Weekly Insider
In This Issue: January 13th, 2013
CBPInsight:  Outlook on CBP 2014 - Nearly SOLD OUT

Join the Government Technology & Services Coalition to hear about the outlook for Customs & Border Protection, U.S. Department of Homeland Security.  Speakers will discuss the agency's budget, programming and mission priorities for 2014.

(There are very few seats remaining for this meeting.)

 

AGENDA

An Overview of the CBP Budget

Michelle Mrdeza, Strategic Advisor, GTSC and Senior Advisor, Cornerstone Government Affairs 

 

CBP Program Specific Discussion

Moderator:  David P. Cohen, Attorney, Brownstein Hyatt Farber Schreck

DISCUSSANTS: 

Valerie Isbell
Director, Passenger Systems Program Office

Sonia Padilla 
Executive Director Program Management Office 
Office of Technology Innovation & Acquisition

Sara Schroerlucke 
Program Manager, ACE

Guy Torres 
Director, IT Contracting

 

REGISTER

 

robertcarreyInsight with Robert Carey, Principal Deputy CIO, DOD

Robert Carey

Join us on Friday, January 17th, from 9:15 - 11:30 am, at CENTRA Technology in Ballston, Virginia, for a conversation about the U.S. Department of Defense's 2014 information technology budget, priorities, and challenges. Mr. Robert J. Carey will discuss DOD's IT modernization, cyber security threats, and how the Department is engaging disruptive technologies despite budget challenges.

 

Mr. Robert J. Carey serves as the Department of Defense Principal Deputy Chief Information Officer. Selected to this position in October 2010, his main focus is to help lead the consolidation and standardization of the Defense information technology enterprise while strengthening its cybersecurity posture and the enterprise architecture. His additional focus is to align, strengthen, and manage the office of the DoD Chief Information Officer to have it better serve the Department's mission and help lead the IT/Cyber workforce into the 21st century.

REGISTER

 

insiderthreatsInsider Threat Programs:  5 Easy Steps to Protect Your Company

By Contributing Blog Author Katherine D. Mills, CSO, Security Director, CENTRA Technology, Inc.

 

The insider threat is a real concern across government and industry and, unfortunately, we continue to see significant evidence of the damage incurred by malicious insiders, such as Edward Snowden and Bradley Manning. In the next few years, we will see changes to Government policy, including the National Industrial Security Program Operating Manual (NISPOM) to ensure we are properly protecting national security information and corporate assets.

 

Since the mere thought of how to create an insider threat plan can be overwhelming, the following five steps are intended to help you put things into perspective as you begin to develop and document your corporate plan.

Step 1: Identify the Team 

Assemble a team who can make decisions, change policies and understand the importance of the issues. It is critical the team has a solid understanding of your overall business and your corporate assets.

 

Step 2: Conduct a Risk Assessment

One of the best ways to protect your company is to fully understand your assets and ensure you are taking the appropriate steps to secure them.  Not every asset needs the highest levels of protection.

 

Step 3: Tighten Up Procedures/Policies

Ideally, the insider threat team will work together to strengthen the procedures, gather feedback, implement changes, and document the new policies as part of the plan.

 

>>READ the entire article, which includes a list of online resources, on GTSC's blog.

personalinfobreachGAO Calls for More Consistent Response by Agencies to Breaches of Personal Info
Although federal agencies have taken steps to protect PII, breaches continue to occur on a regular basis. In fiscal year 2012, agencies reported 22,156 data breaches--an increase of 111 percent from incidents reported in 2009.  The eight federal agencies GAO reviewed generally developed, but inconsistently implemented, policies and procedures for responding to a data breach involving personally identifiable information (PII) that addressed key practices specified by the Office of Management and Budget (OMB) and the National Institute of Standards and Technology. The agencies reviewed generally addressed key management and operational practices in their policies and procedures, although three agencies had not fully addressed all key practices.  GAO made 23 recommendations to OMB to update its guidance on federal agencies' response to a data breach and to specific agencies to improve their response to data breaches involving PII. Read all the recommendations here.
DHSvehiclesMore Oversight Needed for Employee Use of DHS Vehicle Fleet
With one of the largest motor vehicle fleets in the Federal Government--over 56,000 vehicles costing approximately $534 million annually--the Department of Homeland Security's Office of the Inspector General (OIG) recently conducted an audit  to determine whether DHS has been implementing appropriate internal controls to ensure that home-to-work transportation is justified and used efficiently.
 
The audit revealed that the reviewed DHS components "do not adequately monitor and provide oversight of home-to-work transportation to ensure that the components are complying with department guidance and consistently gathering timely, accurate information on eligibility and authorization, vehicle use, and the number of participants."  The OIG made five recommendations to DHS:
  • Strengthen the DHS Manual 112-05-001 Home-to-Work Transportation with clear definitions and guidelines for eligibility and guidance for periodic reauthorization of all approved home-to-work authorizations;
  • Implement policies to ensure components collect reliable information necessary to track, monitor, analyze, and report on home-to-work transportation use and costs;
  • Enforce the DHS Manual 112-05-001 Home-to-Work Transportation annual reporting requirements;
  • Perform a thorough assessment of the home-to-work transportation program annually to track recommendations;
  • Implement a centralized, department-wide, home-to-work data system, accessible by headquarters and component personnel, to collect, track, and monitor home-to-work transportation-related information, such as authorizations, costs, vehicle use, and number of users.
 Read the full report here.
bordersecurityBorder Security: DHS's Efforts to Modernize Key Enforcement Systems Could be Strengthened
TECS (not an anagram) is DHS's primary border system for determining the admissibility of persons to the United States. TECS is used to prevent terrorism and provide border security and law enforcement, case management, and intelligence functions for multiple federal, state, and local agencies. Due to "technology obsolescence and its inability to support new mission requirements," TECS has become difficult and expensive to upkeep and maintain. This being the case, DHS started to modernize the system in 2008; this modernization is being managed "two separate programs working in parallel by CBP and ICE."

GAO has recommended that "DHS improve its efforts to manage requirement and risk, as well as its governance of the TECS Mod programs." GAO recommended that CBP:   
  • ensure that the appropriate individuals develop an integrated master schedule that accurately reflects all of the program's work activities, as well as the timing, sequencing, and dependencies between them;
  • ensure that all significant risks associated with the TECS Mod acquisition are documented in the program's risk and issue inventory inventory--including acquisition risks mentioned in this report report-- and are briefed to senior management, as appropriate;
  • revise and implement the TECS Mod program's risk management strategy and guidance to include clear thresholds for when to escalate risks to senior management, and implement as appropriate;
  • revise and implement the TECS Mod program's requirements management guidance to include the validation of requirements to ensure that each is unique, unambiguous, and testable;
  • ensure that all significant risks associated with the TECS Mod acquisition are documented in the program's risk and issue inventory--including the acquisition risks mentioned in this report-- and briefed to senior management, as appropriate;
  • revise and implement the TECS Mod program's risk management strategy and guidance to include clear thresholds for when to escalate risks to senior management, and implement as appropriate;
  • ensure that the newly developed requirements management guidance and recently revised guidance for controlling changes to requirements are fully implemented; and
  • ensure that data used by the department's governance and oversight bodies to assess the progress and performance of major information technology program acquisition programs are complete, timely, and accurate.

 Read the full report here

armyGAO Recommends Army Improve Stationing Process
As part of its plan to reduce its active duty force by 80,000 personnel by 2017, the Army will be inactivating 10 BCTs currently stationed in the United States and reorganizing the remaining BCTs. The Army conducted analyses of different stationing options, which included the use of its military value analysis model to compare installations based on their ability to support BCTs. GAO was asked to review the decision making process the Army used for its BCT stationing decision, including its military value analysis model.   

The Army expects to continue using its military value analysis model for major stationing decisions and has taken steps to validate the model, but has not established guidance and consistent formal processes related to its use, including when the model should be used or how it should be reviewed, updated, and approved.  Army officials said that the model has generally been used for large-impact stationing decisions and may not be appropriate for minor decisions. However, the Army's stationing regulation does not discuss the model or provide guidance on the circumstances when the model should be used.  GAO recommended that the Army develop and implement guidance related to when community input should be obtained for stationing decisions, and related to the use of its military value analysis model, such as when it should be used, the level of approval required for changes to the model, and how certain training areas should be considered, as well as processes for updating and reviewing the model. 

 

Read all the recommendations and the full report here. 

mentorAppreciate YOUR mentor?  Nominate them today!

The Government Technology & Services Coalition and Government Contracting Weekly have partnered to recognize exceptional mentors in the government contracting community.  

 

"The Mentors" awards program recognizes and salutes government contractors for their leadership and concrete actions in assisting small government contracting firms through mentoring, training, inspiration, teaming and cooperation.  Large firms that mentor small companies play a critical role in saving their Federal clients money and time, commit to putting action behind the mantra of bringing "innovation and creativity" to the Federal mission and bring a higher level of professionalism to the contracting community.  Join us and nominate your mentor today!


FDAFDA Strategies to Protect Food Against Terrorism

Photo: ERIC RISBERG/AP
The Food and Drug Administration has proposed a requirement on domestic and foreign food facilities that are required to register under the Federal Food, Drug, and Cosmetic (FD&C) Act to address hazards and situations that may be intentionally introduced by acts of terrorism. These facilities would be required to create and implement focused mitigation strategies to minimize and prevent terrorists from exploiting vulnerabilities. The proposal is part of the FDA's implementation of the Food Safety Modernization Act (FSMA).


The proposed rule's intent is to establish various food defense measures would require an owner, operator, or agent in charge of a facility to protect against adulteration of food, specifically:
  • Prepare and implement a written food defense plan that includes actionable process steps, focused mitigation strategies, and procedures for monitoring, corrective actions, and verification
  • Identify any actionable process steps
  • Identify and implement focused mitigation strategies at each actionable process step to provide assurances that the significant vulnerability at each step will be significantly minimized or prevented, and the food manufactured, processed, packed, or held by the facility will not be adulterated
  • Establish and implement procedures, including the frequency with which they are to be performed, for monitoring the focused mitigation strategies
  • Establish and implement corrective action procedures that must be taken if focused mitigation strategies are not properly implemented
  • Verify that monitoring is being being conducted and appropriate decisions about corrective actions are being made; verify that the focused mitigation strategies are consistently implemented and are effectively and significantly minimizing or preventing the vulnerabilities; and conduct a reanalysis of the food defense plan
  • Ensure that personnel and supervisors assigned to actionable process steps receive appropriate training in food defense awareness and their respective responsibilities in implementing focused mitigation strategies
  • Establish and maintain certain records, include the written food defense plan; written identification of actionable process steps and the assessment leading to that identification; written focused mitigation strategies; written procedures for monitoring, corrective actions, and verification; and documentation related to training of personnel
Read the entire proposed rule here.
ICAnalystODNI & DHS Invite Applications for IC Analysts

The IC Analyst-Private Sector Program allows for intelligence community analysts and their private sector partners to gain a better understanding of how their differing, yet complimentary, roles can work in parallel to ensure mission success. Selected participants work on topic-focused teams for six months to create product that will interest both the U.S. Government and the private sector.  The Department of Homeland Security and the Office of the Director of National Intelligence invites and encourage private sector partners who are U.S. citizens to apply for the 2014 IC Analyst-Private Sector Program. While applicants from all industries are welcome to apply, an interest and demonstrated experience in at least one of the 2014 topics, which include:

  • 3D Printing and Rapid Prototyping
  • Bulk Intrusion Data Analysis
  • Industrial Control Systems in the Critical Manufacturing Sector
  • Non-Mainstream Money Exchanges
  • Unmanned Aerial Systems (UASs)

Applicants who have a range of experience with these topics are welcome to demonstrate this in their application, but each selected participant will be assigned to one team. Those selected will be notified in mid-February and will be expected to attend the kick-off meeting in Washington, D.C. in late April.  DEADLINE IS JANUARY 31.

 

To apply, contact either Tammy Hutchinson ([email protected]) or David Gootzit ([email protected]) for the application form.

 

DHSnomineefJohn Roth, nominee for DHS IG, Testifies
John Roth, President Obama's nominee for Inspector General for the U.S. Department of Homeland Security testified before Congress on January 8th. The position has been empty for 3 years.  If nominated, Roth, who currently leads the FDA's criminal investigations office, would replace former acting inspector Charles Edwards, who recently stepped down. 

In his confirmation hearing before the Homeland Security and Governmental Affairs Committee, Roth pledged to continue the investigation against into allegations against his predecessor, rebuild morale and refocus the office to its core mission, "This is going to be a very significant issue that I'm going to have to face very early on," he said, saying that it stems from a "lack of focus on mission and I think it's very important to focus people on the very important mission that the office of the inspector general has, especially in DHS...whatever happened in the past...people are going to do their jobs, we're going to focus on the mission, and we're going to do this right."

President Obama has had difficulty filling many of DHS's key positions. DHS has the third-largest executive-branch workforce as it includes the Customs and Border Protection agency, the Coast Guard, the Transportation Security Administration, and FEMA. Roughly 40% of DHS's top roles are either empty or held by acting officials, which has led to DHS receiving some of the lowest leadership ratings in the 2013 "Best Places to Work in the Federal Government" report.

See Roth's testimony on CSPAN.
CBOCBO's Approaches to Reducing Defense Spending
The CBO has updated its presentation on reducing federal spending on national defense. Among its recommendations are reducing the size of the military to satisfy caps under the Budget Control Act, replacing certain military personnel with civilian employees, and increasing TRICARE cost sharing for working-age retirees and life members.

See the full presentation here.
newsofnoteNews of Note
JIHAD JANE SENTENCED TO TEN YEARS
Colleen LaRose, the 50-year-old Pennsylvania woman who plotted to kill Lars Vilks, a Swedish artist who she believed had "insulted Islam," was sentenced to ten years in prison. Adopting the online monicker "Jihad Jane," LaRose has been described as a "lonely and isolated" woman who "joined the jihadist cause out of boredom." Read more at The Washington Post.
BOYLE NAMED ALION GC
Kevin Boyle, who has served as general counsel for MCR, LLC, was named General Counsel for Alion Science and Technology January 7th. He will support Alion's initiatives for corporate 
governance, ethics, and their global growth strategy.  Previously Boyle has served as general counsel at Vangent, Inc., and assistant general counsel at General Dynamics. He holds an undergraduate degree from Yale and received his JD from Tulane.
 
JANUARY:  HUMAN TRAFFICKING PREVENTION MONTH

The FBI's human trafficking investigations focus on two kinds of victims: the Civil Rights Unit coordinates trafficking investigations involving both adult and juvenile foreign nationals who are forced or coerced into slave labor or sex trafficking, as well as adult victims of domestic sex trafficking; and the Violent Crimes against Children Section coordinates investigations involving domestic children under the age of 18 being sexually exploited for commercial gain and those involving child sex tourism.

 
106 INDICTED IN SOCIAL SECURITY DISABILITY FRAUD
(ICE) Homeland Security Investigations (HSI) - the Manhattan District Attorney's Office indicted 106 defendants for massive fraud against the federal Social Security Disability Insurance Benefits (SDDI) program that resulted in the loss of hundreds of millions of dollars from federal taxpayers.
 

NATIONAL GUARD TO HOST OPEN-SOURCE UAV RESEARCH

Camp Shelby Joint Forces Training Center is planning to host a multi-agency research program that hopes to drive innovation and reduce costs for unmanned vehicle technology. Camp Shelby has access to almost 100 square miles of restricted air space and is home to the Unmanned Aerial Systems Flight Center. Read more at GCN.

FAA ANNOUNCES SIX ENTITIES TO DEVELOP UNMANNED AIRCRAFT STANDARDS 

The FAA has chosen six public entities to test and develop unmanned aircraft systems (UAS). While choosing these six entities, the FAA wanted to "achieve geographical and climatic diversity." The six institutions are: the University of Alaska; the State of Nevada; New York's Griffiss International Airport; the North Dakota Department of Commerce; Texas A&M University; and Virginia Tech. The FAA will ensure that the six sites operate under strict safety standards.  

 Read more at the FAA.


HOW TO NAVIGATE THE SBA's 8(a) PROGRAM
The SBA will conduct two

free one-hour webinars to help small businesses learn:  >>the eligibility requirements for 8(a) certification

>>about the technical assistance available through the 8(a) Program

>>about common myths and misconceptions about the 8(a) Program

>>the top reasons why an 8(a) application is declined or returned. 

PART I:  January 15, 2:00 - 3:00 pm (EST) 

PART II:  January 22, 2:00 - 3:00 (EST) REGISTER
BEST PRACTICES IN FEDERAL CONTRACTING: FOCUS ON DHS & DOD
Join GTSC February 21,
2014 for a Capacity Building session focused on assuring you don't learn the hard lessons on your own skin!  After years of practice and experience, the IACCM has brought together best practices in government contracting from around the globe.  Paired with the former procurement officer of the U.S. Department of Homeland Security, this session will combine what best practices can be applied toward contracting with DHS and the Defense Department.
FREE SBA DISASTER PREPAREDNESS WEBINAR
This is the first webinar of 2014 as part of the "Prepare My Business" series co-sponsored by Agility Recovery and the Small Business Administration. 
Topics will include:
*  A retrospective of 2013's major events causing business interruptions
*  The latest trends in business continuity planning
*  Steps and tools your organization needs in order to be prepared
*  Actionable ideas that can be implemented today to increase your organization's preparedness
FRMR PRIME MINISTER ARIEL SHARON, DEAD AT 85
Prime Minister Ariel Sharon has died after 8 years in a coma.  The controversial leader was struck by a massive stroke in January 2006.  

DHS SBIR SOLICITATION CLOSES JANUARY 22

The Department of Homeland Security (DHS) Office of Procurement Operations released the FY14.1 Small Business Innovation Research (SBIR) Solicitation.  S&T invites small business concerns in your state to submit Phase I proposals to the DHS Small Business Innovation Research (SBIR) Program.  Small businesses must have the capability to conduct research or research and development (R/R&D) in any of the homeland security-related topic areas included in the solicitation.  Click here for more info.  
NOMINATE A SMALL BUSINESS FOR AN SBA AWARD! 
Are you a small business owner or do you know a small business with an amazing story to tell?  If so, submit your nominations today for the 2014 NatIonal Small Business Week Awards.  Nominations are being accepted online here only until January 17, 2014.



quoteQUOTE OF THE WEEK:  

 "There are no secrets to success.  It is the result of preparation, hard work, and learning from failure."
 
-- Colin Powell, former U.S. Secretary of State

It's About the Mission. The Government Technology & Services Coalition (GTSC) is a nonprofit 501(c)(6), non-partisan association of innovative, agile small and midsized company CEOs that create, develop, and implement solutions for the Federal homeland and national security sector. These companies founded the Coalition to band together to work with their Federal partners to achieve their mission despite significant budget challenges by bringing the innovation, creativity and exceptionalism of successful small businesses to the homeland and national security mission. 
 
Our vision is to provide an ethical, effective platform for information exchange between the public and private sector on homeland and national security ideas, technologies and innovations.
 
Our mission is to provide exceptional advocacy, capacity building, partnership opportunities and marketing in the Federal security space for small and mid-sized companies, and to support and assist our government partners achieve their critical missions with the highest integrity; best and most innovative technologies; and results-based, quality products and services to prevent, protect against, mitigate, respond to and recover from any terrorist attack or natural disaster.
 

Connect with GTSC to get more news, articles & information!

Like us on Facebook   Follow us on Twitter   View our profile on LinkedIn  Visit our blog