raids throughout the region.
Tubman's most renowned clandestine activity came in mid-1863 with her direct support to the Combahee Raid. Union Gen. Dave Hunter asked if Tubman was willing to travel with several gunboats up the Combahee River to disrupt Confederate logistics and identify the locations of mines placed in the river. She gave an ultimatum that she would only participate if Col. Montgomery – a confidant and associate of Tubman's – would lead the expedition, which Hunter approved.
Tubman and Montgomery would effectively act as co-commanders, and Tubman had authority to act independently to collect intelligence. Using honed clandestine tradecraft, she identified slaves who placed the mines, and offered them freedom if they would identify where the mines were located. This complete, the gunboats steamed up the river on June 2, 1863. Undetected, the Union forces destroyed a Confederate depot, burned the homes and holdings of Confederate sympathizers, seized crops, and liberated nearly 800 slaves from local plantations.
Many of the freed slaves, recruited by Tubman, joined Union 2nd South Carolina Colored Infantry. A Confederate report after the raid highlighted "[T]he enemy seems to have been well posted as to the character and capacity of our troops and their small chance of encountering opposition, and to have been well guided by persons thoroughly acquainted with the river and country." Col. Montgomery, in a letter to Gen. Quincy Gilmore on July 6 noted, "I wish to commend your attention to Mrs. Harriet Tubman, a most remarkable woman, and invaluable as a scout." Tubman actively supported military efforts for another year until becoming ill while on leave to visit her family.
Following the war, Tubman was not provided back pay for her support of the military; in 1890 Congress finally allotted her a small pension, but as the widow of a soldier, her second husband. Nevertheless, Tubman never stopped fighting for her beliefs. A staunch advocate for women's suffrage, she worked with Susan B. Anthony and spoke frequently at suffrage events. She saved money for years to purchase land to support the construction of a home for the indigent – the Harriet Tubman Home for the Aged, opened in 1908. At the end of her life she was penniless and committed to the home she helped found.
Today, DIA commends Harriet Tubman for her work supporting the United States. She routinely risked her life for the cause of freedom. As a successful intelligence operative during the Civil War, she will be remembered for her outstanding service to this country.
NGA Knows the Earth, Leads the Way to Mount Everest Base CampNGA
April 20, 2016
The National Geospatial-Intelligence Agency vision statement is Know the Earth, Show the Way, Understand the World; and there's no better vantage point to do that than standing atop the Earth's highest mountain.
In April 2014, Karen Diener, a geospatial intelligence specialist with KD Geospatial Solutions who supports NGA Research (formerly Innovision), led a group of 10 employees from around the Intelligence Community and the Department of Defense on a hike up Mount Everest.
Her passion for climbing began five years ago through her involvement in No Barriers Warriors, where she helped disabled military veterans climb mountains. Its mission statement is "what's within you is stronger than what stands in your way," and the organization aims to bring awareness to the battles veterans face when returning home.
That experience ended up helping Diener get over her fear of heights and exposure. Since then, Diener has completed eight alpine climbs in six countries. It was Diener's idea to ascend Mount Everest with an NGA flag in hand. She wanted to give the flag, which would feature the NGA seal, to Willie Benegas, her Alpine climbing guide who would be making the full climb to the summit.
"You only get seconds at the top because it's windy and cold, so one flag with all the emblems was my goal," said Diener.
When the group was only three days away from reaching base camp, blocks of glacier ice broke off, causing an avalanche near the summit. That April 18, 2014, avalanche buried 25 climbers, mostly Sherpa guides who were preparing the mountain for climbers.
"We were all concerned because the Sherpas trekking with us knew people trapped up there," said Diener. "We had all become close with them by this point so we were praying with and for them and their families."
Benegas holds the record for the second most climbs of a U.S. citizen to Everest's summit. He was an integral part of a team who recovered victims of the avalanche. Diener describes Benegas as a rescuer, a "true saver of lives," who has never lost a client. His team recovered three people who were injured in the avalanche.
Coincidentally, in April 2015, the agency once again provided support to the country after the Nepal earthquake disaster.
"When the earthquake hit, everyone from our group became involved in some way to help and reach out to a place and people we will forever love and feel attached to," said Diener.
Benegas was again on Everest during the earthquake, along with his brother Damian, and they were able to assist in relief efforts. They created and implemented a new relief program called "Path to Recovery," a program that raises money to employ locals who would carry supplies to remote areas of the Himalayas, offering support to areas that would otherwise go without aid for a month. For this and for their rescue efforts, the Benegas brothers were recognized by the United Nations World Food Program and received a humanitarian award.
"People were involved, people helped, people continued to help and build relationships as the mountain shut down for two years," said Diener. She noted how NGA's role in the Everest disasters and how being there, at the highest peak in the world, as part of the organization that "knows the world" was truly special.
The flag will be rotated around the IC agencies depicted on it. Diener hopes it will serve as a symbol of what teamwork accomplishes and how the IC assists in disasters around the world.
West Point Wins NSA's 16th Annual Cyber Defense ExerciseNSA
April 15, 2016
The U.S. Military Academy won the 2016 Cyber Defense Exercise (CDX), capturing its 8th Information Assurance Director's Trophy since the annual competition began in 2001, NSA announced today.
"CDX is a uniquely important exercise to develop the cyber security skills of the students at these military institutions," said Kim Beam, an Information Assurance Directorate senior leader. "It is an exercise where the participants put theory and classroom instruction into practice."
Cadets and midshipmen from the U.S. Coast Guard Academy, U.S. Merchant Marine Academy, U.S. Military Academy, U.S. Naval Academy and the Royal Military College of Canada had their cybersecurity skills, tenacity and ingenuity tested this week against the National Security Agency's top information assurance professionals. NSA's Information Assurance Directorate (IAD) sponsored the event.
"During the week the participants – who are focusing on keeping their network services available and running – experience real cyber-attacks and their impacts. The academies build networks and defend them from real attacks by exercise 'hackers,'" said Beam. "CDX provides a competition that increases the participants' cyber defense skills. Defensive skills and insights are gained not only by the network defenders, but also by those playing offense during the exercise. They'll go back to defending networks post CDX."
NSA experts who help secure the U.S. government's most sensitive communication systems challenged service academy teams to protect networks they designed, built, and configured at their respective schools. Working out of the Parsons facility in Columbia, Md., another group of NSA specialists graded each team's ability to effectively maintain network services while detecting, responding to, and recovering from security intrusions and compromises.
"All of the teams competed intensely for the trophy– and the bragging rights that come with a victory," Beam added. "Each team had strengths and the overall skill level of the defenders rises each year. While just one team gets the trophy, all of them win by honing their cyber security skills. The Information Assurance Directorate is proud to be a part of this event."
In addition to the core exercise, the students' analytic skills were tested through three challenge modules. Those modules were also scored and a winner named in each of the modules. The winners of each of the challenge modules are:
- Malware Analysis/Reverse Engineering challenge: U.S. Naval Academy
- Host and Network Forensics challenge: U.S. Military Academy
- Offensive Ethical Hacking challenge: A tie between The Royal Military College of Canada graduate team and The Royal Military College of Canada undergraduate team
DNI Statement on the President's Nomination of Susan S. Gibson to be the Inspector General for NROODNI
April 14, 2016
I am very pleased the president intends to nominate Susan as the first presidentially appointed and Senate confirmed inspector general for NRO.
Her many years of service and deep knowledge of the Intelligence Community, combined with her experience in the ODNI Office of General Counsel, make her the right choice to assume this vital role.
Susan has done an exceptional job over the past decade as one of our original plank holders responsible for standing up ODNI. I'm grateful to see someone who has contributed so much to the Intelligence Community will be able to offer her valuable legal and leadership expertise in a new way.
Congratulations to Susan on her selection, and I look forward to working with her in her new position.
— James R. Clapper, Director of National Intelligence
Appointment of NSA's First Transparency OfficerNSA
April 11, 2016
Rebecca Richards, NSA's Director of Civil Liberties and Privacy, has been appointed to serve concurrently as the agency's first transparency officer. This dual role complements ongoing initiatives to ensure that NSA has the best civil liberties and privacy practices.
The appointment reflects NSA's commitment to the Principles of Intelligence Transparency for the Intelligence Community (IC), which were recently established by the Office of the Director of National Intelligence in conjunction with IC agencies. The principles support making information publicly available in a way that enhances understanding of intelligence activities, while continuing to protect information when disclosure would harm national security. You can view the Principles at www.dni.gov.
As the NSA transparency officer, Ms. Richards will serve on the ODNI-led Intelligence Transparency Council, a new forum where the IC will develop a strategic, coordinated and proactive approach to increased transparency. This approach will include not only sharing information about the rules that apply to the IC and its compliance under those rules, but also sharing information about what the IC does in pursuit of its national security mission, while at the same time protecting vital intelligence sources, methods, and activities.
DIA Selects New Deputy DirectorDIA
April 6, 2016
DIA Director Lieutenant General Vincent R. Stewart announced yesterday that Melissa Drisko will become the agency's deputy director effective in August 2016. Drisko currently serves as DIA's lead for Rank-in-Person Implementation.
In announcing her selection, Stewart said Drisko is "the right choice as a partner in leading this agency. She speaks truth to power, unbiased and unblemished – this is the mark of a true leader." Going further, he stated that Drisko is "wholeheartedly committed to DIA and to serving our country."
With over 35 years of federal service, Drisko brings a wealth of experience to the Deputy Directorship. She has served in a number of roles throughout the Intelligence Community, including with the Office of Naval Intelligence, the Department of State's Bureau of Intelligence and Research, and the Central Intelligence Agency. She joined DIA as the deputy chief financial executive in 2007. Drisko has since served as the deputy director of Naval Intelligence at ONI and as DIA's vice deputy director for Collection Management/Deputy Defense Collection Manager, chief of staff, and the director for Science and Technology.
As deputy director, Drisko will help manage the daily operation and long-term planning of the Defense Intelligence Agency. The deputy director leads DIA activities in a broad range of both internal and external initiatives.
Drisko graduated from the University of Virginia in 1981 with a Bachelor of Arts degree in anthropology. She was commissioned in the U.S. Navy in May 1981.
In the Spotlight: An NSA Applied Research Mathematician Leans InNSA
March 31, 2016
Q: What attracted you to a career in government? What attracted you to NSA?
A: Working as a mathematician at NSA was attractive because of the challenging problem-set with real-world impact, the emphasis on collaborative work, the concept that everyone is on the same team with the same goals (mission). [Insert Read More… link] In addition, the community aspects of the mathematics community at NSA were very appealing. As a microcosm of the external math community with internal classes, talks, peer-reviewed papers, peer and mentor networks, and opportunities for collaboration outside of your particular office, the math community appealed to my desire for a culture of support, connection and intellectual kinship in my work.
Q: What are some of your most challenging, unusual, memorable, 'fun,' or interesting professional experiences at NSA?
A: My most memorable and interesting professional experiences at NSA fall into two categories: technical collaboration and community building.
In my career as an Applied Research Mathematician, technical collaboration on hard problems has been the highlight. The process of moving from white board brainstorming to solving a problem with mission impact is such a rewarding experience. My personal strengths in identifying areas for improvement, advocating for the needed improvements and building the right team to collaboratively solve the problems at hand have guided me into leadership positions as well. My contributions have not only had an impact on highly visible world events, but also on the internal mathematics community by developing and communicating new mathematical theories and framework to position NSA for impact on future world events.
Community building has been a key component of my time in leadership of the Agency's Women in Mathematics Society, serving as president among other roles. I organized career panels, career and technical talks and roundtable discussions dedicated to the health of the internal mathematics community. I have gained the trust and ear of key senior-level community members, providing a much-needed bridge between the early-career mathematicians and those in the position to enact change. One of my favorite experiences in this arena has been hosting and participating in the roundtable with senior leadership to address the under-representation of women in senior leadership positions. We hosted senior leadership from across the Agency and ensured that participation was balanced across the career levels, leading to a lively and productive discussion of the issues.
Q: Why is it so important to encourage girls to go into STEM fields?
A: First of all, I should say that I don't believe in forcing anyone into a STEM career if it's not the right fit for the individual. However, there is a lot of evidence showing inequity in the treatment of girls and women in STEM education and careers; this treatment warrants encouragement of girls who have an aptitude for STEM and are interested in it.
With that said, let's first consider this from the health-of-STEM perspective: STEM needs women! And men! And anyone of any gender who is interested in it! On the problems I've worked at the Agency, diversity in approach, experience, knowledge and skills has proven essential to success. Bringing together a group with varied perspectives, backgrounds, experiences and abilities is necessary to attack the hardest problems. Limiting the pipeline of potential scientists and mathematicians by socializing girls out of STEM is illogical and detrimental for our overall success in these fields.
Let's consider the benefits to women: First, STEM careers are generally higher paying, challenging, careers with good growth opportunity and relatively low stress. In addition, succeeding in a field in spite of the biases and socialization against women can provide these individual women confidence and a feeling of accomplishment. But, having more women in STEM careers isn't only beneficial to those individuals, it's also beneficial to women at large. If we increase equality in STEM, it's really hard to keep up the notion that women are unequal in other ways.
Jennifer is an Applied Research Mathematician at the National Security Agency. In addition to her technical work, she has served in multiple leadership roles in NSA's Women in Mathematics Society, most recently as president. A graduate of NSA's Applied Mathematics Program, she has worked for NSA for eight years.
Serving the Nation with Dedication and CourageNSA
March 29, 2016
On the morning of September 11, 2001, my then-boyfriend called me at home and told me to turn on the television. By the time I started watching, the North Tower of the World Trade Center in New York had already been hit.
I sat, transfixed, as the second plane crashed into the South Tower. As the events unfolded and later, as things became clearer, I felt a profound change – the world as we knew it would never be the same again.
I also felt a call to action, to do something, to contribute, to serve my country.
I was weeks shy of my 30th birthday; I thought, "I'm too old for military service." It turns out, I wasn't! I carefully weighed my options and my skills and, in the end,
I decided to become a linguist for the Navy. I had studied five different languages over the years and found it was one of my passions. Moving and waiting for an opening in my field of interest resulted in a long delay, but three years later, just before turning 33, I graduated from Navy Basic Training and arrived at the Defense Language Institute (DLI) in Monterey, California, which I first learned about as a freshman at Indiana University. As soon as I arrived in Monterey, I hit the ground running. I quickly realized how much harder it was to acquire a new language at 33 versus 11, so I spent a lot of time studying!
Being "more mature," i.e., older, I immediately stepped into a role as a mentor. Younger Sailors often came to me for guidance and advice. I have always been happy to use my life experience to help others. I consider it my responsibility. I view supporting my Navy, my command, my shipmates and my fellow service members, and my community all part of serving my country. Wherever the Navy sends me, as long as I am there, I believe I should help make that place better.
Although I volunteered in the community before I joined the Navy, the sense of being part of something greater than myself grew much stronger when I put on the uniform. Over the years, I have organized and participated in so many events benefiting the environment, children, at-risk youth, current military and veterans, the homeless, cancer research, etc. While everything I do is special and meaningful to me, one organization has become very near and dear to my heart since being stationed in Maryland. That organization is Honor Flight.
Honor Flight is a non-profit organization that began in 2005 to bring WWII veterans to Washington, D.C., to see their new memorial. They have since expanded to include Korean and Vietnam War veterans. Every year, from March to November, thousands of veterans fly here from all over the country as part of Honor Flight. I am always particularly touched to see the women veterans. As a woman in the military today, I think of the courage and the chutzpah those young ladies had more than 70 years ago to go off and serve their country. Women in uniform wouldn't be where we are today without them paving the way!
Looking back on my years of service, the best advice I would give to any girl or young woman about their field of study or career is to never let fear stop you from doing anything. Whether someone fears the unknown or failure or what people will think or anything else, we are all far stronger and more capable than we think. Fear is natural and it can keep us alive (or at least stop us from being reckless), but it should never prevent us from reaching our full potential. Whenever I feel myself doubting whether I can do something or not, I think of those women vets. And I remember: I went through boot camp at 33! I can do anything!
The Intelligence Legacy of Lewis and ClarkNGA
March 22, 2016
The United States geospatial intelligence effort began in earnest in 1803 with President Thomas Jefferson.
Jefferson commissioned the Corps of Discovery and appointed Meriwether Lewis, his private secretary at the time, to organize and command an expedition to explore the newly acquired Louisiana Purchase and other lands west of the Mississippi River. Lewis recruited William Clark, an experienced militiaman and younger brother of renowned Revolutionary Gen. George Rogers Clark, to be his co-captain. Their task was to penetrate the wilderness of the West, to look for river routes to the Pacific Ocean, to map the terrain and to establish diplomatic and trade relations with indigenous tribes. However, in a classified tasking, they would also secretly report to Jefferson on the activities of foreign powers in the new territories, which included European and Indian military forces and alliances, trade patterns, as well as the geography, plant life and animals they found.
Planned and funded secretly, this was the first large government effort to explore the new lands Jefferson had purchased from France. Some historians believe Jefferson hoped to establish a United States claim of discovery to the Pacific Northwest and Oregon territories by documenting an American presence there before Europeans could claim the land.
Their journey took three years and two months. Lewis left Washington, D.C., in July 1803, bound for Pittsburgh. There he oversaw construction of the keelboat that would carry the expedition, recruited its crew and loaded supplies. With 11 men, he then left for St. Louis, where they joined with Clark's party and spent their first winter. On May 14, 1804, the expedition left Camp Dubois, on the east side of the Mississippi, and headed up the nearby Missouri River. By October, they had reached a Mandan Indian village near present-day Bismarck, N.D., where they established their second winter encampment. Leaving there in the spring 1805, they traveled up the Missouri, crossed the Rocky Mountains, and arrived at the Pacific Ocean in November. After spending the winter on the Pacific coast, they returned to St. Louis, arriving on Sept. 23, 1806.
It was an arduous passage with many adventures and misadventures along the way. One corps member died, and one was dismissed for insubordination. At one point the keelboat was swamped by a sudden storm on the river, and many records and provisions would have been lost without the personal efforts of Sacajawea, the 15-year-old Shoshone wife of Charbonneau, a French trapper the party had encountered earlier. By the time the expedition returned, many had given it up for lost.
The successes of Lewis and Clark were manifest. They established diplomatic and trade agreements with Native American nations and discovered many species of plants and animals unknown to the European world. As the nation looked west, other military and civilian expeditions followed Lewis and Clark and expanded our knowledge of the world. Many other expeditions followed, driven not only by the desire for scientific discovery, but also by the need to show the way for America's increasing migrations westward.
This voyage of discovery also left geospatial legacies. The expedition became the first organized effort to collect information on native social behavior and customs — modern human geography. With open and classified missions, Lewis and Clark created products that included new maps of the territory reflecting their adventures and making significant contributions to the evolution of geospatial understanding through cartography and surveying. These fundamental tradecrafts are still essential to the work of the National Geospatial-Intelligence Agency.
The National Geospatial-Intelligence Agency proudly follows in the footsteps of explorers like Lewis and Clark. Our motto, "Know the Earth… Show the Way… Understand the World," reflects not only our own mission, but the mission of the Corps of Discovery two centuries ago.
Former President George H.W. Bush Awarded Honorary DegreeDIA
March 22, 2016
On March 8, the National Intelligence University presented the Honorable George H.W. Bush with an honorary Doctor of Strategic Intelligence degree, recognizing the 41st president of the United States as "an exemplar of the highest ideals of service to the security and well-being of the nation."
The honorary degree was presented by NIU President Dr. David Ellison during a small ceremony at President Bush's Houston office. Also in attendance were former First Lady Barbara Bush and Ambassador Ryan Crocker, dean of The George Bush School of Government and Public Service at Texas A&M University.
President Bush has a long record of distinguished service to his country. As the 41st president of the United States, he was the ultimate consumer of U.S. intelligence. Prior to his service as the commander in chief, he was a naval aviator in World War II, congressman from Texas, ambassador to the United Nations, chief of the U.S. Liaison Office in Beijing, director of Central Intelligence at the CIA, and vice president of the United States under President Ronald Reagan.
Throughout this distinguished career, President Bush was the consummate intelligence consumer and practitioner, balancing the needs of national security and the values of democracy. Throughout his presidency, he used intelligence as an instrument of national power and in support of foreign policy to our collective best advantage and to great result.
The National Intelligence University takes great pride in recognizing President Bush's career by awarding him the degree of Doctor of Strategic Intelligence, Honoris Causa.
National Cryptologic Museum Hosts Women in STEM EventNSA
March 18, 2016
In honor of Women's History Month, the National Security Agency (NSA) and the National Cryptologic Museum (NCM) will host the Maryland STEM (Science, Technology, Engineering, and Mathematics) Festival event, "Women in STEM."
NSA subject matter experts will provide briefings, discussions, and hands-on demonstrations representing the exciting work performed by women at the agency. The Women in STEM event will be held Thursday, March 31, 2016, from 6:30 to 8:30 p.m.
The event is free and open to the public with a focus on middle and high school female students interested in learning about the science, technology, and mathematics that form the basis of cryptology.
Visitors will be able to speak directly to female scientists, mathematicians, and technical experts about their skills, and what attracted them to STEM fields and government service, while experiencing interactive activities that represent their work.
NCM will give a presentation on Women in Cryptology showcasing the history of women's support to protect the nation.
Mathematicians will discuss how cryptology uses math to decode complex messages and will test student's knowledge with brainteasers.
Data scientists will provide real-world examples of how to use metrics for decision making.
Software developers will demonstrate how to write code that can identify and tag data.
Engineers will illustrate how information sharing platforms contribute to the power of teamwork and will have radio-frequency antennas on hand to discuss design engineering.
NSA has contributed major advancements in communication and computer technologies for more than 60 years. That work continues today with state-of-the art innovations in engineering, mathematics, and technology in support of national security.
Serving as inspiration for the next generation, the women of NSA continue to be at the forefront of solving future cyber and mission challenges to help protect and defend our nation.
Have the Courage to Take RisksNGA
March 17, 1016
Have courage, former NGA director Letitia A. Long advised during a women in public service panel discussion March 10 in the Allder Auditorium.
"Take risks," Long told employees. "Go for a job you're not absolutely ready for. If it's a job you're 100 percent ready for, then you probably aren't challenging yourself."
The panel discussion brought together women from across NGA and focused on the challenges facing women in the workplace. Long served as the keynote speaker at the eight-person panel, held in honor of Women's History Month.
"Have the courage to take your rightful seat at the table," Long said. "Don't take yourself out of the running. Have the courage to ask, 'Why not me?'"
"If you believe in yourself, put yourself out there. Others will believe in you, too."
In addition to Long, seven other panel members discussed their career stories and offered career advice: Deputy Director Sue Gordon; Misty Tullar, director of plans and programs; Air Force Chief Master Sgt. Rachel Ziegler, senior enlisted advisor; Ellen Ardrey, director of the Human Development directorate; Allison Hall, director of Security and Installations directorate; Nicole R. Pierce, director of the Office of Contract Services; Cynthia R. Ryan, director of the Office of the General Counsel.
Among other topics, the women discussed the importance of mentors and told stories of people who were integral in their career ascent.
Long talked about a high school guidance counselor who pushed her to consider a career as an engineer. Pierce discussed a former supervisor who took an interest in her development, despite the fact that she was an underperforming employee.
Gordon discussed women in the history of geospatial intelligence that paved the way for the women workforce of today: Marie Tharp, Constance Babington Smith, Nancy Bone and Bobbi Lenczowski. She echoed Lenczowski's challenge to women to "continue to pay it forward as mentors and advocates" for each other.
The panel, titled "Working to Form a More Perfect Union: Honoring Women in Public Service and Government," was hosted by the Security and Installations Employee Council with the support and collaboration of the NGA Federal Women's Program Council.
"We will be successful when there are no more firsts," Long said. "When it's natural to look around and see talent – not gender, not race, not ethnicity.
March is Women's History MonthNSA
March 17, 2016
This March marks the 29th anniversary of the declaration of Women's History Month, the genesis of which began with the contributions of a few dedicated women in the 1970s who worked to re-focus the story of our nation on a more holistic and inclusive view of history that acknowledges the often overlooked achievements of America's women.
The 2016 Women's History Month theme, "Working for a More Perfect Union: Honoring Women in Public Service and Government," presents a unique opportunity to highlight the critical role of NSA women in securing the nation. We will celebrate the amazing work of women in all agency disciplines, recognize the incredible influence of our women in STEM fields, and demonstrate the sacrifices made by female members of NSA's workforce in order to protect the United States and its citizens from outside threats.
Let's use this time to celebrate the women who make this country great and NSA's mission successful. I am proud of their past contributions and enthusiastic to be part of a future where the women of NSA continue to be counted among those great individuals upon whose thoughtful innovation and bold actions our nation was built.
— Corin R. Stone
Executive Director, NSA
Intelligence Community Comes Out in AustinODNI
March 16, 2016
IC LGBT Pioneers Share Their Stories of Serving Openly and How Intel Agencies Outpaced Other Sectors in Some Respects
Austin, Texas - America's Number Two Spy Stephanie O'Sullivan praised LGBT officers from three Intelligence Community agencies in her introductory remarks before a South by Southwest panel discussion here on Monday.
Their advocacy, she said, was "not for personal gain but just to be able to serve their country. That is the very definition of selfless patriotism."
Ms. O'Sullivan said, "Without diverse thinking and unique perspectives, we will fail. We need every bit of the diversity of talent, skills and insight of the workforce." She continued, "Not only because it is imperative for our work, but because it is a reflection of who we are."
For the first time in its history, the Intelligence Community—long perceived as an exclusive bastion of a narrow demographic—brought together LGBT officers to share their personal stories of leading change from within. These Secret Agents of Change represent a continuum of progress that confounds expectations, revealing how the Intelligence Community historically has been ahead of the Fortune 500 and broader government in sewing the seeds of equality in the workplace.
When Kris Gill arrived at the National Geospatial Intelligence Agency in 2010, what he found may have surprised his former private sector colleagues. "I was able to come in the door just as I am thanks to those who came before me." Today Kris chairs the Intelligence Community's Transgender Working Group. He also represents NGA within IC Pride, which links LGBT employee groups across the 17 agencies of the Intelligence Community. His work at NGA underpins military navigation systems, so he acknowledged the pun as he said, "I really like charting change."
When Kris was in elementary school, panelist Tracey Ballard was in her third year as a CIA officer. She faced a pivotal choice: share her sexual orientation at risk of being fired or hide it at risk of betraying herself. She chose to come out. "Those who came before me were typically removed from service and lost their [security] clearance."
CIA kept Tracey in its ranks as its first openly gay officer — seven years before the Executive Order that barred sexual orientation as a criterion for security clearances.
Tracey said the CIA was trying to let LGBT officers come onboard as new hires —or stay with the agency—so long as they were honest about it. But nothing official happened until 1995 with the Executive Order, resulting in haphazard efforts.
Tracey's personal decision had wide-reaching implications in 1996 when she decided to establish CIA's grassroots LGBT affinity group, Agency Network of Gay, Lesbian, Bisexual, and Transgender Officer and Allies. "I had a privilege of being out and cleared for seven years [before Executive Order 12968 in August 1995]."
"For me, it's about being a part of something that is larger than myself. I understand that whatever I'm doing is going to help the person coming after me."
FBI Supervisory Special Agent Katrina Gossman also recognized how her personal decisions shaped the circumstances of those in her wake. When Massachusetts legalized same-sex marriage in 2004, Katrina seized the fleeting moment. She wed her partner there just days before out-of-state, same-sex couples lost the ability to do so.
Legally married in Massachusetts, Katrina submitted her marriage license to the FBI to extend her benefits to her wife. When the FBI welcomed their marriage, Katrina encouraged other same-sex couples to follow her lead. "In 2004, I became the first FBI employee to marry my [same-sex] partner," Katrina said.
Two months after receiving spousal benefits, Katrina received a letter from the FBI rescinding them. "The people of the FBI wanted to do the right thing," she said, pointing to the FBI's inability to overcome the Defense of Marriage Act.
Suddenly, Katrina said, "I became the most outed employee in the FBI." Katrina said she just wanted to be free to do her job without worrying about her family. "The most rewarding thing for me is catching the bad guys."
Monday's panel cultivated rich discussion at South by Southwest. Panel chair Rita Sampson — who leads inclusion efforts across the Intelligence Community — said, "The power of today's session is to be interactive."
One audience member shared that she had been an international affairs student in Washington, D.C. in 2004 and was "on track" to pursue a career in the Intelligence Community. But she feared it would not work for her family. She and her wife instead moved away from Washington in pursuit of careers they believed would be a better fit. She expressed appreciation to the panelists for their courage, saying she may have pursued work in the Intelligence Community had she known what progress had already been made by the time she was seeking a career.
The panel explained how their efforts within their individual agencies continue to shape best practices for broader diversity efforts within the Intelligence Community and the wider federal government. After all, Kris said, "Not being able to come to work as your authentic self takes a toll on your energy."
Tracey agreed, "We are not the organization of our grandfathers. We've gone from a very dark, closed environment to a very welcoming, open environment."
There is more work to be done on LGBT and overall inclusivity issues. Kris has been involved in the push to drop Office of Personnel Management exclusions for transgender healthcare for federal employees. Today IC Pride is working to continue progress toward inclusive policies related to hiring, security, and human resources for LGBT employees across agencies.
The next LGBTA—A for Allies—Summit in June is expected to bring together roughly 1,000 officers, many of whom will join via video teleconference from posts—and agencies—around the world. Meanwhile, IC Pride continues to unify efforts within intelligence agencies, paralleling the broader cultural shift toward integration throughout the Intelligence Community.
For inquiries, please contact email@example.com.
Former NRO Director Shares His Story of National Imagery and Mapping Agency CreationNGA
March 15, 2016
In 1987, while working as a staffer of the U.S. Senate Select Committee on Intelligence, Keith Hall had the notion of how to fix the current, "messy" imagery analysis and collection problem. A seasoned Army intelligence officer, Hall witnessed a number of capability gaps and general work duplication in the imagery community.
"There was a severe overlap and loose coordination [between the agencies]," said Hall. "It was not unusual for multiple agencies to work on the same image, creating an unnecessary duplication in intel work of imagery analysis and interpretation."
Thus, the idea for a national imagery agency was born, said Hall.
Hall first advocated for a national imagery agency that combined the mapping aspects with intelligence and imagery analysis by suggesting the idea to Chairman of the Joint Chiefs of Staff, William Crowe.
The idea was not well received at first, said Hall. It did not make it into the Intelligence Reform Report, and Intelligence Community members did not support the concept of a combined imagery agency. However, the idea resurfaced in 1992 during a breakfast meeting with Director of Central Intelligence Robert Gates and Secretary of Defense Dick Cheney.
In the meeting, Gates expressed that CIA was too closely tied to imagery, at the sake of signals intelligence, said Hall. Again, Hall brought up the formation of a national imagery agency. Despite some resistance from some Department of Defense and IC senior leaders, the Central Imagery Office was created in 1992.
The CIO, although closer to Hall's vision, was not a total success, he said. Hall continued to push for improvements in the coordination of imagery intelligence because there was a belief from senior leaders that imagery analysis was broken.
Then, in 1995, John Deutch asked Hall what he could do to fix it and Hall once again shared his concept. Later that year, at his DCI confirmation hearing, Deutch said in his opening statement that, "if confirmed, it would be my intention to create a national imagery agency."
After Deutch's confirmation, Hall was appointed director for intelligence community affairs, CIA, and his first task was to lead the effort to stand up the national imagery agency Deutch had promised.
With the help of Vice Chairman of the Joint Chiefs of Staff Bill Owens, co-chair of the implementation task force, and after more than a year of studying, debating and planning, the National Imagery and Mapping Agency was established Oct. 1, 1996. NIMA combined the missions and functions of the Defense Mapping Agency, the CIO and the Defense Dissemination Program Office.
Hall later became director of the National Reconnaissance Office, and is currently serving as the NRO client service officer with a defense contractor. NGA Deputy Director Sue Gordon has said she considers Hall an integral part of the NIMA story, instrumental in its creation.
Soviet Military Power Video Delves into Legacy of DIA's Historic PublicationDIA
March 9, 2016
At the request of U.S. Secretary of Defense Caspar Weinberger and his NATO counterparts, DIA Director Lt Gen. Eugene Tighe, USAF, assigned Denis Clift, a senior defense intelligence officer, the task of preparing an unclassified publication to help inform the public of the nature and scope of the Soviet threat.
In September 1981, what was thought to be a one-time-only edition of "Soviet Military Power" was released. It was very well received and, in December 1982, Weinberger informed the Senate Armed Services Committee that he planned to issue a revised and updated version of the report. That was news to DIA. DIA quickly reassembled the original team under Clift, Dennis Nagy and David Phillips to meet the March 1983 deadline.
Editions of "Soviet Military Power" spanned the Reagan presidency and continued into the George H.W. Bush administration – 10 editions that forever set the standard for how to produce authoritative unclassified publications. It was translated into at least eight languages, including Russian. At the height of its popularity, nearly 400,000 copies were printed and distributed.
The project also opened a new chapter in the debate over the relationship between the use of classified intelligence and public policy. Weinberger described the overall effort as "singularly effective in producing a public understanding of the Soviet threat to our security and in developing support for the much-needed modernization of our armed forces."
It was also a victory for the DIA team providing the intelligence that told the world about the Soviet military buildup. The Soviets couldn't achieve their goals as long as the West could show the world what the Soviets were doing. "Soviet Military Power" made that possible.
Watch DIA's documentary on "Soviet Military Power" video here.
DDCI talks Integration, Global Security and Training at JMUDIA
March 2, 2016
The Defense Intelligence Agency's Deputy Director for Commonwealth Integration, British Air Vice Marshal Sean Corbett, addressed a cadre of university students, members of the U.S. intelligence community, and Five Eyes (FVEY) partners Feb. 29 at James Madison University's 15th biannual FVEY analytic training workshop, co-hosted with DIA.
The workshop brings U.S. and Commonwealth defense-focused intelligence agencies together with academia and external training organizations to share best analytic practices, forge relationships and hear presentations on key national security topics.
Corbett began by explaining his position at DIA, which marks the first time a non-U.S. citizen has held a deputy director appointment at a U.S. intelligence agency. He highlighted his primary role as DIA Director Lt. Gen. Vincent Stewart's senior advisor on FVEY defense and intelligence issues.
As the first DDCI, a significant part of the job isn't just answering "the what" and "the why," but figuring out "the how." While that involves everything from technology to policy, Corbett focused on education and training.
"We are looking at developing the next generation of intelligence professionals, so I'm honored to be here," Corbett said, adding that academia may have a role in helping to develop a common view among FVEY partners on how intelligence professionals train.
The final question of the session came from a student who asked what skills students should develop to become good intelligence practitioners.
First and foremost, Corbett said, is know your subject, and know how to go into the second and third level of analysis. Next, know your audience; know how to present what you know in a way that succinctly answers the question.
Finally, "Have the moral courage to say when you don't know or when you're wrong," Corbett said. "If we lose that, we're absolutely nothing. That's what we do in the IC."
Bin Laden's Bookshelf: Millions for Jihad, Rifts with al-Qa'ida in Iraq, and Planning for a 9/11 Tenth Anniversary Media BlitzODNI
March 1, 2016
Osama bin Laden's handwritten will left millions for jihad. But even in the period shortly before his death, bin Laden placed the utmost importance on portraying his fraying organization as a united enterprise — while his lieutenants privately wrestled with their growing schism from al- Qa'ida in Iraq.
As the tenth anniversary of the 9/11 attacks approached, bin Laden envisioned a worldwide media campaign, suggesting his media team work with specific news outlets.
This emergent portrait of bin Laden comes together today via documents from the Office of the Director of National Intelligence released in the second batch of media recovered during the 2011 raid in Abbottabad, Pakistan, at the compound used to hide Osama bin Laden.
The release aligns with the president's call for increased transparency—consistent with national security prerogatives—and the 2014 Intelligence Authorization Act, which required the ODNI to conduct a review of the documents for release.
Beginning last summer and with DNI approval, the CIA spearheaded a rigorous interagency review of the classified documents under the auspices of the White House's National Security Council staff. Representatives from seven agencies combed through the documents —with the goals of increasing transparency and responding to the congressionally directed action.
"It's important that the documents collected at bin Laden's compound be made available to the public. This was no easy feat as members of the task force dedicated themselves over a long period of time working in an Intelligence Community facility to review and declassify as many documents as possible," said Brian Hale, ODNI Director of Public Affairs.
Given the large number of documents to review, and the increasing public demand to see them, the White House asked ODNI to declassify and release the documents as they were ready. This is the second tranche to be released. The first tranche was released May 20, 2015. This initial posting contained two sections, a list of non-classified, English-language material found in and around the compound and a selection of now-declassified documents.
Those documents, as well as the additional declassified material released today, reflect on a range of topics, including reporting fissures between AQ and AQ in Iraq and bin Laden's concern about AQ's public image—and his desire to depict AQ as a united organization.
Since the first release, the Intelligence Community has reviewed hundreds of additional documents for possible declassification and release. The document-review process can be time consuming because—once a document is declassified—it cannot be reclassified. The IC needs to ensure no declassified document will directly injure efforts to keep the nation secure. With that in mind, the review is ongoing, with the next release expected later this year.
ODNI & DOJ Announce the Release of a Previously Classified Letter from Former Deputy Assistant Attorney General Yoo to former FISC Presiding Judge Kollar-KotellyODNI
Febuary 29, 2016
The Department of Justice has released today in redacted form a previously classified 2002 letter from former Deputy Assistant Attorney General John Yoo of the DOJ Office of Legal Counsel addressed to former Foreign Intelligence Surveillance Court Presiding Judge, Colleen Kollar-Kotelly.
* The letter is available for use with Adobe Acrobat Reader. The latest, free version of Acrobat Reader is available for download at Adobe.
The letter was designed to address certain questions that Judge Kollar-Kotelly raised during her first briefing on May 17, 2002, concerning certain collection activities authorized by President George W. Bush shortly after the attacks of September 11, 2001, referred to as the President's Surveillance Program. As described in the publicly released Inspectors General reports concerning the PSP dated July 10, 2009 (published April 25, 2015 and September 21, 2015), Judge Kollar-Kotelly was permitted to read the letter, but was not authorized to retain a copy or take notes. The 2002 letter purports to generally outline the scope of the President's legal authority to conduct possible electronic surveillance techniques after the attacks of September 11, 2001. Beginning in 2004, the Department of Justice thoroughly reexamined the factual underpinnings and legal analysis for the PSP culminating in a legal opinion issued by the Office of Legal Counsel on May 6, 2004. (That opinion is also publicly available in redacted form)
As previously released in the IC on the Record posting of December 21, 2013, President Bush authorized the NSA, via a series of classified authorizations beginning in October 2001, to collect three "baskets" of information, including: (1) the contents of certain international communications (which was later referred to as the Terrorist Surveillance Program); and the bulk collection of non-content (2) telephony and (3) Internet metadata, subject to various conditions. NSA's content interception activities under the TSP were limited to the acquisition of specific international communication (i.e., to or from the United States) involving persons reasonably believed to be associated with al Qaeda and affiliated terrorist organizations. Over time, these presidentially authorized activities were transitioned to the authority of the Foreign Intelligence Surveillance Act. The collection of communications pursuant to the TSP ended in 2007, and the Government transitioned this collection to be undertaken pursuant to FISA authority and orders of the Foreign Intelligence Surveillance Court. Later, in August 2007, Congress enacted the Protect America Act as temporary authority to provide for the acquisition of certain communication content. The PAA, which expired in February 2008, was replaced by the FISA Amendments Act of 2008, which was enacted in July 2008 and remains in effect.
Today, content collection targeting non-U.S. persons reasonably believed to be located overseas for foreign intelligence purposes is conducted pursuant to section 702 of FISA. No U.S. person or person located in the United States may be intentionally targeted pursuant to section 702. The bulk collection of Internet metadata under the PSP was transitioned to the authority of the FISA in July 2004 (and ceased in December 2011, when the U.S. Government decided to not seek reauthorization from the FISC). The bulk collection of telephony metadata under the PSP was transitioned to the authority of the FISA in May 2006. In November 2015, the USA FREEDOM Act ended the NSA's collection of telephone metadata in bulk, and provided a new mechanism for the government to obtain the targeted production of call detail records relating to authorized investigations to protect against international terrorism through applications to the FISC.
The transition of PSP activities to authority of the FISA is described in greater and more specific detail in documents previously disclosed in IC on the Record.
Senator Mark Warner Holds Town Hall with DIA Workforce in Charlottesville, Va.DIA
Febuary 26, 2016
Virginia Senator Mark Warner met with Rivanna Station senior leadership, including representatives from the National Ground Intelligence Center (NGIC) and the National Geospatial-Intelligence Agency (NGA), for an overview brief of the intelligence campus.
The discussion highlighted the history of base realignment and closure (BRAC) legislation directing the relocation of DIA personnel to Charlottesville, Va., which has evolved into a microcosm of the Intelligence Community with unique mission sets and capabilities to support intelligence customers from the tactical to national level. NGIC highlighted their employees at Rivanna Station who serve as the DoD center for all analysis of foreign ground forces.
After the senior discussion, subject matter experts briefed Warner about analysis of current topics. On the way to a town hall for the Rivanna Station workforce hosted at NGIC, Warner was treated to a short bus tour of the campus, which gave him the opportunity to see the newly opened Child Development Center that can host approximately 100 children and a staff of 40 individuals hired from the local community.
Warner concluded his visit by taking questions from the workforce on a wide variety of topics such as what the IC can do to better support members of Congress, political polarization and his thoughts on the presidential primaries.
"As members of the Intelligence Community, you are essential in keeping our world safe in a complex and changing landscape," Warner said. "I thank you for your service and for providing me with the insight into what you do here; I have an 80 percent better knowledge about what you do than I did an hour ago."
Warner also expressed his commitment to supporting the Intelligence Community. "This is your country, it's not the politicians," he said. "We're here to serve you."
GEOINT Pathfinder Project Yields New Open Source Coding Projects Available to PublicNGA
Febuary 22, 2016
SPRINGFIELD, Va. — The National Geospatial-Intelligence Agency's unclassified project, GEOINT Pathfinder, recently released eight open source coding projects on the code-sharing repository site, GitHub.
Two of the coding projects released include a social media picture explorer which uses machine-learning techniques to cluster similar images. The projects also provide automatic object recognition and an updated WordPress theme, which allow for interactively displayed post revisions.
"Transparent source code with strong documentation speaks clearly to industry and academia about what NGA is working on and how to get involved," said Chris Rasmussen, NGA's public software development and GEOINT Pathfinder lead.
In August 2015, NGA launched the GEOINT Pathfinder project to help the agency navigate the competitive world of commercialized geospatial intelligence, operating at an unclassified, off-premises and telework-friendly environment. The project is aimed at answering four research questions using only unclassified tools, data, information technology and services available in the commercial and open source world.
The GEOINT Pathfinder project adopted a software philosophy to use open source software as the first resort, said Rasmussen.
"Commercial software was purchased and used only after a thorough evaluation of what's available in the open source world," said Rasmussen. "If the commercial software truly out-performed open source then we bought what was needed."
The benefit of open sourcing software extends beyond free contributions or coding updates.
"Taking an accounting view of open source can often drown out less quantitative measures such as bringing on new partners that traditionally haven't done business with the government," said Rasmussen.
Open sourcing code back to the public is also the right thing to do, he said.
"Pathfinder's after action report recommends that all code be considered for public release when the government obtains 'unlimited rights,' because taxpayers paid for the code in the first place," said Rasmussen.
Commit, push and explore any of the National Geospatial-Intelligence Agency's open source projects at: https://github.com/ngageoint
DNI Clapper Statement on the Appointment of Daniel Payne as the Director of the Defense Security ServiceODNI
Febuary 19, 2016
Dan is an excellent choice for DSS Director. He began his counterintelligence career as a DSS Special Agent, and this appointment brings his career full circle. His extensive experience with counterintelligence and security matters is unparalleled.
At ODNI, he has expanded his perspective across the national security structure as deputy director of the National Counterintelligence and Security Center, making him uniquely prepared to move into this critical national security leadership position. Dan is another example of ODNI veterans going on to senior executive positions in service to our nation.
I congratulate Dan on his appointment, and I look forward to working with him and the men and women of DSS in support of our shared mission to protect the nation.
— James R. Clapper, Director of National Intelligence
African-American History Month: A Time to Reflect on Lasting Leadership ContributionsNGA
Febuary 10, 2016
Americans have come together to celebrate African-American history every February since 1926, educating the public about the contributions of African Americans both past and the present.
African-American history is embedded in the narrative of American history, as well as the history of NGA and predecessor organizations. Mapping pioneers like Paul L. Peeler Jr. and William "Bill" J. Brown made countless contributions to NGA predecessor organizations, but they were also individual inspirations for change and equality within the organization.
Paul Peeler was the first African-American and the first civilian to serve as the director of the Defense Mapping Agency Reston Center. He was responsible for oversight of testing and approving the first all-digital production systems. Peeler was instrumental in leading the transformation from manual production methods to digital production. Joining the Army Map Service, predecessor to DMA, in 1961 as a geodesist, Peeler held a number of prominent positions before his retirement in 1996.
Bill Brown was the first African-American director of the Defense Mapping Agency Aerospace Center in St. Louis. He began his federal career in 1962 as a cartographer for the Air Force Aeronautical Chart and Information Center, a predecessor organization to DMA. He rose from cartographer, to supervisor, to administrator, to take DMA into the 21st century. Starting as a paper boy, Brown ended up attending Kansas State University where he was one of six black students out of 25,000. A conference room in St. Louis was named in his honor, and is used today for special events, award ceremonies and workforce town halls.
Both Peeler and Brown made NGA predecessor organizations their career, changing assignments back and forth from Washington to St. Louis. Peeler and Brown's lasting contributions and examples of leadership are honored through today's continued commitment to the GEOINT tradecraft, and the fight for equality through workforce diversity and inclusion at NGA.
In 1976, President Gerald Ford issued the first African American History Month proclamation, calling upon the American people to celebrate the event each February. President Obama, in his 2013 African American History Month proclamation said, "This dream of equality and fairness has never come easily — but it has always been sustained by the belief that in America, change is possible. Today, because of that hope, coupled with the hard and painstaking labor of Americans sung and unsung, we live in a moment when the dream of equal opportunity is within reach for people of every color and creed."
PSU Student Partners Visit Agency, Demonstrate Analytic ProwessNGA
Febuary 10, 2016
Imagine an occasion where university students get the chance to brief the director of an intelligence agency on a matter of national security.
Students from a Penn State University intelligence analytic group had that opportunity when they visited the National Geospatial-Intelligence Agency's headquarters in Springfield, Va., Jan. 29 to tour the facility and brief Director Robert Cardillo on their current projects.
A group of nine students, led by the team's student director, Penn State senior Meghan Graham, briefed results of past projects and gave updates on current studies to Cardillo and NGA's chief of staff, Ed Mornston.
The students dissect real-world scenarios ranging from stadium security to airliner disappearances, then develop solutions to the problems.
Using a military approach of "red teaming" to solve non-military problems, students run test scenarios to challenge the effectiveness of an organization and offer solutions to strengthen capabilities. The team views the problems through the lens of the enemy. The students work with local law enforcement and the university to test friendly courses of action and create resolutions.
"We're the only students you'll find solving real-world problems, right now," said Graham. "We're training the next generation analyst."
The Red Cell Analytics Lab is made up of a team of Penn State students, majoring in security risk and analysis, said Jake Graham, Penn State professor of practice, RCAL team advisor and Meghan's father. The lab grew out of student interest and desire to gain experience in the analytics process beyond the classroom. The organization started with six students, and its membership has grown to more than 200 students and alumni.
Students in the lab have examined issues ranging from student life and campus threats to national security and maritime disasters, said Jake Graham. Its members comprise diverse academic backgrounds in engineering, security administration and communications, and even includes a student who is the long snapper for the Penn State football team. Cardillo commended the students for their work, specifically their use of open source data and unclassified information for their research.
"More of our future engagement will be in the open," said Cardillo. "You are part of the untapped potential."
NGA and Penn State signed a Cooperative Research and Development Agreement (CRADA) in 2011, marking the first NGA partnership with an academic institution. In October, Cardillo visited the lab at Penn State, resigned the CRADA and invited the students and their advisors to visit NGA. The visit was an opportunity to foster the relationship with one of NGA's biggest academic partners.
"The NGA leadership bring an informed perspective and can provide feedback on our work," said Meghan Graham. "We are very fortunate to have the opportunity to continue building a partnership with NGA.
Cryptologic History SymposiumNSA
Febuary 10, 2016
The next Cryptologic History Symposium will be on Oct. 19-20, 2017 at the Kossiakoff Conference Center at the John Hopkins Applied Physics Lab in Laurel, Maryland. Additional information about the call for papers and the Symposium will be available the fall of 2016. Questions about the 2017 Symposium before then can be sent to us via our online form.
DNI Releases Budget Figure for FY2017 Appropriations Requested for the National Intelligence ProgramODNI
Feb. 9, 2016
Consistent with Section 601 of the Implementing the Recommendations of the 9/11 Commission Act of 2007, as amended (50 U.S.C. 3306), the Director of National Intelligence is disclosing to the public the aggregate amount of appropriations requested for Fiscal Year 2017.
The aggregate amount of appropriations requested for the FY 2017 National Intelligence Program is $53.5 billion, which includes funding requested to support Overseas Contingency Operations.
Any and all subsidiary information concerning the NIP budget, whether the information concerns particular intelligence agencies or particular intelligence programs, will not be disclosed. Beyond the disclosure of the NIP top-line figure, there will be no other disclosures of currently classified NIP budget information because such disclosures could harm national security. The only exceptions to the foregoing are for unclassified appropriations, such as for the Intelligence Community Management Account.
* The fact sheet is available for use with Adobe Acrobat Reader. The latest, free version of Acrobat Reader is available for download at Adobe.
Amidst a Blizzard, NGA Workforce Maintains Facilities, Mission SupportNGA
Febuary 9, 2016
If you thought clearing your driveway during last week's snowstorm was bad, try clearing nearly 1.2 million cubic feet of snow and ice. That's enough to fill more than 13 Olympic-size swimming pools.
National Geospatial-Intelligence Agency employees at the Springfield, Va., campus with support from NGA's West locations, worked around the clock Jan. 22 to Jan. 26 to clear snow, maintain building structural integrity and ensure there was no lapse in mission-critical support.
From the initial weather reports produced by the agency's Meteorological Operations Center to the decision to return to normal operations, many employees were involved in efforts to ensure the safety and security of the workforce, visitors and facilities during the duration of the storm.
Don Kerr, an NGA spokesperson, credited exceptional emergency management preparedness, use of plans developed by the Key Components (KC), and good communication for the success during the snowstorm.
Although 24-hour watches and creating continuity plans are normal courses of activity for the NGA Operations Center, a historic snowstorm can throw a wrench in even the most structured plans.
"Using lessons from past exercises, allowed us to maintain the mission at a capacity that was acceptable," said Kerr. "Preparation, exploring possible outcomes, and knowing our options has made us much more resilient for this type of situation."
In anticipation of the storm, several NOC officers and technicians packed their 'go-bags' and cots, drove in, and worked through four day and night shifts. According to Jason Long, NOC deputy chief of operations, NGA employees in St. Louis, Mo., and Denver, Colo., provided overtime support to supplement the NOC Watch in the East.
Long commended the "heroic efforts" of the employees.
"Winter Storm Jonas resulted in extraordinary actions from individuals to execute our day-in and day-out 'business as usual'," said Long.
Across the agency, several KCs and directorates were also involved in executing mission-essential tasks.
The NOC Enterprise and the Security and Installations (SI) directorate prepared and maintained site readiness by coordinating across the agency to ensure snow and ice removal, addressing shipping and receiving requirements and impacts, and overseeing facility infrastructure operations. The Enterprise Service Center certified all IT services were functioning.
Police Operations Commander for NCE Maj. Dionyeus Britt said dozens of police officers worked through the snowstorm, most choosing to stay onsite during the 72 hours. Sodexo food service provided meals for those who decided to stay and weather the storm.
SI noted that, post-snowfall, employees worked to clear the more than two feet of snow and ice from the roads and parking garage, executed personnel accountability checks, examined the building for leaks, monitored IT impacts and expediently worked to reconstitute the workforce and return to normal operations.
"Even though the recent storm resulted in more than two feet of snow, everyone involved allowed for minimal to no impact to both the mission and the facilities." said Kerr. "They support missions that simply cannot be interrupted."
Celebrating the 75th Anniversary of a Key U.S. Visit to Bletchley ParkNSA
Febuary 8, 2016
The world's most important signals-intelligence liaison relationship – between the United States and the United Kingdom – began 75 years ago at Bletchley Park, the central site for Great Britain's codebreakers during World War II. The relationship became a practical reality on Feb. 8, 1941, with a visit by American personnel.
In 1946, the United Kingdom and the United States formally renewed their agreement to share signals intelligence. The agreement became the foundation of the Cold War intelligence alliance.
The relationship has continued unbroken to this day, allowing the countries to work together against common national security challenges.
Senator Warner Talks Innovation, Commercial Technology with NGA EmployeesNGA
Febuary 5, 2016
U.S. Sen. Mark Warner of Virginia encouraged innovation, commercial technology and pushing the current boundaries of how the government does business during a visit Feb. 1 to the National Geospatial-Intelligence Agency headquarters at North Fort Belvoir in Springfield, Va.
Warner has spent the last five years of his seven-year tenure in the Senate on the Select Committee on Intelligence. During this assignment, he became familiar with the Intelligence Community and NGA's role to provide geospatial intelligence in support of the Department of Defense, he said.
"The mission of NGA has never been more important," said Warner in his second visit to the agency since 2013.
According to Warner, NGA's mission is only going to grow in terms of mapping and the ability to notice change and monitor potential adversaries around the world.
Warner's visit came as NGA Director Robert Cardillo has encouraged more transparency and an increased use of innovative and unclassified solutions to address national security challenges. Warner echoed this sentiment, saying he wants to constantly "nudge" the agency and its workforce to think broadly.
Specifically, Warner recommended innovative thinking about the use of commercial technology, noting the growing acknowledgement from NGA's leadership about better use of commercial technologies
"I think there is going to be a remarkable transformation," Warner said. "I couldn't believe as somebody who's been an observer of this sector just over the last three to five years, the enormous kind of upsurge of capability on the commercial side and how we use that in a more effective manner."
The more work the Intelligence Community can do in the unclassified space, the better, Warner said. "That gives us the capability to engage with a broader set of individuals," he said.
Target USA: DNI Clapper Reveals Unprecedented Threats Facing U.S.ODNI
Febuary 1, 2016
WASHINGTON —For more than 50 years as a military officer and in the U.S. government, James R. Clapper has been getting up early each day to look for the breadcrumbs that the nation's adversaries and enemies leave behind. His job has been to collect the dots, connect them and report what he's learned.
As the director of national intelligence, he reports directly to President Barack Obama. What he's telling the president is increasingly disturbing.
"In my 50-plus years in intelligence, I don't know if we've been beset by a more diverse array of challenges and crises around the world," said Clapper in an exclusive interview with WTOP conducted in December.
ODNI Releases Third Video in a Series in the Wake of the OPM Records BreachODNI
January 19, 2016
Today, the ODNI's National Counterintelligence and Security Center released the third in a five-part series of videos from its "Know the Risk—Raise Your Shield" campaign.
The latest campaign video, which is just more than five minutes long, focuses on how foreign intelligence entities conduct human targeting. It is intended to raise public awareness that anyone with access to sensitive public or private information—whether classified or unclassified—is a potential target of foreign intelligence entities. The video provides details about human targeting, how government officials or the public can recognize if they are being targeted and what steps can be taken to minimize the risk of becoming a victim.
"You don't have to work for the CIA or have access to the most prized information for you to be a target," said Bill Evanina, Director of NCSC. "Oftentimes they go for people with access to information that is more germane to their nation's needs."
The NCSC launched the campaign last September in the wake of the Office of Personnel Management records breach to help those individuals, government or otherwise, whose personal information has been compromised. The first and second set of videos focused on spear phishing attacks and social media deception, respectively, while the final videos—to be released in February and March—will focus on awareness for travelers and social engineering. The first two releases contain a 30-45-second overview video and a more in-depth two minute video.
The NCSC provides effective leadership and support to the counterintelligence and security activities of the U.S. Intelligence Community, the U.S. government and U.S. private sector entities who are at risk of intelligence collection or attack by foreign adversaries.
To see the video and for information on the third release, please see the following links:
Poster: Human Targeting
For additional information on the campaign, go to ncsc.gov or dni.gov
NSA Releases USA FREEDOM Act Transparency ReportNSA
January 14, 2016
The National Security Agency announced today the public release of its new report on the implementation of the USA FREEDOM Act, along with specific procedures – adopted by the U.S. Attorney General and approved by the Foreign Intelligence Surveillance Court – that are designed to protect privacy rights. NSA's Civil Liberties and Privacy Office conducted a civil liberties and privacy impact assessment to examine how NSA is implementing the new law.
Publication of the report supports the Principles of Intelligence Transparency for the Intelligence Community and underscores NSA's commitment to ensuring that privacy protections are integrated into the Agency's operations and procedures.
To read the report, please visit the Civil Liberties and Privacy Reports page NSA.gov.
DNI Clapper Announces Leadership of Cyber Threat Intelligence Integration CenterODNI
Jan. 7, 2016
Director of National Intelligence James R. Clapper today announced the leadership of the Cyber Threat Intelligence Integration Center (CTIIC). Director Tonya Ugoretz will lead the center, with Deputy Maurice (Mo) Bland and Research Director Thomas (Tom) Donahue rounding out the leadership team.
Last February, President Obama signed a Presidential Memorandum directing the DNI to establish the CTIIC, which received congressional authorization and funding in the December omnibus bill.
CTIIC will fuse intelligence and "connect the dots" regarding malicious foreign cyber threats to the nation so that relevant departments and agencies and policymakers are aware of these threats in as close to real time as possible.
"CTIIC will lead integrated community analysis of our cyber adversaries and support interagency efforts to develop whole-of-government opportunities against cyber threats," Director Clapper said. "It will build understanding of cyber threats to inform government-wide decision-making."
Similar to ODNI's other mission centers—such as the National Counterproliferation Center and the National Counterintelligence and Security Center—CTIIC integrates an interagency team singularly focused on its core missions, including: providing integrated all-source analysis of foreign cyber threats and cyber incidents affecting U.S. national interests; helping ensure that the U.S. government has access to the latest integrated intelligence on cyber threats; and facilitating and supporting efforts by the government to counter these foreign cyber threats.
CTIIC will assume its role as a cornerstone of the government's cybersecurity capabilities by allowing the government to unify intelligence in support of network defense and law enforcement efforts to better address the most pressing cyber threats to our nation in support of the Administration's strategic cybersecurity goals of raising our cyber defenses, disrupting adversary activity, and effectively responding to cyber incidents.
"I am confident this capable team will work seamlessly with intelligence community and federal partners to integrate intelligence on foreign cyber threat capabilities and activities, and I look forward to working with them over the coming year," Director Clapper said.