Why despite the reform activities in the process are taking longer in fiscal year 2015 is an average of 95 days to process the secret clearance and 179 days for the secret clearance. In 2016, it took an average of 166 days to process and 246 for the topsecret clearance. Thats quite a job in the timeline it takes to get there. More than a decade ago that processes were transferred from the department of defense and now there is talk of transferring the process back to the department of defense. We also have the newly created the opm and the dod have a shared responsibility to make sure we stop moving the organizational boxes around as we transition, we need to talk about the efficiency and make sure at the end of the day we are protecting and securing the United States of america. Theres a tremendous amount of people that are working on these issues. We will have additional hearings and discuss that. I personally believe and i would like to draw this out, attracting and retaining the pr
Why despite the reform activities in the process are taking longer in fiscal year 2015 is an average of 95 days to process the secret clearance and 179 days for the secret clearance. In 2016, it took an average of 166 days to process and 246 for the topsecret clearance. Thats quite a job in the timeline it takes to get there. More than a decade ago that processes were transferred from the department of defense and now there is talk of transferring the process back to the department of defense. We also have the newly created the opm and the dod have a shared responsibility to make sure we stop moving the organizational boxes around as we transition, we need to talk about the efficiency and make sure at the end of the day we are protecting and securing the United States of america. Theres a tremendous amount of people that are working on these issues. We will have additional hearings and discuss that. I personally believe and i would like to draw this out, attracting and retaining the pr
Efficiency of federal employee background checks. The Oversight Reform Committee questioned office and management of budget officials to protect federal employees personal information. This hearing is about 2. 5 hours. Committee on oversight government reform will come to order and without objection, the chair is authorized to declare a recess at any time. Appreciate you all being here. We have very important hearing. We have a number of members that im sure will be here, but it will be late. There is the National Prayer breakfast and getting across town at this point of the day is a difficult task. Nevertheless, glad to have you here and look forward to this important hearing. Two years ago, the office of Personnel Management suffered one of the most damaging data breaches in the history of the federal government. This went on for some time and we still, there are still Additional Details that need to be learned. But the counterintelligence value of the data that was stolen will last
Last question. The three roles of u. S. Cybercom, one is specifically to look after the security of dod networks, the other two being to support commanders and the third which is in some ways the most difficult and challenging is to defend the nation and how that engages. So cybercom has that responsibility, i think, the challenge if it were to arise would be a lot of the intelligence that Cyber Command needs to do its work comes from the nsa side, and splitting the two out would be highly inefficient. That inefficiency may be worthwhile in the long run, but in the short term i think the judgment is the benefits are not, do not justify that inefficiency. General sort of wrapup comment, i think what has not been commented on too much, but is also worth getting on the record is, one, the interesting aspect of this speech is president obama directly confronting the National Aspects of this which havent been part of the administrations presentation to date. So when you have a dni sitting i
KINY Juneau, Alaska (KINY) - The Alaska Department of Health and Social Services continues to work with authorities to perform an analysis of the cyber attack identified on May 17, while also further strengthening systems and restoring services.
According to Alaska Native News, The Departments Information Technology team is working through a multi-step process in response to the cyberattack which provides for Detection and analysis, Containment, eradication, recovery, and Post-incident activity.
A timeframe for full restoration of online services is still unavailable and won’t be known until the complete scope of the attack and all its impacts are fully understood.