It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Majic
Shutting The Barn Door
I'm pretty sure the National Instant Criminal Background Check System (NICS) operates independently of the United States Office of Personnel Management (OPM), so this shouldn't affect firearms purchases.
I think it is also a good idea to bear in mind that just because they say there is no evidence the vulnerability they found has been exploited, doesn't mean it hasn't been exploited. After all, other vulnerabilities were apparently exploited for months before the OPM realized it, which is why this is such a major scandal.
The damage already caused, and that will inevitably continue long into the future, by allowing the most intimate personal details of up 18 million federal employees and contractors to fall into unfriendly hands is incalculable, but definitely catastrophic.
The genie is already out of the bottle.
originally posted by: roadgravel
How does a database of federal employees affect checks for non federal employed people?
originally posted by: musicismagic
Looks like something is going to happen, but why with someone in the know not talk about it, surely they have family and friends.
originally posted by: Vasa Croe
originally posted by: roadgravel
How does a database of federal employees affect checks for non federal employed people?
Its not just Federal employees in the database....this is the database where they keep records for and approve anyone for clearance to work on projects requiring clearance.
I am a non-federal employee when I do work on Lockheed locations, but I have a secret clearance in order to do so.
FBI setting up command centers to monitor terrorist threats over July 4 weekend
The FBI is establishing command centers around the country to monitor any potential terrorist threats around the July 4 weekend, a federal law enforcement source told Fox News.
The source said while there is no specific, credible threat surrounding the holiday, its symbolic nature offers a potential target for terror groups like ISIS. Authorities are particularly concerned about soft targets like shopping malls and other areas where there are large gatherings of people and rather light security, according to the source.
Information from local, state and federal law enforcement agencies will be sent to the command centers so officials can gauge the threat level and respond quickly.
Another law enforcement source told Fox the FBI’s strategy has shifted toward getting ISIS supporters off the streets as soon as possible, given that it’s hard to predict when one might go operational. This could include arresting individuals on lesser charges and then building a broader case once that person is in custody.
originally posted by: roadgravel
a reply to: Vasa Croe
There was a comment about fire arms checks...
I also wonder how this is going to affect background checks for weapons licenses
originally posted by: FamCore
a reply to: Vasa Croe
and if some loony does something this weekend it will hit the public hard, the whole emotional impact of a patriotic holiday ending in tragedy I will be praying that nothing bad happens as many are predicting
FORT CARSON, Colo. – Fort Carson and 4th Infantry Division will host a July 4th celebration on July 3 at Iron Horse Park from 4 – 10 p.m
The event will feature live music from the 4th Infantry Division band. The celebration will conclude with a fireworks show at 9:15 p.m.
A wide array of family-friendly games and attractions will be available for attendees, including inflatable bounce houses, a corn maze, rock wall, bungee jump, free photo booth, and a wrecking ball.
Admission is free and the event is open to the public. Fees will apply for some attractions as well as food and merchandise.
Attendees are welcome to bring chairs and picnic blankets to the event. Parking is a distance from the event site, be prepared to walk once parked. Pets and glass containers are not allowed. Personally purchased fireworks are also prohibited on post in accordance with local and state laws.
Only access for non-Department of Defense identification card holders will be Gate 1 (access off of Highway 115) and Gate 20 (access off of Interstate 25). Visitor passes will not be required from 2 – 9 p.m. Those accessing the installation for the celebration will have to show a current driver’s license, auto registration and valid auto insurance. Allow extra time in the event of a vehicle inspection. Military working dogs will be active in the event area.
All weapons brought onto Fort Carson must be registered with the provost marshal's office at building 2700 in accordance with U.S. Army and Fort Carson regulations and policy. Only law enforcement personnel in the performance of official duties may possess a concealed weapon on Fort Carson. It is important to note that county, state and federal civilian concealed carry permits are not recognized or valid on Fort Carson.
Despite Colorado amendment to legalizing recreational marijuana, wrongful use or possession of marijuana on a Federal installation is a violation of federal law. Those attending the celebration, federal law continues to prohibit the use of marijuana anywhere on post.
For more information contact the Fort Carson Public Affairs Office at
(719) 526-4143/7525. After hours please contact the 24-hour Fort Carson Operations Center at (719) 526-5500 and ask for the On-Call Public Affairs Officer.
All weapons brought onto Fort Carson must be registered with the provost marshal's office at building 2700 in accordance with U.S. Army and Fort Carson regulations and policy. Only law enforcement personnel in the performance of official duties may possess a concealed weapon on Fort Carson. It is important to note that county, state and federal civilian concealed carry permits are not recognized or valid on Fort Carson.
Through the course of the ongoing investigation into the cyber intrusion that compromised personnel records of current and former Federal employees announced on June 4, OPM has recently discovered that additional systems were compromised. These systems included those that contain information related to the background investigations of current, former, and prospective Federal government employees, as well as other individuals for whom a Federal background investigation was conducted.
This separate incident – like the one that was announced on June 4th affecting personnel information of current and former federal employees – was discovered as a result of OPM’s aggressive efforts to update its cybersecurity posture, adding numerous tools and capabilities to its network.
How did DHS learn about the incident?
After learning about a cybersecurity intrusion that occurred at another federal contractor, as part of our efforts to responsibly safeguard information, DHS carried out a thorough assessment of all contractors who conduct background investigations on behalf of the Department.
DHS initially discovered possible unauthorized access to KeyPoint’s computer systems in September 2014 while conducting an assessment of the contractor’s network. In response to these discoveries, DHS immediately stopped the flow of information to the contractor and background investigation activity that the company was performing until we ensured additional safeguards were put in place. The company has since implemented safeguards.
There was, and remains, uncertainty as to the extent of the exposure of personally identifiable information (PII). Notifications to all potentially affected individuals are being sent now because their information was included information that we know to have been potentially exposed. We cannot confirm that exposure has led to any nefarious activity.
KeyPoint is a DHS contractor that processes personnel background security investigations and credit checks of job applicants who may or may not ultimately have been employed with the Department. Certain current and former DHS employees and contractors, as well as job applicants are potentially impacted by this breach. DHS takes its responsibility to safeguard personal information seriously and is notifying current and former employees and applicants whose PII was stored on the company’s network and may have been exposed as a result of a cybersecurity intrusion. DHS is sending targeted notifications, including a letter, to those individuals whose information is contained in records that could have been exposed.
Firearm Retrieval Referrals
Because of the NICS Section’s commitment to public safety and national security, the search for needed disposition information continues beyond the three business days to provide a determination as stated in the Brady Act. In some instances, the information is subsequently obtained and a final status determined; however, if the final status (determined after the lapse of three business days) results in a deny decision and the NICS Section is advised by the FFL that the firearm was transferred, then the ATF is notified a prohibited person is in possession of a firearm. In 2013, the NICS Section referred 3,375 firearm retrieval actions to the ATF.
originally posted by: Vasa Croe
originally posted by: Majic
Shutting The Barn Door
I'm pretty sure the National Instant Criminal Background Check System (NICS) operates independently of the United States Office of Personnel Management (OPM), so this shouldn't affect firearms purchases.
I think it is also a good idea to bear in mind that just because they say there is no evidence the vulnerability they found has been exploited, doesn't mean it hasn't been exploited. After all, other vulnerabilities were apparently exploited for months before the OPM realized it, which is why this is such a major scandal.
The damage already caused, and that will inevitably continue long into the future, by allowing the most intimate personal details of up 18 million federal employees and contractors to fall into unfriendly hands is incalculable, but definitely catastrophic.
The genie is already out of the bottle.
Well....if it is the case that it has already been breached then there is also the possibility that whomever breached it was able to issue their own security clearances..... that adds a level of SHTF to it.